"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Security Analyst

    Aspira Connect (Dallas, TX)



    Apply Now

    Security Analyst Aspira | IT Operations About Aspira

     

    For more than 40 years, Aspira has been the market-leading provider of software and services that help public agencies protect natural and cultural resources while making them accessible for all. Our platform supports everything from campground reservations to hunting licenses, helping millions of people discover, enjoy, and care for the outdoors.

     

    We share our client partners’ mission: to steward resources for future generations, create opportunities for genuine enjoyment of the outdoors today, and expand access so more people can experience its benefits.

     

    Aspira is transforming its technology and service model to give agencies more capacity and insight—streamlined tools, smarter automation, and better connections with their communities. Our goal is simple: make it easier for our clients to conserve what matters most and for their customers to enjoy it to the fullest.

    The Ideal Candidate

    The Security Analyst is a proactive, detail-oriented professional with strong hands-on experience in cloud security monitoring, incident response, and log analysis. This individual will leverage Aspira’s AWS-native tools and industry SIEM platforms to detect, analyze, and respond to threats while continuously improving security controls. The ideal candidate thrives in fast-paced environments, is curious and analytical, and collaborates closely with IT, DevOps, and Network Engineering teams.

    Key Responsibilities

    Monitoring & Threat Detection

     

    + Monitor and correlate events across AWS CloudWatch, CloudTrail, GuardDuty, and Security Hub.

    + Configure and maintain Rapid7, LogRhythm, and related monitoring tools for ingestion of logs from servers, PCs, and laptops.

    + Develop detection rules, alerts, and dashboards for real-time visibility into threats and anomalies.

    + Conduct continuous log analysis, identifying suspicious activity, compromised accounts, or policy violations.

    + Monitor logs and events across AWS and on-premises environments (Dallas and China offices), ensuring consistent visibility into threats.

     

    Incident Response & Investigation

     

    + Perform Tier 1/Tier 2 triage of alerts and escalate to senior security/engineering staff as appropriate.

    + Support incident response exercises, playbook development, and forensic analysis.

    + Lead investigations of security events: review indicators of compromise, assess impact, and recommend containment/remediation actions.

    + Collaborate with IT Operations, Network Engineering, and DevOps to remediate vulnerabilities and harden systems.

    + Escalate incidents and findings to the Senior Cloud Network Engineer or Senior Security System & Network Engineer as appropriate, with oversight from the Director of Information Security.

     

    Compliance & Governance

     

    + Support compliance initiatives (PCI, SOC, NIST, CIS) by maintaining monitoring evidence, documenting incidents, and assisting with audit requests under the guidance of the Director of Information Security.

    + Document incidents, vulnerabilities, and remediation efforts for audit and reporting purposes.

    + Assist in the rollout and implementation of zero-trust controls (MFA, IAM policies, endpoint protection) as directed by the Director of Information Security.”

     

    Automation & Continuous Improvement

     

    + Create and maintain scripts and automation (Python, PowerShell, Terraform) for log ingestion, enrichment, and reporting.

    + Develop runbooks for common security incidents and monitoring alerts.

    + Recommend enhancements to SIEM rules, AWS GuardDuty findings, and log retention strategies.

    + Identify and implement emerging security best practices to keep pace with evolving threats.

    + Contribute to security KPIs, including SIEM coverage across assets, incident response times, and patch/vulnerability remediation metrics, by providing accurate monitoring and escalation

    Qualifications

    + 5+ years of experience in Security Operations, Threat Monitoring, or Incident Response.

    + Strong familiarity with AWS-native security/monitoring tools (CloudWatch, CloudTrail, Security Hub, GuardDuty).

    + Hands-on experience with SIEM platforms, preferably Rapid7 InsightIDR, LogRhythm, or Splunk.

    + Knowledge of security frameworks (NIST 800-53, CIS Benchmarks, PCI DSS).

    + Understanding of networking (TCP/IP, firewalls, VPNs) and operating system hardening (Windows, Linux).

    + Strong analytical skills with experience conducting log analysis, packet captures, and event correlation.

    + Practical scripting/automation knowledge (Python, PowerShell, Bash).

    + Relevant certifications a plus (CompTIA Security+, GSEC, AWS Security Specialty, CEH, or similar).

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • Security Analyst
    Aspira Connect (Dallas, TX)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org