Lead Risk Analyst (Houston, TX)

IronEdge Group, LTDHouston, TX
3d$88,000 - $95,000Onsite

About The Position

Protect. Lead. Make an Impact. Are you passionate about cybersecurity and ready to lead incident response efforts that truly matter? As a Lead Risk Analyst, you’ll be at the forefront of protecting client environments, leading security operations, and guiding a high-performing security team through complex incidents. This role is ideal for a hands-on security professional who thrives in fast-paced environments and enjoys mentoring others while driving meaningful security improvements. Job Description Lead and coordinate all phases of the incident response lifecycle, including preparation, detection, containment, eradication, recovery, and post-incident review. Conduct digital forensics, root cause analysis, and respond to security events originating from MDR/EDR tools, phishing reports, and firewall-related requests. Develop, maintain, and continuously improve incident response playbooks, procedures, and after-hours response plans to ensure effective handling of critical incidents. Oversee day-to-day operations of the Security Team by managing workflows, mentoring staff, and fostering a collaborative, high-performing environment. Provide training on incident response best practices, new technologies, and security tools, while delivering timely feedback and performance insights to department leadership. Ensure the proper operation of security monitoring tools and processes, adjusting configurations as needed. Maintain accurate documentation related to firewall configurations, procedures, and troubleshooting. Conduct compliance audits related to backups, vulnerability management, and security awareness training. Collaborate with internal teams, clients, and external partners, including vendors and law enforcement, during major incidents. Review client security postures, recommend improvements, and implement Zero Trust security measures for new client onboarding to strengthen overall security resilience.

Requirements

  • Bachelor’s degree in computer science.
  • Three years of experience in a SOC (Security Operations Center) or incident response role.
  • Certifications: CompTIA Security+ certification required
  • All positions require the successful completion of a criminal background check, and further background checks if the position involves access to sensitive information or secure facilities.
  • All positions require the successful completion of a criminal background check, and further background checks if the position involves access to sensitive information or secure facilities.
  • Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, and Open Arrest for any Criminal Offense, and Family Violence Convictions.

Nice To Haves

  • Certifications such as GIAC Certified Incident Handler (GCIH), Certified Incident Responder (CIR), or similar are highly preferred.
  • Proven experience in leading Security Teams with a strong understanding of cybersecurity applications, public cloud platforms, Microsoft 365, firewalls, SIEM systems, vulnerability management, and EDR tools.

Responsibilities

  • Lead and coordinate all phases of the incident response lifecycle, including preparation, detection, containment, eradication, recovery, and post-incident review.
  • Conduct digital forensics, root cause analysis, and respond to security events originating from MDR/EDR tools, phishing reports, and firewall-related requests.
  • Develop, maintain, and continuously improve incident response playbooks, procedures, and after-hours response plans to ensure effective handling of critical incidents.
  • Oversee day-to-day operations of the Security Team by managing workflows, mentoring staff, and fostering a collaborative, high-performing environment.
  • Provide training on incident response best practices, new technologies, and security tools, while delivering timely feedback and performance insights to department leadership.
  • Ensure the proper operation of security monitoring tools and processes, adjusting configurations as needed.
  • Maintain accurate documentation related to firewall configurations, procedures, and troubleshooting.
  • Conduct compliance audits related to backups, vulnerability management, and security awareness training.
  • Collaborate with internal teams, clients, and external partners, including vendors and law enforcement, during major incidents.
  • Review client security postures, recommend improvements, and implement Zero Trust security measures for new client onboarding to strengthen overall security resilience.

Benefits

  • IEG pays a portion of employee premiums for Medical, Dental, and Life Insurance
  • Vision Insurance
  • AD&D Insurance
  • Short-Term and Long-Term Disability Insurance
  • Flexible Spending Account and Health Savings Account
  • Flexible Time Off plus Holidays
  • Matching 401k
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service