IT Security Analyst Law Enforcement & Security - Irving, TX at Geebo

IT Security Analyst

Established, Entrepreneurial, Empowered Explore the Opportunities!

Security Analyst

Thank you for exploring a career with NCH Corporation, an international company where we work in small teams that have a direct impact on success.
We re looking for someone to join the Global Corporate Services (GCS) Information Technology team as a Security Analyst.
The Security Analyst s role will play a vital role in keeping our organization s proprietary and sensitive information secure.
The Analyst works inter-departmentally to identify and correct flaws in the company s security systems, solutions, and programs while recommending specific measures that can improve the company s overall security posture.
If you re seeking wide-range, in-depth experience in a personable, stable yet thriving environment, our Security Analyst could be a match for you!

A little about us

Applying for a new job is a little like entering uncharted territory.
We want you to feel 100% confident about the application process, the position and our company before committing your time to apply, so that none of the above comes as a surprise.
Let s start with some information about NCH so you can get to know us better.

NCH Corporation is a privately held, family-owned, global business headquartered Irving, Texas, near Dallas.
We have more than 7,500 employees, offices and facilities on six continents, and clients in more than 50 countries.
This includes our corporate headquarters as well as subsidiary companies.
We clean and conserve water, save energy, and deliver best-in-class maintenance solutions, with a focus on industrial and commercial businesses.

  • About NCH and our history
  • Our products and solutions
  • NCH brands and divisions

Culture and benefits

We re a global company with a family feel, offering the same benefits of an international corporation with the personal relationships of a small business.
Working in our small teams and close-knit environment, you d never guess we had a 7,500
employee head count.
We realize a job is more than just a job it s an extension of your life and family and we re committed to maintaining just that.
For us, culture is not just a perk; it s essential to how we thrive.
And that s speaking for 100 years in the business!

  • Employee-centric environment (regular corporate activities, personal relationships, small teams)
  • Family-first attitude (paid parental leave, work-life balance support, flexible hours)
  • Approachable leadership (collaboration with top leaders, open-door policy)
  • Growth-oriented mindset (autonomy, creative freedom to explore new ideas)
  • Paid vacation and holiday leave
  • Wellness initiatives (on-site fitness facility and cafeteria, walking trail)
  • Community involvement (volunteering, fundraisers, charity events, school sponsorships and donations)
  • Employee recognition programs (appreciation week, awards and ceremonies)
  • Personal and professional development and growth
  • Tuition reimbursement
  • Financial wellness (retirement options, 401(k) match)
  • Benefits package (medical, dental, vision, life, long and short-term disability)

If this sounds like a fit for you so far, keep reading.

A little about you

  • College diploma or university degree in the field of computer science and/or 3 years equivalent work experience.
  • Certifications in Cisco security products and privacy certification such as CIPP, CIPM, or CIPT
  • Knowledge of PERL, Python, Powershell, or other shell scripting language
  • Familiarity with database construction and analysis.
  • Extensive hands-on technical knowledge of network systems, protocols, and standards such as Ethernet, LAN, WAN, MPLS, VPN, xDSL, TCP/IP, 802.
    11x, and so on.
  • Strong knowledge of network management and analysis tools, including Solarwinds, PRTG, Meraki dashboard, nmap, wireshark, etc.
  • Experience working in a switched and routed environment.
  • Hardware, software, and network connection troubleshooting experience.
  • Working technical knowledge of current network hardware, including Cisco FirePower 4000 s/2500, ISR 4000s, Catalyst 6800/6500/9400/9300/3850/2960, Meraki MX/MS/MR/Camera, and Motorola VX9000 and associated access points.
  • Skilled at installing/configuring firewall, switches, routers, access points, etc.
  • Knowledge of Next Gen firewalls, intrusion detection systems, and other network security measures.
  • Knowledge of applicable data privacy practices and laws.
  • Familiarity with the general concepts surrounding cyber security, NIST, CMMC, data privacy and data protection
  • Strong written and oral communication skills.
  • Excellent project management and planning skills
  • Strong interpersonal skills.
  • Be available for a rotating weekly on-call schedule
  • 10% travel (COVID permitting)

Day-to-Day Work Examples

We support growth, opportunity and variety, which means your day-to-day has the potential to adapt with you and your passions.
If you re not challenged and growing, neither are we.
For starters, though, here are some day-to-day examples of what you will be doing:

  • Conduct periodic network monitoring and intrusion detection analysis to determine if there have been any attacks on the system.
    Analyze network traffic to identify anomalies, and test the information security controls for weaknesses.
  • Respond to security threats by taking mitigating actions to contain the activity and minimize damage.
    Also facilitate forensics analysis to determine the source of the threat.
  • Design and implement new safeguards to protect computer systems.
    Work with other IT teams to implement the new safeguards, whether it is in the form of software, hardware, or new operating procedures.
  • Collaborate with stakeholders at all levels of the organization to communicate the state of information security, inform of possible risks, and suggest ways to improve security.
  • Be informed of emerging threats and vulnerabilities in IT security.
    Conduct research, and attend conferences, professional association meetings and technical symposia to gain awareness of the latest information security technological developments.
  • Understanding of current threats and trends in Information Security
  • Develop and implement new security systems, security programs, protocols and maintenance of existing systems
  • Knowledge of information security solutions, including data loss prevention, intrusion detection and prevention, network security monitoring and vulnerability management
  • Coordinate social engineering tests
  • Conduct security scans
  • Support for incident response
  • Establish connectivity and uptime service level agreements.
  • In-depth knowledge of data communications and network experience of operating systems and tools
  • Ensure the stable operation and efficient performance of company networks.
  • Monitor system capacity to determine its affect on performance and recommend enhancements to meet new or changing network demands.
  • Create project plans and recommendations for security build-outs used for budgeting of global security projects.
  • Interact, negotiate with vendors and/or contractors to implement security products and services.
  • Develop and implement policies, procedures, and associated training for security administration, appropriate use, and reporting.
  • Other IT duties as assigned

Sound like a fit for you?

If yes, jump aboard, and apply today.

For next steps, expect a direct phone or email response once we are able to review your application.
We are committed to responding to all applicants, no matter the outcome, so we appreciate your patience to allow time for this.
In the meantime, learn more about NCH and our culture by checking out our
LinkedIn or Facebook pages.

We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state or local protected class.

.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.