Find The RightJob.
Title: Information Security Analyst 2
Location: Irving, TX
Alternative Location: West Des Moines, IA, Minneapolis, MN, Chandler, AZ
Duration: 104 W, 2 D
Work Engagement: W2
Work Schedule: Hybrid 3 days in office/2 days remote
Benefits on offer for this contract position: Health Insurance, Life insurance, 401K and Voluntary Benefits
Summary:
In this contingent resource assignment, you may: Participate in low to moderately complex initiatives and identify opportunity for process improvements within Information Security Analysis. Review and analyze basic or tactical Information Security Analysis assignments or challenges that require research, evaluation, and selection of alternatives, related to low-to-medium risk deliverables. Present recommendations for resolving low to moderately complex situations and exercise some independent judgment while developing understanding of function, policies, procedures, and compliance requirements. Provide information to client personnel in Information Security Analysis. Required Qualifications: Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education.
Key Responsibilities:
Key Requirements:
Applicants must be authorized to work for ANY employer in the U.S. This position is not eligible for visa sponsorship.
Identity & Access Management (IAM) Operations, or Mainframe security, or Access provisioning in a technical environment
Technical background required
Must be comfortable using command-line interfaces
Not suitable for non-technical or paperwork-only IAM/GRC profiles
Hands-on experience with RACF preferred
Experience with Top Secret (TSS) or ACF2 is acceptable and transferable
General mainframe exposure is valuable
COBOL developers or others with mainframe experience may qualify
No need for COBOL or application coding—security commands only
Ability to manage:
User IDs, groups, and security profiles
Dataset, general resource, and system-level access controls
Perform user provisioning, deprovisioning, and access changes
Joiner / Mover / Leaver lifecycle
Process BAU access requests (12–15 tickets per day; ~300–400/month)
Support: Access approvals, Password resets, and Remediation and entitlement fixes
Enforce least privilege and segregation of duties (SoD)
© 2026 Qureos. All rights reserved.