Contract to Hire - Sr Security Analyst

Agile Global Solutions, Inc.

Arlington, TX

JOB DETAILS
JOB TYPE
Full-time, Employee
SKILLS
Agile Programming Methodologies, Analysis Skills, Architectural Services, Authentication, Best Practices, Cloud Computing, Computer Hacking, Computer Security, Consulting, Content Filtering Software, Cross-Functional, Customer Support/Service, DNS (Domain Name System), Denial of Service (DoS), Detail Oriented, Documentation, Endpoint Security, F5 Network Software, Firewall Administration, Firewalls, Forensic Science, Go Programming Language (Golang), High Tech Industry, Hunting, Identify Issues, Incident Management, Incident Response, Information Technology & Information Systems, Internet Security, Intrusion Detection Systems, Intrusion Prevention Systems, Load Balancing, Microsoft Active Directory, Microsoft Windows Azure, Netflow, Network Administration/Management, Network Security, Operational Support, Patient Assessment, Phishing, Project/Program Management, Research Skills, Risk, Risk Analysis, Root Cause Analysis, Security Analysis, Security Attacks, Security Information and Event Management (SIEM), Security Infrastructure, Security Monitoring, Software Patches, System Center Configuration Manager (SCCM), Team Player, Technical Recruiting, VPN (Virtual Private Network)
LOCATION
Arlington, TX
POSTED
Today
(Only independent visa can apply for this position)

Position: Sr Security Analyst

Location: Arlington, TX (Onsite)

Duration: Contract (2-3 months Contract)

 

Job Description:

Top Must Have:

Driver, go-getter

  • Demonstrated enterprise experience with:

o Ping Identity

o Microsoft Active Directory

o Quest Active Roles

o Microsoft Entra ID (Azure AD)

o Enterprise Multi-Factor Authentication (MFA) solutions

Strong experience with Privileged Access Management (PAM) concepts and controls

 

Essential Duties and Responsibilities include the following. Other duties may be
assigned.

  • Security Operations & Monitoring
    o Monitor security alerts, logs, and telemetry for indicators of compromise,
    malicious behavior, anomalous activity, or policy violations.
    o Lead investigation and response to security incidents involving endpoints,
    servers, network infrastructure, identity platforms, and cloud services.
    o Perform incident triage, containment, remediation coordination, and post-
    incident analysis.
    o Manage, tune, and improve security monitoring tools, including SIEM,
    IDS/IPS, EDR/XDR, NetFlow analyzers, and log aggregation platforms.
    o Analyze phishing attempts and suspicious email activity, including header
    analysis and email flow troubleshooting.
    o Maintain and review web and content filtering platforms, assessing risk
    related to URLs, domains, and external services.

    · Network & Infrastructure Security
    o Partner with Networking and IT Operations teams to troubleshoot and
    resolve security-related connectivity, routing, or authentication issues.
    o Maintain and improve secure configurations for firewalls, VPNs, load
    balancers, and cloud connectivity.
    o Support DDoS detection, mitigation coordination, and response activities.
    o Maintain DNS security hygiene, including name resolution integrity and
    protection against DNS-based attacks.
    o Support secure traffic distribution using load balancing or DNS traffic
    management technologies (e.g., F5 or similar platforms).

    · Identity & Access Security
    o Support Active Directory, Azure AD, ADFS, and related identity platforms
    from a security perspective.
    o Investigate authentication anomalies, account misuse, and privileged
    access issues.
    o Help enforce identity security best practices, including least privilege,
    access reviews, and monitoring.

  • Vulnerability & Patch Management
    o Analyze security advisories, CVEs, and vendor bulletins affecting
    infrastructure, operating systems, and enterprise applications.
    o Validate and track patch deployment across servers, endpoints, network
    devices, and security appliances.
    o Coordinate with infrastructure, endpoint, and SCCM teams to align
    patching with risk and business priorities.

    · Incident Response & Forensics
    o Perform security investigations using log analysis, endpoint data, and
    network evidence.
    o Conduct packet captures, log correlation, and threat hunting activities.
    o Identify root causes of security incidents and recommend long-term
    mitigation strategies.
    o Document findings, lessons learned, and corrective actions.

  • Project & Operational Support
    o Contribute to security-related projects, including tool deployments,
    upgrades, and architectural improvements.
    o Provide security guidance on infrastructure changes, firewall rules,
    segmentation, and system designs.
    o Partner with cross-functional teams to ensure secure deployment of new
    applications and services.
    o Assist with the development and improvement of security standards,
    procedures, and documentation.

    Qualifications

    Education and/or Experience

    · Minimum five years’ experience in an IT related field
    · Advanced knowledge of IT Security Operations and Forensic Operations
    · Advanced knowledge of IT Networking and Network Security Operations
    · Advanced knowledge of IT Infrastructure and Applications
    · Advanced knowledge of Cyber Attackers and Threat Actor tactics
    · Advanced experience of project management and delegation
    · Advanced business communication and collaboration skills 
    · Advanced Documentation skills
    · Ability to work with teammates on projects
    · Ability to work alone and accomplish tasks independently
    · Ability to interpret research into solutions to actual problems
    · Customer Service skills
    · Advanced Documentation skills
    · Experienced mentoring and training skills
    · Ability to apply common sense understanding to carry out instructions furnished
    in written oral form or via DRH applications
    · Proficiency with MS Office and email
    · Ability to sit for majority of 8-hour workday; use hands and fingers to handle or
    feel; reach with hands and arms; talk and hear. Specific vision abilities required
    by this job include close vision and peripheral vision
    · The noise level is generally moderate


Preferred Qualifications
· Bachelor’s Degree in Cyber Security discipline preferred
· Provide attention to detail and manage multiple responsibilities

 

Best Regards,

 

T Chandra Sekhar - Technical Sr. Recruiter

Agile Global Solutions, Inc ....."Empowering Enterprises"

193 Blue Ravine Road, Suite 160, Folsom, CA 95630

Direct - 916-413-7282

Sekhar@agileglobalsolutions.com | www.agileglobal.com

About the Company

A

Agile Global Solutions, Inc.