Houston, TX, United States
21 hours ago
Senior Cybersecurity Analyst

Waste Management (WM), a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed to a foundation of operating excellence, professionalism and financial strength.  WM serves nearly 25 million customers in residential, commercial, industrial and municipal markets throughout North America through a network of collection operations, transfer stations, landfills, recycling facilities and waste-based energy production projects.

 

To enable our business to expand our lead in a market increasingly enhanced by technology, Waste Management is undertaking a substantial technology transformation. We are seeking talented Information Technology professionals to join the Waste Management team who are motivated to help us transform the way we design, build and use technology. With your skills and experience, we look for you to combine your technical expertise with industry best practices in an effort to align information technology solutions with Waste Management business strategy.

 

I.  Job Summary
As a Senior Analyst on the Security Operations Team, you will play a critical role in safeguarding the enterprise by monitoring and analyzing security events generated from endpoint clients, servers, network infrastructure, and security devices. You will leverage advanced log and event management tools to triage and investigate potential security incidents, ensuring timely detection, analysis, and response to threats. Your expertise will help maintain situational awareness across the organization’s digital environment and support continuous improvement of incident response processes.

In this role, you will manage and optimize the use and function of our security stack, ensuring they operate effectively and provide full coverage across the enterprise. You will be responsible for validating the performance and effectiveness of technical security controls, identifying gaps, and driving improvements to strengthen our security posture. Collaboration with cross-functional teams, mentoring junior analysts, and contributing to the development of security policies and procedures are also key aspects of this position. 

 

II. Essential Duties and Responsibilities

To perform this job successfully, an individual must be able to perform each duty satisfactorily.  Other ancillary duties may be assigned. 

Approach telemetry and behavior analysis with healthy skepticism and a dash of paranoia, always assuming something might be amiss. Stay alert, question anomalies, and trust your instincts (and your logs) to uncover hidden threats before they escalate. Monitor, detect, and investigate security events across the enterprise using tools like Security Incident and Event Management (SIEM), Endpoint Detection & Response (EDR), and network security platforms to identify known and emerging cyber threats, ensuring timely and effective incident response. Manages security audit and intrusion detection system logs for system and network anomalies and provides higher level analysis. Partner with others to enhance detection content, improve monitoring coverage, and refine operational procedures—including runbooks, standards, and response workflows—to ensure consistent and effective threat management. Performs Level 2/3 support for computer system forensic investigations and supports fraud investigations. Provides higher level analysis, design and support for log collection of firewalls, routers, networks and operating systems. Communicates technical and event assessment results, evaluates engineering and integration initiatives and provides advanced technical support to assess security policies, standards and guidelines. Apply creative problem-solving and strong collaboration skills to work closely with IT operations and engineering teams, delivering clear and actionable remediation guidance that addresses root causes and strengthens the organization’s overall security posture. Reviews and recommends the installation, modification or replacement of hardware or software components. Identifies and addresses any configuration change(s) that impact event collection. Off hours support required due to the 24x7 nature of this team via a call tree/on-call schedule.

III.  Supervisory Responsibilities
May coach and mentor less-experienced analysts and act as team leader on systems projects.

 

IV.  Qualifications

The requirements listed below are representative of the qualifications necessary to perform the job. 

A.  Education and Experience

Education: Bachelor's degree (accredited) in Computer Science, MIS, Business Administration or similar area of study, or in lieu of degree, High School Diploma or GED (accredited) and 4 years or relevant work experience. Experience: Five years of relevant work experience (in addition to education requirement).

B.  Certificates, Licenses, Registrations or Other Requirements
Preferred certifications: 

Certified Information Systems Security Professional (CISSP) CompTIA Security+ or Cisco CyberOps Associate or related network security certification Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) CCNA, CCNP, CCSP, MSCE

C. Other Knowledge, Skills or Abilities Required

Advanced knowledge or skills in one or more of the following is required:

Exceptional communication skills—written, verbal, and active listening—to effectively convey complex technical information and ensure clarity and alignment in high-pressure or fast-paced security operations environments. Functional knowledge of modern cybersecurity technology including Identity Thread Detection & Response (ITDR), next generation firewalls, automation platforms and artificial intelligence solutions. Technical skills across a broad range of computing platforms and network protocols. Experience in several or more of the following technologies: Firewalls, Intrusion Prevention, Vulnerability Scanning, Data Loss Prevention, Email Security, Endpoint Security, DNS, Web Content Filtering, SIEM and certificates & encryption. Understanding and experience with IP address space management, subnetting, name resolution.
Familiarity with key security models and regulations such as Mitre ATT&CK, NIST CSF, SOX and PCI. Ability to support both internal and external audits. Experience in the areas of change control, problem management, incident management troubleshooting of security solutions. Ability to multi-task and work on multiple projects at one time. Fortune 500 or large enterprise experience Proficiency in investigative practices and procedures (forensics knowledge is a plus).

V.  Work Environment
Listed below are key points regarding environmental demands and work environment of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job.

Normal setting for this job is: office setting.
 
 

Benefits
At Waste Management, each eligible employee receives a competitive total compensation package including Medical, Dental, Vision, Life Insurance and Short Term Disability.  As well as a Stock Purchase Plan, Company match on 401K, and more!  Our employees also receive Paid Vacation, Holidays, and Personal Days.  Please note that benefits may vary by site.

 

If this sounds like the opportunity that you have been looking for, please click “Apply”.

Por favor confirme su dirección de correo electrónico: Send Email