Overview
Skills
Job Details
IT Security Analyst - Long-Term Contract-to-Hire - Houston, TX (Onsite)
Location: Houston, TX (Onsite, right where the action happens)
Duration: Long-Term/Ongoing
Employment Type: Contract-to-Hire
About the Role
Are you the kind of security professional who thrives on staying one step ahead of attackers? iSphere is looking for an IT Security Analyst ready to take on a high-impact role at one of our top Houston clients. This is more than just monitoring dashboards and ticking boxes this is about proactive defense, creative problem-solving, and turning security incidents into opportunities for continuous improvement.
From vulnerability assessments to incident response, you ll use your skills to protect enterprise environments and contribute to a security-first culture. If you re passionate about IT security, love investigating suspicious activity, and want a role where every day brings something new, you re exactly who we want on our team.
What You ll Own
-
Security Operations: Monitor, analyze, and act on security events with precision, using SIEM platforms and EDR solutions like Microsoft Defender XDR and SentinelOne
-
Incident Response: Triage, investigate, contain, and resolve security incidents; apply forensic fundamentals to gather and preserve evidence when needed
-
Vulnerability Management: Run vulnerability scans with tools like Rapid7, interpret reports, prioritize findings, and guide remediation
-
Network & Endpoint Security: Understand and manage firewalls, ACLs, and endpoint defenses, ensuring every layer of the environment is covered
-
Darktrace Mastery: Dive deep into Darktrace s AI-driven network detection, tune rules, interpret AI Analyst findings, and leverage autonomous response features
-
Threat Hunting & Intelligence: Proactively search for threats hiding under the radar, and enrich investigations with the latest threat intel
-
Cloud & Identity Security: Support secure cloud operations in Azure; manage IAM controls with tools like Okta, Azure AD, MFA, and PAM
-
Automation: Use scripting (Python, PowerShell, Bash) to streamline tasks, parse logs, or build custom tools that keep you ahead of the curve
-
Documentation & Communication: Clearly document incidents and investigations; communicate findings with both technical teams and non-technical stakeholders
What You Bring to the Table
-
Technical Foundations:
-
Deep networking knowledge (TCP/IP, DNS, VPNs, OSI model)
-
Expertise in Windows security (event logs, policies) with Linux skills as a plus
-
Practical experience configuring and securing firewalls and network devices
-
A rock-solid understanding of cybersecurity principles, attack vectors, and frameworks like NIST, ISO 27001, or MITRE ATT&CK
-
Familiarity with cloud security best practices, especially in Azure environments
-
Conceptual understanding of AI s role in cybersecurity
-
-
Hands-On Experience:
-
Advanced SIEM log analysis and correlation
-
End-to-end incident detection and response lifecycle
-
Vulnerability assessment using Rapid7 or similar tools
-
Digital forensics basics (file systems, memory analysis, data recovery)
-
Direct experience with Darktrace AI-powered tools
-
Exposure to penetration testing techniques
-
Proficiency with EDR tools for investigation and remediation
-
-
Soft Skills that Make You Stand Out:
-
Critical thinking and composure when solving complex problems under pressure
-
Strong, clear communication with both technical and non-technical teams
-
Attention to detail catching subtle anomalies others might miss
-
Effective time management in a high-alert environment
-
Eagerness to keep learning and adapting in a rapidly evolving field
-
Team player mindset knowing security isn t a solo mission
-
-
Education & Certifications (Preferred but not required):
-
Bachelor s degree in Computer Science, Cybersecurity, or related field
-
Certifications such as CompTIA Security+, CySA+, or equivalents
-
Why You ll Love Working with iSphere
Because we believe cybersecurity should be challenging, rewarding, and even a little fun. You ll join a team that values initiative, curiosity, and collaboration and you ll get the support you need to keep growing your skills while protecting what matters.
If you re ready to bring your passion for cybersecurity to a role where you ll truly make an impact, let s start the conversation.