Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Information Security Analyst

The RDRG Inc

Information Security Analyst

Dallas, TX
Full Time
Paid
  • Responsibilities

    Job Description

    Job Description

    Information Security Analyst
    Remote (Texas Preferred)
    Contract-to-Hire (3 months)

    Information Security Analyst
    Location: Dallas, TX (Hybrid: 3 days onsite / 2 days remote) or Remote (DFW-based)
    Schedule: Core business hours 8:00 AM – 5:00 PM CST
    Conversion: Contract-to-hire (90 days)
    Travel: Limited travel after conversion
    Work Authorization: U.S. citizenship required (no sponsorship available)

    Position Overview

    The Information Security Analyst is responsible for protecting the confidentiality, integrity, and availability of Rexel Group IT systems, infrastructure, and enterprise data assets. This role combines hands-on security monitoring and incident investigation with vulnerability remediation, identity security, and governance support across a distributed enterprise environment.

    The analyst will work closely with IT teams, business stakeholders, and the Information Security leadership team to investigate threats, strengthen security posture, implement controls, and support enterprise risk management initiatives aligned with CISO priorities.

    Primary Responsibilities

    Security Monitoring and Incident Response

    Monitor security alerts and indicators across SIEM, EDR, identity, and infrastructure platforms
    Review and triage alerts from tools such as Microsoft Sentinel, Splunk, QRadar, CrowdStrike, Microsoft Defender, and related log sources
    Investigate phishing activity, malware infections, suspicious authentication events, data leakage risks, and internal/external network abuse
    Distinguish true security incidents from false positives and escalate appropriately
    Interpret endpoint, identity, and network telemetry to determine scope and severity of events
    Document investigation findings and maintain incident resolution records

    Threat Detection and Vulnerability Remediation

    Detect, track, and support remediation of vulnerabilities across on-premises and Azure-based systems
    Review vulnerability scanner output (e.g., Nessus, Qualys) and assess business impact and remediation priority
    Partner with infrastructure teams to validate remediation actions and reduce exposure risk
    Support interpretation of penetration test findings and translate results into actionable remediation steps

    Enterprise Security Operations Support

    Support security operations across a distributed enterprise environment with remote workforce and global partners
    Collaborate with cross-functional IT teams to strengthen infrastructure security posture
    Assist with implementation and validation of endpoint protection, email security, identity protection, and IDS/IPS controls
    Interpret host and network logs to support investigations and detection workflows
    Monitor emerging threats and recommend defensive improvements aligned with enterprise risk posture

    Identity and Azure Security Controls

    Support enforcement of authentication security standards including MFA and access control policies
    Assist with Azure security monitoring and remediation workflows
    Contribute to identity governance improvements across hybrid Active Directory environments
    Validate implementation of security controls supporting Zero Trust architecture principles

    Governance, Risk, and Compliance Support

    Assist with enterprise system risk assessments
    Document, audit, and validate security controls across infrastructure and applications
    Support development of security and privacy standards aligned with NIST CSF, ISO 27001, and CIS Controls
    Maintain accurate documentation of security technologies, diagrams, and procedures
    Contribute to security program initiatives supporting Director of Information Security and CISO objectives

    Security Program Collaboration

    Serve as a subject matter contributor working with technical and business teams to strengthen security posture
    Engage stakeholders to translate security requirements into practical implementation guidance
    Champion security awareness using user-centered communication approaches
    Support strategic planning initiatives related to enterprise cybersecurity maturity

    Required Qualifications

    Bachelor’s degree required

    Minimum 5 years of IT experience
    Minimum 3 years of direct information security experience

    Hands-on experience with security monitoring and alert triage across SIEM and EDR platforms

    Experience supporting security operations in large distributed enterprise environments

    Strong knowledge of networking fundamentals including TCP/IP, firewalls, and IDS/IPS concepts

    Working knowledge of Windows desktop and server security best practices

    Experience interpreting endpoint, identity, and infrastructure logs during investigations

    Experience with vulnerability scanning platforms such as Nessus or Qualys

    Experience supporting Azure security monitoring and remediation activities

    Ability to assess vulnerability severity and recommend remediation actions

    Strong written and verbal communication skills with both technical and non-technical stakeholders

    Preferred Qualifications

    Experience with Microsoft Sentinel, Splunk, or QRadar

    Experience with Microsoft Defender, CrowdStrike, or comparable EDR platforms

    Familiarity with penetration testing tools such as Nmap, Burp Suite, or Metasploit

    Exposure to hybrid Active Directory identity security environments

    Experience supporting Zero Trust identity or access control initiatives

    Familiarity with security frameworks including NIST CSF, ISO 27001, or CIS Controls

    Linux security experience (nice to have)

    CISSP or equivalent certification preferred

    Ideal Candidate Profile

    Successful candidates will combine hands-on security monitoring experience with vulnerability remediation coordination, identity protection knowledge, and the ability to support governance initiatives within a modern enterprise security program. The role is well suited for analysts comfortable operating across SIEM workflows, Azure-connected infrastructure, endpoint telemetry, and cross-team security initiatives.