Job Description
Information Security Analyst
Remote (Texas Preferred)
Contract-to-Hire (3 months)
Information Security Analyst
Location: Dallas, TX (Hybrid: 3 days onsite / 2 days remote) or Remote (DFW-based)
Schedule: Core business hours 8:00 AM – 5:00 PM CST
Conversion: Contract-to-hire (90 days)
Travel: Limited travel after conversion
Work Authorization: U.S. citizenship required (no sponsorship available)
Position Overview
The Information Security Analyst is responsible for protecting the confidentiality, integrity, and availability of Rexel Group IT systems, infrastructure, and enterprise data assets. This role combines hands-on security monitoring and incident investigation with vulnerability remediation, identity security, and governance support across a distributed enterprise environment.
The analyst will work closely with IT teams, business stakeholders, and the Information Security leadership team to investigate threats, strengthen security posture, implement controls, and support enterprise risk management initiatives aligned with CISO priorities.
Primary Responsibilities
Security Monitoring and Incident Response
Monitor security alerts and indicators across SIEM, EDR, identity, and infrastructure platforms
Review and triage alerts from tools such as Microsoft Sentinel, Splunk, QRadar, CrowdStrike, Microsoft Defender, and related log sources
Investigate phishing activity, malware infections, suspicious authentication events, data leakage risks, and internal/external network abuse
Distinguish true security incidents from false positives and escalate appropriately
Interpret endpoint, identity, and network telemetry to determine scope and severity of events
Document investigation findings and maintain incident resolution records
Threat Detection and Vulnerability Remediation
Detect, track, and support remediation of vulnerabilities across on-premises and Azure-based systems
Review vulnerability scanner output (e.g., Nessus, Qualys) and assess business impact and remediation priority
Partner with infrastructure teams to validate remediation actions and reduce exposure risk
Support interpretation of penetration test findings and translate results into actionable remediation steps
Enterprise Security Operations Support
Support security operations across a distributed enterprise environment with remote workforce and global partners
Collaborate with cross-functional IT teams to strengthen infrastructure security posture
Assist with implementation and validation of endpoint protection, email security, identity protection, and IDS/IPS controls
Interpret host and network logs to support investigations and detection workflows
Monitor emerging threats and recommend defensive improvements aligned with enterprise risk posture
Identity and Azure Security Controls
Support enforcement of authentication security standards including MFA and access control policies
Assist with Azure security monitoring and remediation workflows
Contribute to identity governance improvements across hybrid Active Directory environments
Validate implementation of security controls supporting Zero Trust architecture principles
Governance, Risk, and Compliance Support
Assist with enterprise system risk assessments
Document, audit, and validate security controls across infrastructure and applications
Support development of security and privacy standards aligned with NIST CSF, ISO 27001, and CIS Controls
Maintain accurate documentation of security technologies, diagrams, and procedures
Contribute to security program initiatives supporting Director of Information Security and CISO objectives
Security Program Collaboration
Serve as a subject matter contributor working with technical and business teams to strengthen security posture
Engage stakeholders to translate security requirements into practical implementation guidance
Champion security awareness using user-centered communication approaches
Support strategic planning initiatives related to enterprise cybersecurity maturity
Required Qualifications
Bachelor’s degree required
Minimum 5 years of IT experience
Minimum 3 years of direct information security experience
Hands-on experience with security monitoring and alert triage across SIEM and EDR platforms
Experience supporting security operations in large distributed enterprise environments
Strong knowledge of networking fundamentals including TCP/IP, firewalls, and IDS/IPS concepts
Working knowledge of Windows desktop and server security best practices
Experience interpreting endpoint, identity, and infrastructure logs during investigations
Experience with vulnerability scanning platforms such as Nessus or Qualys
Experience supporting Azure security monitoring and remediation activities
Ability to assess vulnerability severity and recommend remediation actions
Strong written and verbal communication skills with both technical and non-technical stakeholders
Preferred Qualifications
Experience with Microsoft Sentinel, Splunk, or QRadar
Experience with Microsoft Defender, CrowdStrike, or comparable EDR platforms
Familiarity with penetration testing tools such as Nmap, Burp Suite, or Metasploit
Exposure to hybrid Active Directory identity security environments
Experience supporting Zero Trust identity or access control initiatives
Familiarity with security frameworks including NIST CSF, ISO 27001, or CIS Controls
Linux security experience (nice to have)
CISSP or equivalent certification preferred
Ideal Candidate Profile
Successful candidates will combine hands-on security monitoring experience with vulnerability remediation coordination, identity protection knowledge, and the ability to support governance initiatives within a modern enterprise security program. The role is well suited for analysts comfortable operating across SIEM workflows, Azure-connected infrastructure, endpoint telemetry, and cross-team security initiatives.