JOB DETAILS

Information Security Analyst - Sugar Land East Lawn or Lubbock

CompanyPROSPERITY BANK
LocationLubbock
Work ModeOn Site
PostedApril 20, 2026
About The Company
At Prosperity Bank, we believe in a community banking philosophy where personal relationships and great experiences go hand-in-hand. We provide convenient technology options that our customers expect – all backed by the highest level of security. At every touch point, you’ll find knowledgeable associates ready to serve our customers with accuracy and a smile time and time again. Prosperity provides personal banking services and investments to consumers and small to medium sized businesses throughout Texas and Oklahoma. Founded in 1983, Prosperity ranks among the top 100 U.S. banks in assets. Member FDIC. Equal Housing Lender.
About the Role
External Applicants: Please apply through Prosperity Bank's Career Center at https://www.prosperitybankusa.com/Careers. Applying through any other source may prevent Prosperity from receiving your application. 

Internal Applicants: If you are a current associate of Prosperity Bank, please apply through the internal Talent - Career Center in ADP. Prosperity Bank is an Equal Opportunity Employer.

 

POSITION PURPOSE

 

The Information Security Analyst serves as a member of the Security Operations Center (SOC), playing a key role in protecting the Bank’s information infrastructure and data. Working under the guidance of senior security team members, the Information Security Analyst monitors and identifies potential or active threats and performs security investigations to effectively contain and resolve cybersecurity incidents. 


ESSENTIAL FUNCTIONS AND BASIC DUTIES

 

  1. Monitor security events and alerts across a variety of platforms (e.g., SIEM tools, intrusion detection systems, etc.).
  2. Effectively identify and triage security incidents through determining the scope, severity, and potential impact.
  3. Respond to security incidents promptly, coordinating with the incident response team to rapidly contain and mitigate threats.
  4. Maintain consistent documentation of security incidents and actions taken to ensure transparency and compliance.
  5. Produce incident response post-mortem analysis reports, including technical summaries of attackers’ tactics and techniques, impacts, root-cause, and other relevant incident findings.
  6. Provide regular updates to appropriate constituencies on security posture, ongoing incidents, and potential exposures.
  7. Identify the utility of digital evidence, correlate data, and perform analysis of logs to identify potential vulnerabilities, threats, intrusions, and incidents.
  8. Create and implement threat detection techniques and create alerting rules to enhance detective controls.
  9. Identify and assess risk introduced by technical and operational vulnerabilities using automated tools and manual techniques.
  10. Collaborate with cross-functional teams to support effective remediation strategies for identified vulnerabilities.
  11. Maintain awareness of emerging threats, attack vectors, and vulnerabilities to enhance incident detection and prevention strategies.
  12. Collect, analyze, and share threat intelligence relevant to the organization’s security posture with appropriate personnel.
  13. Maintain effective communication with internal and external stakeholders to ensure timely and accurate security incident awareness.
  14. Participate in security meetings and contribute to the development of incident response policies, procedures, and best practices.
  15. Work outside of regular business hours when necessary.
  16. Other duties as assigned.

 

 

 

The above statements describe the general nature and level of work only. They are not an exhaustive list of all required responsibilities, duties, and skills. Other duties may be added, or this job description amended at any time

 

SUPERVISORY RESPONSIBILITIES:

 

This position has no supervisory role.

 

QUALIFICATIONS

Education/Certification: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related discipline; or the equivalent of combined education and relevant work experience. Advanced degrees in cybersecurity can substitute work experience on a year-for-year basis.


Professional certifications through ISC(2), ISACA, GIAC, OffSec or CompTIA are preferred.


Experience Required: Minimum of 1 year of experience in an information security or information technology role with responsibilities in one or more of the following domains: security and risk management, asset security, security architecture and engineering, communications and network security, identity and access management, security assessment and testing, security operations, and software development security. Direct experience in security operations, cyber defense, or incident management is preferred.


Demonstrated ability to successfully execute initiatives in complex and highly regulated environments.


Banking or financial services industry experience is a plus.

 

Required Knowledge: General understanding of network communications and computer networking principles, including network addressing, configurations, digital communication systems, and associated protocols and endpoints, to ensure secure network environments.


 General understanding of client/server architecture, operating systems and software, encryption algorithms (including their capabilities and applications), and authentication/authorization tools and techniques.


Strong understanding of cybersecurity principles and practices—including data integrity, operations security (OPSEC), network security, access control, data encryption, adversarial tactics, and threat remediation.


Strong understanding of the characteristics of cybersecurity threats, vulnerabilities, and threat characteristics—including system and network attack vectors, malware, filename extension abuse, and web application security risks.


Familiar with adversarial tactics, cyber-attack and exploitation tools and techniques (including network exploitation), data exfiltration methods, and insider attack patterns to effectively anticipate, detect, and counter malicious activities.


General understanding of analytical, data analysis, and information searching tools and techniques, along with working proficiency in security information and event management (SIEM) and event correlation methods to accurately detect, analyze, and respond to security incidents. 

 

Skills/Abilities: Proficient in navigating a fast-paced, highly regulated environments by applying critical thinking, establishing priorities, and tailoring complex information for diverse audiences. 


Competencies in mitigating cognitive biases, extrapolating from incomplete data sets, and performing comprehensive data analyses to derive actionable insights. 


Capable of recognizing and categorizing vulnerabilities, identifying malware threats, and effectively containing malware to protect systems and data.  
 
 Proficient in effectively communicating, collaborating, and building strong relationships with internal and external stakeholders to achieve organizational objectives.
 
 Capable of leveraging a range of analytical techniques—including data, log file, behavioral, and threat analysis.
 
 Capable of anticipating threats, leading incident response processes, and recognizing behavioral patterns to detect and mitigate potential security risks.  
 
 Capable of collecting and performing network traffic and packet-level analysis to identify network threats, protect against malware, and conduct intrusion data analysis.  
 
 Capable of detecting host- and network-based intrusions, identifying insider threats, recognizing recurring threat incidents, uncovering filename extension abuse, spotting anomalous activity, and interpreting digital forensics data to maintain a robust security posture.  
 
 Capable of gathering and querying data from diverse sources—including open-source and metadata extraction—correlating information across multiple tools and conducting thorough research. 
 

PHYSICAL ACTIVITIES AND REQUIREMENTS OF THIS POSITION

Talking: Especially where one must frequently convey detailed or important instructions or 

ideas accurately, loudly, or quickly.

 

Average Hearing: Able to hear average or normal conversations and receive ordinary information.

 

Repetitive Motion: Movements frequently and regularly required using the wrists, hands, and/or

 fingers.

 

Average Visual Abilities: Average, ordinary, visual acuity necessary to prepare or inspect documents or 

products, or operate machinery.

 

Physical Strength: Sedentary work; sitting most of the time. Exerts up to 10 lbs. of force occasionally.

(Almost all office jobs.)

 

WORKING CONDITIONS

None: No hazardous or significantly unpleasant conditions (such as in a typical office).


MENTAL ACTIVITIES AND REQUIREMENTS OF THIS POSITION

Reasoning Ability: Ability to apply logical or scientific thinking to define problems, collect data

establish facts and draw conclusions.

 Able to interpret a variety of technical instructions and deal with multiple 

 variables.


Mathematics Ability: Understanding of concepts such as probability, statistics, and basic algebra.


Language Ability: Ability to read periodicals, journals, manuals, dictionaries, thesauruses, and 

encyclopedias. 

 Ability to prepare business letters, proposals, summaries, and reports using 

 prescribed format and conforming to all rules of punctuation, grammar, diction, and 

 style.

 Ability to conduct training, communicates at panel discussions, and make 

 professional presentations.



Monday - Friday: 8:00AM - 5:00PM
40 hours
Key Skills
Security Operations CenterIncident ResponseThreat DetectionVulnerability AssessmentNetwork SecuritySIEMLog AnalysisCybersecurity PrinciplesData AnalysisRisk ManagementIntrusion DetectionMalware AnalysisAuthentication ToolsEncryptionThreat IntelligenceCritical Thinking
Categories
Security & SafetyTechnologyFinance & AccountingData & Analytics
Job Information
📋Core Responsibilities
The Information Security Analyst monitors security events and identifies potential threats within the Security Operations Center. They are responsible for triaging incidents, performing post-mortem analysis, and implementing threat detection techniques to protect the bank's infrastructure.
📋Job Type
full time
📊Experience Level
0-2
💼Company Size
2565
📊Visa Sponsorship
No
💼Language
English
🏢Working Hours
40 hours
Apply Now →

You'll be redirected to
the company's application page