Description
network monitoring
incident response
log management
threat hunting
patch validation
security configs
The company is seeking a Security Analyst to handle daily IT security tasks and routine processes. The role involves assessing security incidents, applying technical troubleshooting, monitoring suspicious or malicious activity across the IT infrastructure, and addressing security risks and incidents.
- Monitor network traffic and alerts for compromise, malicious behavior, lateral movement, or anomalies.
- Investigate and respond to network‑based security incidents across firewalls, routers, switches, wireless and cloud environments.
- Support detection, mitigation coordination, and response to DDoS attacks.
- Maintain and improve network security configurations (ACLs, VLAN segmentation, VPN policies, IPS/IDS signatures).
- Manage and review logs from SIEM, IDS/IPS, NetFlow analyzers, and EDR/XDR platforms.
- Oversee email security, detect phishing, and analyze email headers (DMARC/DKIM/SPF knowledge a plus).
- Administer content‑filtering platform and assess risk of websites/URLs.
- Partner with Networking and IT Operations to troubleshoot connectivity, authentication, or routing issues affecting security.
- Ensure DNS security hygiene, including record integrity and protection against DNS attacks.
- Work with load‑balancing/DNS traffic‑management technologies (e.g., F5) to secure traffic distribution.
- Support Active Directory and ADFS security, including authentication flows, privileged access, and hardening.
- Conduct identity‑related investigations and resolve authentication anomalies.
- Analyze security advisories, CVEs, and vendor bulletins for network and infrastructure components.
- Validate and verify patch deployment across network appliances and security tools, coordinating with SCCM and infrastructure teams.
- Perform network‑centric forensic investigations, including packet captures, log correlation, and threat hunting.
- Document incident findings and collaborate to close security gaps.
- Contribute to network‑security projects, firewall changes, secure architecture designs, and segmentation initiatives.
- Participate in weekly on‑call rotation and respond to after‑hours incidents.
- Mentor Security Administrators and junior team members.
- Support IT operational emergencies impacting business‑critical systems.
Requirements
siem
edr
active directory
vpn
bachelors
incident response
Candidates should have a high school diploma or GED, 1–4 years of experience in IT or network security, and an understanding of network architectures, protocols, and traffic analysis. Required skills include experience with security operations, incident response, forensic analysis, DNS, Active Directory, routing/switching, authentication services, and security monitoring platforms such as SIEM, IDS/IPS, EDR, and NetFlow. Strong communication, documentation, collaboration, and customer‑service abilities are also essential.
Preferred qualifications include a bachelor’s degree in cybersecurity or a related field, experience with enterprise firewalls, VPNs, secure access solutions, and familiarity with DDoS concepts, threat‑hunting methodologies, and network‑security frameworks. Candidates should demonstrate strong attention to detail and the ability to manage multiple tasks simultaneously.
- Travel overnight as required.
Benefits
Join a Fortune 500 company that is growing rapidly and values enthusiastic, team‑oriented individuals. D.R. Horton offers an extensive benefits package and the opportunity to build a future with America’s builder.
- Medical, dental, and vision insurance.
- 401(k) retirement plan.
- Employee Stock Purchase Plan.
- Flexible Spending Accounts.
- Life and disability insurance.
- Paid vacation, sick, personal time, and company holidays.
- Multiple voluntary and company‑provided benefits.
Training + Development
Information not given or found