Information Security Analyst
Location: Dallas, TX - Remote (North Texas based)
Schedule: Core business hours 8:00 AM – 5:00 PM CST
Conversion: Contract-to-hire (90 days)
Travel: Limited travel after conversion
Information Security Analyst
Remote (Texas Preferred)
Contract-to-Hire (3 months)
$52–$55/hour - Conversion Salary up to $115K
Overview
We are seeking an Information Security Analyst to support enterprise threat investigations, vulnerability remediation coordination, and security control improvements across a large distributed environment. This role combines incident response support, exception handling, documentation ownership, and cross-team collaboration with infrastructure and development groups.
This is not a queue-based SOC monitoring role and not a compliance-only position. It is a hands-on enterprise security operations role suited for someone with broad exposure across multiple security domains who can operate independently and adapt in environments where documentation may still be evolving.
What you’ll do
• Investigate phishing activity, malware alerts, authentication anomalies, and IDS/IPS events
• Correlate activity across SIEM, endpoint, identity, and network telemetry sources
• Respond to security alerts and coordinate escalation with infrastructure and development teams
• Evaluate software allow/deny requests based on security risk and operational impact
• Review website filtering requests and make practical risk-informed access decisions
• Support vulnerability tracking and remediation coordination across infrastructure and Azure environments
• Recommend improvements that strengthen enterprise security controls and reduce exposure
• Build working relationships with server teams, development teams, and global security contacts
• Contribute to SOP development and improve investigation documentation where processes are still maturing
• Support enterprise security posture initiatives aligned with long-term roadmap priorities
What you’ll bring
• 3+ years of hands-on information security experience across multiple security disciplines
• 5+ years of broader IT, infrastructure, or security operations experience
• Experience investigating alerts across SIEM, endpoint, identity, or network telemetry platforms
• Experience working in large enterprise or distributed environments
• Ability to collaborate effectively across infrastructure, development, and security teams
• Strong written communication skills, including the ability to produce SOPs and investigation documentation
• Comfort operating in environments where processes are evolving rather than fully predefined
• Strong networking fundamentals (TCP/IP)
• Working knowledge of Windows server and desktop environments
• Experience supporting vulnerability remediation programs
Preferred experience
• Exposure to SIEM platforms such as Splunk, QRadar, Securonix, Elastic, or similar
• Experience with EDR/XDR platforms such as CrowdStrike, SentinelOne, Sophos XDR, or Carbon Black
• Familiarity with identity platforms such as Active Directory, Okta, or SSO environments
• Azure security exposure
• IDS/IPS monitoring experience
• Exposure to NIST, ISO 27001, or CIS frameworks
• Linux familiarity
• Certifications such as CISSP, CEH, Security+, or similar
What success looks like in the first 90 days
• Independently investigate and respond to security alerts
• Build working relationships with infrastructure, development, and enterprise security teams
• Evaluate software and website filtering requests using sound risk judgment
• Contribute to vulnerability remediation tracking workflows
• Improve documentation and help strengthen investigation procedures
• Demonstrate flexibility across multiple tools and security domains
Ideal candidate profile
This role is best suited for someone who:
• has broad security exposure rather than a narrow SOC-only or audit-only background
• is comfortable working across teams in a large enterprise environment
• communicates clearly in a fully remote setting
• can write procedures when documentation is incomplete
• adapts quickly to changing priorities
• values long-term fit and growth within a security program