Logo
Simplex

Cybersecurity Analyst Contract to Hire

Simplex, Austin, Texas, 78716


This will be a six-month contract with the potential of a permanent position at the end. You will need to be and will be based in Austin, or commutable to downtown. This position is two days remote and three on-site in Austin working with the team. We are working with a successful Agency in Austin Texas to find a Cybersecurity Analyst reporting to the CISO. Responsibilities: Technical risk assessments and reviews of account permissions, computer data access needs, security violations, programming changes, and new and existing applications and systems, including data center physical security and environment. Cybersecurity incident detection, analysis, and prevention. Vulnerability scans of networks and applications to assess effectiveness and identify weaknesses. Forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools. Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems. Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status. Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies. Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency. Coordinates agency policies for encryption of data transmissions and the definition of firewall configuration to protect confidential information in transit. Designs, develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats. Participates in the development of information technology disaster recovery and business continuity planning. Requirements: 5 years of experience in Cybersecurity, and Information Technology Security. Preferred Skills: Certifications such as Certified Ethical Hacker (CEH), GAIC Certified Incident Handler (GCIH), GCFE Certified Forensic Examiner (GAIC), Certified Information Systems Auditor (CISA), Security, Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP). Experience producing detailed intelligence analysis reports on cyber threats and presenting findings to technical and non-technical audiences. Vulnerability Management Systems (e.g., Rapid7, Tenable/Nessus Scanning, Qualys). Endpoint Detection and Response (e.g., EndGame, Crowdstrike, CyberReason). Email Threat Management (e.g., Proofpoint, MimeCast, Microsoft). Security Information and Event Management (e.g., Splunk, Rapid7, SumoLogic). Data Loss Protection/Cloud Access Security Brokers (e.g., Symantec, Microsoft, Bitglass, Netskope). Cloud Enterprise Network Security (e.g., Cisco Umbrella, Palo Alto, ZScaler). Skill in using application security standards, frameworks, attack methods, and mitigation best practices (e.g., OWASP, SANS, NIST, PCI DSS, HIPAA, CJIS, CIS Critical Controls). ZR IND