Job Title : Technical Writer - Security Defense & Response
Location : San Antonio, TX (onsite)
Contract Duration : Contract until 10 / 18 / 2027
Must Have
- Attention to detail
- MS Suite Experience
JOB DESCRIPTION
As a technical writer focused on Cyber and Physical Security you will analyze, review, and research current business practices and industry benchmarks to create easily accessible internal policies, procedures, and assorted documentation for the Integrated Security Department. Duties include coordinating and collaborating with internal and external organizations and subject matter experts, analyzing information required for developing and updating security-related policies / procedures, providing technical editing services, and promoting knowledge sharing within Integrated Security.
Tasks and Responsibilities
Develop clear, concise, and accurate security documentation for a variety of audiences (technical and non-technical). This may include user manuals, configuration guides, security policies, training materials, white papers, and blog posts.Collaborate with security engineers and other technical specialists to gather subject matter expertise.Ensure technical accuracy and adherence to security best practices.Maintain and update existing security documentation.Develop and implement a content management strategy for security information.Design user-friendly documentation that is easy to understand and navigate.Understand the security posture and compliance requirements of the organization.Work effectively with internal stakeholders (engineers, security analysts, managers) to gather information and ensure content accuracy.Possess excellent communication skills to explain complex security concepts clearly and concisely.Minimum Qualifications :
Bachelor’s Degree in Business Administration, Information Systems, Information Technology, Information Technology Security, Computer Science, Management Information Systems OR Information Security experience will be considered as a substitute for degree. Candidate must be actively pursuing completion of a degree listed above and self-studying to obtain at least one certification listed below.Knowledge of information technology security principles and methodsKnowledge of vulnerability information dissemination sources (alerts, advisories, bulletins)Knowledge of key concepts in security management (vulnerability management, patch management, incident response)Experience with collecting data from a variety of cyber defense resourcesSkill in recognizing and categorizing various types of vulnerabilities and associated attacksExperience with using security event correlation tools (SIEM)Ability to conduct vulnerability scans and recognize vulnerabilities in information systemsAbility to apply techniques for detecting host and network-based intrusions using various detection technologiesAbility to interpret the information collected by network toolsPreferred Qualifications
Cyber and Physical Security experienceExperience in Operations CentersExperience with software documentation