Demo

Cybersecurity Analyst - Governance, Risk, and Compliance (GRC)

Sempra Infrastructure
Houston, TX Full Time
POSTED ON 2/26/2026 CLOSED ON 3/14/2026

What are the responsibilities and job description for the Cybersecurity Analyst - Governance, Risk, and Compliance (GRC) position at Sempra Infrastructure?

#25-72892

Houston, Texas, USA

Job Category

Information Technology

Full-Time/Part-Time

Full-time

Job Description

Duties and Responsibilities

  • Assists the development, design, logistics, and facilitation of internal and external IS and cybersecurity exercises by conducting analysis of existing systems performance.
  • Acts as the first line of defense against the compromise of all forms of sensitive data and delivers IS and cyber incident triage including identifying the specific vulnerability and making recommendations.
  • Protects the organization's data and systems from unauthorized access and ensures that security practices are up-to-date and effective.
  • Conducts vulnerability research activities, gathers information on new and emerging threats and vulnerabilities and provides day-to-day support, maintenance and troubleshooting of software and subsystems.
  • Understands system risks when modifying security systems and processes and takes appropriate precautions to avoid compliance violations.
  • Creates and maintains high quality documentation related to IT processes including flow charts and data flow diagrams.
  • Performs other duties as assigned.

Requirements

Required Qualifications

Education

  • Typically requires a 4 year degree in a relevant field, or equivalent combination of relevant education and experience.

Experience

  • Typically requires 2 years of related experience.

Knowledge, Skills and Abilities

  • Information Security Management - Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities.
  • Security assessment - Conducts threat modelling, vulnerability assessment and penetration testing to reveal vulnerabilities or lapses in the existing systems or security mechanisms and evaluates the extent to which systems are able to protect the organization's data and maintain functionality as intended.
  • A/B Testing - Develop and disseminate corporate security policies, frameworks and guidelines to ensure that day-to-day business operations guard or are well protected against risks, threats and vulnerabilities.
  • Cybersecurity Risk Management - Develop cyber risk assessment and treatment techniques that can effectively pre-empt and identify significant security loopholes and weaknesses, demonstration of the business risks associated with these loopholes and provision of risk treatment and prioritization strategies to effectively address the cyber-related risks, threats and vulnerabilities identified to ensure appropriate levels of protection, confidentiality, integrity and privacy in alignment with the security framework.
  • Vulnerability Management - Defines, identifies, classifies and prioritizes vulnerabilities in computer systems, applications and network infrastructures and provides the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its business.
  • Penetration Testing - Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.
  • Security Audits - A systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
  • Incident Response Management - An organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • Intrusion Detection - Monitors network and system activity to identify potential intrusion or other anomalous behavior; analyzes the information and initiates an appropriate response, escalating as necessary; Uses security analytics, including the outputs from intelligence analysis, predictive research and root cause analysis in order to search for and detect potential breaches or identify recognised indicators and warnings; Monitors, collates and filters external vulnerability reports for organizational relevance, ensuring that relevant vulnerabilities are rectified through formal change processes; Ensures that disclosure processes are put in place to restrict the knowledge of new vulnerabilities until appropriate remediation or mitigation is available; Produces warning material in a manner that is both timely and intelligible to the target audience(s).
  • Identity Management and Access Management - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

Salary : $92,000 - $146,000

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Cybersecurity Analyst - Governance, Risk, and Compliance (GRC)?

Sign up to receive alerts about other jobs on the Cybersecurity Analyst - Governance, Risk, and Compliance (GRC) career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$112,673 - $137,290
Income Estimation: 
$139,945 - $168,577
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$142,618 - $183,267
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$71,440 - $92,105
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$115,647 - $153,495
This job has expired.
Employees: Get a Salary Increase
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Sempra Infrastructure

  • Sempra Infrastructure Port Arthur, TX
  • #26-73744 Port Arthur, Texas, USA Job Category Field/Plant Operations Full-Time/Part-Time Full-time Job Description Primary Purpose The DCS Operator report... more
  • 16 Days Ago

  • Sempra Infrastructure Port Arthur, TX
  • #26-73435 Port Arthur, Texas, USA Job Category Engineering Full-Time/Part-Time Full-time Job Description Primary Purpose Provides advanced engineering expe... more
  • 16 Days Ago

  • Sempra Infrastructure Sulphur, LA
  • #26-73452 Sulphur, Louisiana, USA Job Category Engineering Full-Time/Part-Time Full-time Job Description Primary Purpose Contributes to system reliability ... more
  • 1 Day Ago

  • Sempra Infrastructure Houston, TX
  • #25-72904 Houston, Texas, USA Job Category Information Technology Full-Time/Part-Time Full-time Job Description Primary Purpose The Senior IT Project Manag... more
  • 1 Day Ago


Not the job you're looking for? Here are some other Cybersecurity Analyst - Governance, Risk, and Compliance (GRC) jobs in the Houston, TX area that may be a better fit.

  • StaffRight Associates, LLC Houston, TX
  • The Opportunity StaffRight Associates is representing a premier, high-growth financial fiduciary and trust institution in the Greater Boston area seeking a... more
  • 3 Days Ago

  • Weaver Houston, TX
  • The Weaver Experience Weaver is a full-service national accounting, advisory and consulting firm with opportunities for professionals in many different fie... more
  • 13 Days Ago

AI Assistant is available now!

Feel free to start your new journey!