Cybersecurity Analyst - Contract to Hire

Austin, TX

This will be a six-month contract with the potential of a permanent position at the end. You will need to be and will be based in Austin, or commutable to downtown. This position is two days remote and three on-site in Austin working with the team.

We are working with a successful Agency in Austin Texas to find a Cybersecurity Analyst reporting to the CISO. 

Responsibilities:

  • Technical risk assessments and reviews of account permissions, computer data access needs, security violations, programming changes, and new and existing applications and systems, including data center physical security and environment.
  • Cybersecurity incident detection, analysis, and prevention.
  • Vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
  • Forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
  • Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.
  • Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status.
  • Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.
  • Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency.
  • Coordinates agency policies for encryption of data transmissions and the definition of firewall configuration to protect confidential information in transit.
  • Designs, develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.
  • Participates in the development of information technology disaster recovery and business continuity planning.

Requirements:

  • 5+ years of experience in Cybersecurity, and Information Technology Security.

Preferred Skills:

  • Certifications such as Certified Ethical Hacker (CEH), GAIC Certified Incident Handler (GCIH), GCFE Certified Forensic Examiner (GAIC), Certified Information Systems Auditor (CISA), Security+, Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP).
  • Experience producing detailed intelligence analysis reports on cyber threats and presenting findings to technical and non-technical audiences.
  • Vulnerability Management Systems (e.g., Rapid7, Tenable/Nessus Scanning, Qualys).
  • Endpoint Detection and Response (e.g., EndGame, Crowdstrike, CyberReason).
  • Email Threat Management (e.g., Proofpoint, MimeCast, Microsoft).
  • Security Information and Event Management (e.g., Splunk, Rapid7, SumoLogic).
  • Data Loss Protection/Cloud Access Security Brokers (e.g., Symantec, Microsoft, Bitglass, Netskope).
  • Cloud Enterprise Network Security (e.g., Cisco Umbrella, Palo Alto, ZScaler).
  • Skill in using application security standards, frameworks, attack methods, and mitigation best practices (e.g., OWASP, SANS, NIST, PCI DSS, HIPAA, CJIS, CIS Critical Controls).


#ZR