Information security serp_jobs.h1.location_city
serp_jobs.job_alerts.create_a_job
Information security • garland tx
- serp_jobs.job_card.promoted
Information Security Analyst
TradeJobsWorkForce75248 Dallas, TX, USAimbridge Corporate - Information Technology Security Manager
Aimbridge HospitalityPlano, TX, USAssociate Manager, Information System Security Manager (ISSM)
L3Harris TechnologiesPlano, TX- serp_jobs.job_card.promoted
Security
TradeJobsWorkforce75225 University Park, TX, US- serp_jobs.job_card.promoted
Security Officer
CBRE GroupPlano, TX, USInformation Security Risk Analyst
American National Bank of TexasPlano, TX, United StatesInformation Technology Specialist (Security)
Administrative Office of the U.S. CourtsWashington, TX, US- serp_jobs.job_card.promoted
Chief Information Officer - CIO
GXARichardson, TX, US- serp_jobs.job_card.promoted
Security Manager
NTT DATAGarland, TX, USHealth Information Management Supervisor
Clinical Management ConsultantsPlano, TXInformation Security Consultant (Cybersecurity Project Technical Lead)
Toyota Tsusho SystemsPlano, Texas, United StatesInformation System Security Engineer / Site Lead
Cyber Defense TechnologiesRichardson, Texas, USA- serp_jobs.job_card.promoted
Information Technology Operations Manager
East-WestPlano, TX, USInformation Security Analyst
VirtualVocationsPlano, Texas, United StatesLead Security Engineer- Security Information and Event Management
JPMorgan Chase & Co.Plano, TX, United StatesInformation System Security Officer (ISSO) (Onsite)
Raytheon TechnologiesRichardson, TX, USA- serp_jobs.job_card.promoted
Cyber Security
ForhyrePlano, TX, US- serp_jobs.job_card.promoted
Security Officer
SecuritasRichardson, TX, USBoeing Summer 2026 Internship Program (Paid) – Information Digital Technology & Security (IDT&S)
BoeingTX,Plano,USASenior Information Security Analyst
PepsiCoPlano, Texas, USAInformation Security Analyst
TradeJobsWorkForce75248 Dallas, TX, US- serp_jobs.job_card.full_time
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures