Job Description
Job Description
Job Title : Information Security Analyst - Threat & Vulnerability Management
Job Location : Downtown Houston, TX 77002
- Prospective candidates MUST be located in the HOUSTON, TX area.
Job Type : Contract / Full Time
This contract position has a duration of 6-months.Job Schedule : Mon-Fri 8AM-5PM
This contract role is hybrid (4-days onsite / 1-day WFH).Job Salary : $42-$45 / hour
Depending on experience.Project Overview
The Information Security Analyst will support key cybersecurity initiatives including SIEM operations, automation, incident response processes, and integration of security tools. This role is critical to advancing our security operations and maturity.
Role and Responsibilities
Contribute to the development of cybersecurity strategies, objectives, and project plansAssist with design and implementation of improved cybersecurity processes and servicesAdminister and maintain cybersecurity technology platforms for the Elections Administrative Department and the E nclave DepartmentFulfill customer requests and support daily security operations, including incident monitoring, analysis, and responseAnalyze cybersecurity threats and vulnerabilities and develop appropriate mitigation strategiesCreate documentation including procedures, job aids, reports, metrics, and presentationsParticipate in Cybersecurity Incident Response Team (CIRT) investigations and activitiesScheduled Milestones & Deliverables
Enhance maturity of SIEM, SOC, and Incident Response processesIntegrate automation best practicesImprove Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)Performance Metrics
Completion of projects related to SIEM and other security platforms (e.g., incidents, alerts, tickets)Availability and uptime of systemsSOC effectivenessCompliance with defined processes and proceduresRequirements
Highlighted Requirements
2+ years of SIEM experience , preferably with Azure Sentinel and Kusto Query Language (KQL)Multi-year, direct experience in Incident Response , ideally in an Incident Response Team or MSSP setting for medium to large organizationsPractical experience with tools within the Microsoft security stackKey Skills
Cyber Incident ResponseKQL – Deep understanding and hands-on experienceSOC Analyst / Operations – Level 1, 2, and 3 (Triage, Escalation)SIEM Administration – Managing, maintaining, creating custom detections / loggingSentinelOne – In-depth knowledge for incident handling, hunting, queries, and detectionsLinux Administration – Comfortable with navigation, configuration, and server managementMicrosoft Cloud Security Tools – Understanding of architecture and platform useAdditional Skills
Data analysis and reportingEducation
Required : High School diploma or GED equivalentPreferred : Bachelor’s degree or currently pursuing a degree in Information Systems, Information Assurance, Cybersecurity, IT, Computer Science, or a related fieldCertifications
Required / Preferred :CompTIA Security+CompTIA Network+Other relevant industry certificationsExperience
Minimum of 5 years of progressive work experience in Information Security, IT, Computer Science, or a related field