Acara-posted 12 days ago
$35 - $35/Yr
Full-time • Mid Level
Onsite • San Antonio, TX
5,001-10,000 employees

Are you a Technical Writer looking to join one of the top companies in the Energy and Gas industry ? Are you looking to further your career and grow? Do you have experience in collecting data from a variety of cyber defense resources ? If you answered yes to those three questions, then apply today! Acara Solutions seeks highly qualified candidates to work onsite with our client in San Antonio, TX . Interested? Here's what you'd do: As a technical writer focused on Cyber and Physical Security, you will analyze, review, and research current business practices and industry benchmarks to create easily accessible internal policies, procedures, and assorted documentation for the client's Integrated Security Department. Duties include coordinating and collaborating with internal and external organizations and subject matter experts, analyzing information needed for developing and updating security-related policies/procedures, providing technical editing services, and promoting knowledge sharing within Integrated Security. Develop clear, concise, and accurate security documentation for a variety of audiences (technical and non-technical). This includes user manuals, configuration guides, security policies, training materials, white papers, and blog posts. Collaborate with security engineers and other technical specialists to gather subject matter expertise. Ensure technical accuracy and adherence to security best practices. Maintain and update existing security documentation. Develop and implement a content management strategy for security information and data. Create user-friendly documentation that is clear, concise, and easy to understand and navigate. Understand the organization's security posture and compliance requirements. Work effectively with internal stakeholders (engineers, security analysts, managers) to gather information and ensure content accuracy.

  • Analyze, review, and research current business practices and industry benchmarks to create easily accessible internal policies, procedures, and assorted documentation for the client's Integrated Security Department.
  • Coordinate and collaborate with internal and external organizations and subject matter experts
  • Analyze information needed for developing and updating security-related policies/procedures
  • Provide technical editing services
  • Promote knowledge sharing within Integrated Security
  • Develop clear, concise, and accurate security documentation for a variety of audiences (technical and non-technical). This includes user manuals, configuration guides, security policies, training materials, white papers, and blog posts.
  • Collaborate with security engineers and other technical specialists to gather subject matter expertise.
  • Ensure technical accuracy and adherence to security best practices.
  • Maintain and update existing security documentation.
  • Develop and implement a content management strategy for security information and data.
  • Create user-friendly documentation that is clear, concise, and easy to understand and navigate.
  • Understand the organization's security posture and compliance requirements.
  • Work effectively with internal stakeholders (engineers, security analysts, managers) to gather information and ensure content accuracy.
  • High School Diploma or GED.
  • Minimum 2 years of experience in collecting data from a variety of cyber defense resources.
  • Minimum 2 years of experience in using security event correlation tools (SIEM (Security Information and Event Management)).
  • Minimum 2 years of experience in Microsoft Office Suite.
  • Bachelor's Degree in Business Administration or Information Systems or Information Technology or Information Technology Security or Computer Science.
  • Possess excellent communication skills to explain complex security concepts clearly and concisely.
  • The candidate is actively pursuing the completion of a degree listed above and self-studying to obtain at least one certification listed below.
  • Knowledge of information technology security principles and methods.
  • Knowledge of vulnerability information dissemination sources (alerts, advisories, bulletins).
  • Knowledge of key concepts in security management (vulnerability management, patch management, incident response).
  • Skill in recognizing and categorizing various types of vulnerabilities and associated attacks.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in information systems.
  • Ability to apply techniques for detecting host and network-based intrusions using various detection technologies.
  • Ability to interpret the information collected by network tools.
  • Cyber and Physical Security experience.
  • Experience in Operations Centers.
  • Experience with software documentation.
  • Attention to detail.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service