Logo
Recru

Recru is hiring: Security Analyst III in Houston

Recru, Houston, TX, United States


Job Overview:

We are seeking an experienced and highly skilled Security Analyst III to join our client's dynamic cybersecurity team. The ideal candidate will have over 5 years of experience in the field of cybersecurity, with a strong background in Security Information and Event Management (SIEM) tools such as Splunk or Sentinel. Additionally, the candidate should possess significant experience in Disaster Recovery Planning and execution. As a Security Analyst III, you will play a pivotal role in detecting, analyzing, and mitigating security threats, while ensuring the organization’s cybersecurity posture aligns with industry best practices and compliance requirements.


Key Responsibilities:

  • Incident Detection and Response:
  • Utilize SIEM tools (Splunk, Sentinel) to monitor, identify, and analyze security events and incidents.
  • Conduct real-time analysis of security events and escalate incidents as needed.
  • Perform in-depth investigations of security breaches and incidents, providing thorough documentation and resolution.
  • Security Monitoring and Reporting:
  • Maintain and improve security monitoring processes using SIEM platforms, ensuring timely identification of potential threats and vulnerabilities.
  • Develop, fine-tune, and optimize correlation rules and alerts to minimize false positives.
  • Produce detailed reports on security findings, including actionable recommendations for improvement.
  • Threat Intelligence:
  • Stay current with emerging security threats, trends, and vulnerabilities, integrating threat intelligence feeds into security processes.
  • Collaborate with internal teams to assess and mitigate new vulnerabilities and threats.
  • Disaster Recovery Planning:
  • Lead efforts in the creation, implementation, and testing of disaster recovery plans to ensure the business can continue operations in the event of a cybersecurity breach or other significant disruptions.
  • Develop strategies to ensure the resilience of critical systems and data, and manage regular testing to ensure readiness in case of a disaster.
  • Ensure disaster recovery plans are aligned with business continuity objectives and industry standards.
  • Compliance and Governance:
  • Ensure security practices are in line with organizational policies, industry regulations, and frameworks such as NIST, ISO 27001, and GDPR.
  • Contribute to audit preparation and assist with responding to audits and assessments.
  • Collaboration and Mentorship:
  • Work closely with IT and other business units to ensure cohesive security posture.
  • Provide guidance and mentorship to junior security team members.


Required Qualifications:

  • 5+ years of experience in a cybersecurity role, with a proven track record of managing and responding to security incidents.
  • Strong experience with SIEM tools such as Splunk or Microsoft Sentinel, including rule creation, customization, and incident management.
  • Solid experience with Disaster Recovery Planning, including the design, implementation, and testing of DR plans.
  • Proficiency in security monitoring, incident detection, and response procedures.
  • Strong knowledge of network protocols, security controls, firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security.
  • Experience with vulnerability management and risk assessment tools.
  • Familiarity with scripting languages (Python, PowerShell, etc.) for automation is a plus.


  • Certifications:
  • CISSP (Certified Information Systems Security Professional) or similar certifications (CISM, CISA, GIAC) preferred.
  • Relevant SIEM certifications (Splunk Certified User, Microsoft Sentinel) are a plus.


This is a hybrid role so candidate must be willing to go into office 3 days a week.