Cyber Security Analyst

1 month ago


San Antonio, United States Apex Systems Full time

Position Name: Senior Cybersecurity Risk Analyst

Employee Type: Full Time – Permanent – Direct Hire

Experience: Senior

Location: San Antonio, TX (4 days onsite)

Compensation: $100-145K with 12-15% Bonus pay out


*If interested and qualified, please reach out to the professional recruiter, Nicole, at nrosipal@apexsystems.com


Position Summary

We are seeking a highly skilled and experienced Senior Cybersecurity Analyst to join our Risk team within the Cybersecurity Governance, Risk, and Compliance (GRC) organization. The successful candidate will be responsible for assessing and analyzing cybersecurity risks and identifying appropriate mitigation measures for Information Technology (IT) and Operational Technology (OT) environments, systems, and third-party solutions. The Senior Cybersecurity Analyst will ensure appropriate controls are in place to mitigate risks by working closely with business partners, including IT and OT program and process owners.


The Senior Cybersecurity Analyst will develop and implement cyber risk assessment techniques to identify and pre-empt security risks. This role involves demonstrating business risks associated with these vulnerabilities and providing risk treatment and prioritization strategies. The analyst will perform comprehensive risk assessments and be responsible for continuously monitoring and reviewing these assessments. The analyst should have in-depth knowledge of NIST standards and frameworks such as the NIST Cybersecurity Framework (CSF), NIST 800-30, NIST 800-37, NIST 800-53, and NIST 800-82. Effective communication of cyber risks to business stakeholders and collaboration with various departments to ensure a clear understanding of these risks is essential. The analyst will manage cybersecurity risks specific to IT and OT environments and third-party solutions, ensuring compliance with organizational policies. Additionally, the analyst will stay updated with the latest cybersecurity trends and recommend improvements to existing cybersecurity policies, procedures, and tools.


*This position belongs to a family of jobs with increasing responsibility, competency, and skill level. Actual position title and pay grade will be based on the selected candidate’s experience and qualifications.


Key Responsibilities

  • Conducts detailed analyses on controls related to complex business processes and systems and relationship to other internal and external systems to assess business impact of the security issues.
  • Drives the resolution of routine multi-functional technical issues. Oversees, advises on and manages Cybersecurity assessments and associated risks.
  • Develops and evaluates efficiency and effectiveness of security processes and controls through creation and maintenance of detailed security and/or compliance reports, as necessary.
  • Analyzes and maintains security audits and reports, monitors security advisory groups, and assist with security incidents and intrusions.
  • Leads implementation of global security initiatives, policies, and compliance requirements. Develops and tracks metrics related to cybersecurity; uses existing cybersecurity tools for running web application scanning, vulnerability scanning and external pentests and help with the remediation effort.
  • Manages cyber security-related consulting, guidance, and support to customers and stakeholders.
  • Translates security principles to assist configuration teams with incorporating security into build and configuration processes.
  • Monitors emerging Information Technology/Operations Technology and cybersecurity technologies as well as their impact on the security landscape.


Education and Experience

  • Bachelor’s Degree in Information Technology, related field or equivalent experience.
  • Professional certification, e.g. Security+, Network+, CISA, CRISC, CISSP preferred.
  • 5+ years of relevant experience required.


Skills

  • Cybersecurity Research - Applies technical knowledge of the latest data, developments, and trends in the cybersecurity world to identify cybersecurity vulnerabilities within an organization or industry.
  • Cybersecurity Risk Management - The process of developing cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses, demonstrating the business risks associated with these loopholes and providing risk treatment and prioritization strategies to effectively address the cyber-related risks, threats and vulnerabilities, ensuring appropriate levels of protection, confidentiality, integrity and privacy in alignment with the security framework.
  • DevSecOps - A set of practices that automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery, with an aim towards shortening the systems development life cycle and pas well as continuous delivery and a security first approach.
  • Digital Forensics - Develop and manage digital forensic investigation and reporting plan which specifies the tools, methods, procedures and practices to be used. This includes the collection, analysis and preservation of digital evidence in line with standard procedures and reporting of findings for legal proceedings.
  • Ethical Hacking - The act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming.
  • Identity and Access Management (IAM) - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities, ensuring that the right users have the appropriate access to technology resources.
  • Incident Response Management - An organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • Intrusion Detection & Analysis - The use of security analytics, including the outputs from intelligence analysis, predictive research and root cause analysis in order to search for and detect potential breaches or identify recognized indicators and warnings. Also, monitoring and collating external vulnerability reports for organizational relevance, ensuring that relevant vulnerabilities are rectified through formal change processes.
  • Malware Analysis - Software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, common categories include computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.
  • Penetration Testing - The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.
  • Root Cause Analysis - An iterative process, designed to investigate and categorize the root causes of events or failures that may have negative impacts to the overall performance of a system and establish a flexible and effective framework for the necessary corrective and preventive actions.
  • Secure Software Development Lifecycle (SSDL) - Involves integrating security testing and other activities into an existing development process. Examples include writing security requirements alongside functional requirements and performing an architecture risk analysis during the design phase of the SDLC.
  • Security Controls Management - Manages and maintains an information system that focus on the management of risk and the management of information systems security.
  • Security Governance - The process of developing and disseminating corporate security policies, frameworks, and guidelines to ensure that day-to-day business operations are guarded and well protected against risks, threats, and vulnerabilities.
  • Security Information & Event Management (SIEM) - A set of tools and services offering real-time visibility across an organization's information security systems, and event log management that consolidates data from numerous sources.
  • Security Policy Management - The process of identifying, implementing, and managing the rules and procedures that all individuals must follow when accessing and using an organization's IT assets and resources.
  • Threat Analysis & Modeling - Monitor intelligence-gathering and anticipate potential threats to an IT/OT systems proactively. This involves the pre-emptive analysis of potential perpetrators, anomalous activities and evidence-based knowledge and inferences on perpetrators' motivations and tactics.
  • Threat Hunting - Searches through networks, endpoints, and datasets to detect and isolate cyber threats that evade existing security solutions.
  • Threat Intelligence Analysis - Enable and conduct analysis of malicious threats, to examine their characteristics, behaviors, capabilities, intent and interactions with the environment as well as the development of defense and mitigation strategies and techniques to effectively combat such threats.



  • San Antonio, United States C.H. Guenther & Son Full time

    SummaryA Cyber Security Analyst is responsible for analyzing, detecting, monitoring, and responding to cyber threats that target the organization's infrastructure and operational technology (OT) systems. The Cyber Security Analyst works closely with the IT (Information Technology) and OT teams to ensure the security and resilience of the organization's...


  • San Antonio, United States Apex Systems Full time

    Position Name: Senior Cybersecurity Risk AnalystEmployee Type: Full Time – Permanent – Direct HireExperience: Senior Location: San Antonio, TX (4 days onsite) Compensation: $100-145K with 12-15% Bonus pay out*If interested and qualified, please reach out to the professional recruiter, Nicole, at nrosipal@apexsystems.com Position SummaryWe are seeking a...


  • San Antonio, United States Bridgehead I.T. Full time

    Position Summary: Cyber security analysts are responsible for managing, monitoring, troubleshooting, and protecting the security of the internal environment and that of our customers in real time. The Cyber Security Analyst is tasked with providing technical expertise in all areas of network, system, and application security. In this position the Cyber...

  • Cyber Security Analyst

    2 months ago


    San Antonio, United States Bridgehead IT Full time

    Job DescriptionJob DescriptionSalary: Position Summary:Cyber security analysts are responsible for managing, monitoring, troubleshooting, and protecting the security of the internal environment and that of our customers in real time. The Cyber Security Analyst is tasked with providing technical expertise in all areas of network, system, and application...


  • San Antonio, United States University Health Full time

    POSITION SUMMARY/RESPONSIBILITIES The Senior Cyber Security Analyst must have a deep understanding of information security protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data. In this role, the Senior Analyst will be instrumental in establishing and maintaining security standards across Community First....


  • San Francisco, United States Bluestone.com Full time

    blueStone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide. Job Description Our client is seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to...


  • San Diego, United States VIA Technical Full time

    Job Title: Cybersecurity Analyst Location: San Diego, CA (Hybrid) Type: Full-Time Company: Our client, a leader in the clean energy sector, is seeking a Cybersecurity Analyst to join their team. Overview: We are looking for a skilled Cybersecurity Analyst to lead the continuous monitoring and protection of our organization's enterprise assets. This role...

  • Cyber Security Analyst

    2 months ago


    San Antonio, United States Bridgehead I.T. Full time

    Position Summary: Cyber security analysts are responsible for managing, monitoring, troubleshooting, and protecting the security of the internal environment and that of our customers in real time. The Cyber Security Analyst is tasked with providing technical expertise in all areas of network, system, and application security. In this position the Cyber...


  • San Diego, United States VIA Technical Full time

    Job Title: Cybersecurity AnalystLocation: San Diego, CA (Hybrid)Type: Full-TimeCompany: Our client, a leader in the clean energy sector, is seeking a Cybersecurity Analyst to join their team.Overview:We are looking for a skilled Cybersecurity Analyst to lead the continuous monitoring and protection of our organization's enterprise assets. This role involves...


  • San Diego, United States VIA Technical Full time

    Job Title: Cybersecurity AnalystLocation: San Diego, CA (Hybrid)Type: Full-TimeCompany: Our client, a leader in the clean energy sector, is seeking a Cybersecurity Analyst to join their team.Overview:We are looking for a skilled Cybersecurity Analyst to lead the continuous monitoring and protection of our organization's enterprise assets. This role involves...


  • san diego, United States VIA Technical Full time

    Job Title: Cybersecurity AnalystLocation: San Diego, CA (Hybrid)Type: Full-TimeCompany: Our client, a leader in the clean energy sector, is seeking a Cybersecurity Analyst to join their team.Overview:We are looking for a skilled Cybersecurity Analyst to lead the continuous monitoring and protection of our organization's enterprise assets. This role involves...


  • San Antonio, United States University Health Full time

    The Senior Cyber Security Analyst must have a deep understanding of information security protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data.Oversees day-to-day identity access management and quarterly required audits.Owns and oversees the disaster recovery plans; coordinates business continuity plans...


  • San Antonio, United States The Swift Group Full time

    Job DescriptionJob DescriptionTitle: Cyber Defense Analyst - Level 3Location: San Antonio, TXOPS Consulting is seeking a qualified Cyber Defense Analyst - Level 3 (ICS, SCADA) candidate who uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports...


  • San Antonio, United States COLSA Full time

    4/7/2021 Network/Host Cyber Security Analyst (TS/SCI required) Tracking Code 5815-987 Job Description **General Summary:** Performs Cyber Protection Team duties for a DoD client, to include CND, CNE, and CNA. **Principal Duties and Responsibilities (*Essential Functions):** COLSA Corporation is seeking candidates for a Network/Host Cyber Security Analyst....


  • San Antonio, United States The Swift Group Full time

    Job DescriptionJob DescriptionOPS Consulting is seeking a qualified Cyber Defense Analyst - Level 2 (SCADA) based out of San Antonio, TX., who uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur to protect data, information...

  • Cyber Security Analyst

    3 months ago


    San Diego, United States Atechstar Full time

    JOB DESCRIPTIONIdeally you have experience from the Maritime industry; and in depth maritime control systems and Cyber Security competence. You will be working closely with our Cybersecurity and Security Operations Center teams you will also be making observations on vessel threats and vulnerabilities management to ensure adherence to ICT Governance and...

  • Cyber Security Analyst

    3 months ago


    San Diego, California, United States Atechstar Full time

    JOB DESCRIPTIONIdeally you have experience from the Maritime industry; and in depth maritime control systems and Cyber Security competence. You will be working closely with our Cybersecurity and Security Operations Center teams you will also be making observations on vessel threats and vulnerabilities management to ensure adherence to ICT Governance and...


  • San Antonio, Texas, United States PeopleTec Full time

    Position OverviewPeopleTec is seeking motivated individuals for the role of Junior Security Analyst. This position is ideal for recent graduates or those with limited experience in the cybersecurity field.Key ResponsibilitiesThe Junior Security Analyst will collaborate with senior analysts to:Review and assess Risk Management Framework (RMF) documentation...


  • San Antonio, United States BTAS, Inc. Full time

    POSITION: Cybersecurity Project ManagerLOCATION: JBSA-Lackland, TX REQUIRED SECURITY CLEARANCE: TS/SCI with potential for higher read-ins POSITION TYPE/STANDARD WORK HOURS: Full-time (on-site)/40 hours per week WHO WE ARE:BTAS is a woman-owned small business founded in 1995, located near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned...


  • San Antonio, United States BTAS, Inc. Full time

    POSITION: Cybersecurity Project ManagerLOCATION: JBSA-Lackland, TX REQUIRED SECURITY CLEARANCE: TS/SCI with potential for higher read-ins POSITION TYPE/STANDARD WORK HOURS: Full-time (on-site)/40 hours per week WHO WE ARE:BTAS is a woman-owned small business founded in 1995, located near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned...