<p><b>Cyber Security Analyst</b></p><p>Austin, TX | On-site</p><p><br></p><p>The Cybersecurity Analyst will collaborate with IT, engineering, and compliance teams to identify security threats, investigate incidents, and help protect organizational systems and data.</p><p><br></p><p><strong>Key Responsibilities</strong></p><ul><li>Monitor, analyze, and triage security alerts and events from SIEM, EDR, IDS/IPS, and other security tools</li><li>Investigate potential security incidents, document findings, and support containment and remediation efforts</li><li>Assist with log analysis, threat detection, and root-cause analysis of security events</li><li>Support vulnerability scanning, assessment, and remediation tracking</li><li>Collaborate with IT Infrastructure, Cloud, Application, and Compliance teams on security initiatives</li><li>Assist with access reviews, identity and access management (IAM), and privilege monitoring</li><li>Support implementation and validation of security controls aligned with organizational policies</li><li>Participate in incident response exercises and post-incident reviews</li><li>Assist with audits, risk assessments, and compliance activities (HIPAA, NIST, ISO, SOC 2, etc.)</li><li>Maintain security documentation including incident reports, runbooks, procedures, and evidence</li><li>Prepare clear summaries of security findings and metrics for technical and non-technical stakeholders</li><li>Support ad-hoc security analysis, dashboards, and recurring security reporting</li></ul>
<p><strong>Cyber Security Engineer</strong></p><p>Austin Tx | On-site </p><p><br></p><p><strong>Key Responsibilities: </strong></p><ul><li>Ensure the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools.</li><li>Support the system/application Authorization and Accreditation (A&A) effort, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Air Force policies (i.e., Risk Management Framework (RMF).</li><li>Recommend policies and procedures to ensure the reliability of and accessibility to information systems and to prevent and defend against unauthorized access to systems, networks, and data.</li><li>Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.</li><li>Promote awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals.</li><li>Conduct systems security evaluations, audits, and reviews.</li><li>Recommend systems security contingency plans and disaster recovery procedures.</li><li>Recommend and implement programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.</li><li>Participate in network and systems design to ensure implementation of appropriate systems security policies.</li><li>Facilitate the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes.</li><li>Assess security events to determine impact and implementing corrective actions.</li><li>Ensure the rigorous application of information security/cybersecurity policies, principles, and practices in the delivery of all IT services.</li></ul>