Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose - to uplift everyone, everywhere by being the best way to pay and be paid.
Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa.
Job Description
Information security is an integral part of Visa's corporate culture. It is essential to maintain our position as an industry leader in electronic payments, and it is the responsibility of each employee to safeguard information, protect it from unauthorized access, and ensure regulatory compliance. Information security has a significant effect on privacy, consumer confidence, external reputation, and/or the bottom line, and it is a priority on everyone's agenda
The successful incumbent will bepart of Visa's Business to Business Identity & Access Management team, which is part of the larger Cybersecurity organization.TheB2B IAMteam has a Global focus, and is responsive to an evolving threat landscape, regulatory compliance, IT security requirements and technology architecture. The B2B IAM team is responsible for secure access to business portals and associated services.
Essential Functions
Deep understanding of web applications integration for single sign on using ForgeRock
Setting up federation agreements using SAML 2, OpenID and OAuth protocols
Setting up authorization policies and configuring authentication chains in ForgeRock AM
Installation and configuration of ForgeRock AM
Deep understanding of session management across geographically distributed locations
Installation and configuration of ForgeRock Directory Server (DS)
Deep understanding of replication and user directory synchronization
Good knowledge of OpenID connects and OAuth protocols.
Setting up LDAP password policies and ACIs using custom scripts
Building a performance lab and setting up scripts to load test the different access management functions
Building scripts to monitor production traffic patterns and translate the numbers into scripts for performance lab
Familiarity with all different flavors of web servers and app servers including IIS, Apache, MGINX, Apache Tomcat and Node.js
Installation of configuration of ForgeRock agents on web servers and app servers
Demonstrate ability to work in a complex organization to determine business and customer needs, providing the best solution to meet those needs
You will work closely with Operations, database, and middleware engineering teams to maintain high system up time according to agreed SLA
Operate with little supervision and oversight
Able to collaborate effectively with teams spread across different time zones
Serve as the Subject Matter Expert (SME) for the team, acting as the primary point of contact for cross-functional teams and various support groups within Technology's global teams
Take ondecision-makingresponsibilities that directly and significantly impact the productivity of individual support teams and the users they support
Developtechnical designand build documentation for all aspects of the technical infrastructure
Proficiency in Multi-Factor Authentication and its various implementations
This is a hybrid position. Expectation of days in office will be confirmed by your hiring manager.
Qualifications
Basic Qualifications
*8+ years of relevant work experience with a Bachelor's Degree or at least 5 years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 2 years of work experience with a PhD, OR 11+ years of relevant work experience.
Preferred Qualifications
*9 or more years of relevant work experience with a Bachelor Degree or 7 or more relevant years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 3 or more years of experience with a PhD
*B.S. degree with 8+ years or M.S. degree with 5+ years of experience in managing global enterprise-wide platform solutions
*Knowledgeable and working experience with Http web servers, Apache, IIS, Tomcat, JWS,
*Knowledgeable and working experience with LDAP technologies
*Knowledgeable and working experience with Linux & Windows operating systems
*Knowledgeable and working experience with application system and performance monitoring software tools
*Able to work with cross-functional teams from different geographic locations globally.
*Understand various development methodology, including waterfall and Agile/Scrum
*Proven track record of executing and driving results in a collaborative and thoughtful manner
*Excellent verbal and written communication skills
*Understands release managements and familiar with tools like Jira
*Familiarity with various industry audit/security standards including PCI-DSS, NIST and FFIEC
*Strong knowledge of web-based 3-tier application and security architecture. *Good knowledge of overall network architecture including firewalls, load balancer and WAF
*Knowledge and working experience of API authentication and authorization
*Understanding of incident, change, and problem management, as well as software release management processes
*Experience with Java and other scripting languages to develop custom IAM solutions
*Familiarity with Cloud-based Identity and Access Management (IAM) solutions
Additional Information
Work Hours: Varies upon the needs of the department.
Travel Requirements: This position requires travel5-10% of the time.
Mental/Physical Requirements: This position will be performed in an office setting. The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers.
Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.
Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code.
U.S. APPLICANTS ONLY: The estimated salary range for a new hire into this position is 157,100.00 to 227,900.00 USD per year, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.
$86k-112k yearly est. 5d ago
Looking for a job?
Let Zippia find it for you.
Information Security Compliance Analyst
Social Solutions Global 4.1
Cyber security analyst job in Austin, TX
US Salary: $76,000 - $100,000
About Us
Bonterra exists to propel every doer of good to their peak impact. We measure that impact against our vision to increase the giving rate as a percentage of GDP from 2% to 3% by 2033. We know that this goal is lofty, but we are confident that the right technology and expertise will strengthen trust in the sector, allowing the social good industry to accelerate growth and reach peak impact. Bonterra's differentiated, end-to-end solutions collectively support a unique network of over 20,000 customers, including over 16,000 nonprofit organizations and over 50 percent of Fortune 100 companies. Learn more at bonterratech.com.
About the Role
The Bonterra Information Security Risk and Compliance department is looking to hire a Compliance Specialist to our team. If you enjoy problem solving, are enthusiastic working in a team format and want to thrive in the ever-changing risk & compliance field while learning new concepts and principles as part of your continuing education, look no further!
Job Responsibilities:
Perform as the primary in the executing our annual Service Organization Controls (SOC) reporting initiatives, which includes several Bonterra products.
Works closely with other members of the Information Security Risk team.
Works closely with control owners across the company and internal and external auditors to ensure requests are completed in a timely manner as part of the overall project management process.
Performs technical risk assessments of third party suppliers' security and privacy controls.
Maintains register of relevant suppliers/vendors, controls, and risks for ongoing vendor risk management activities.
Will be responsible the play book for reporting of high risk events that involve compliance, risk and information security.
Assists in maintaining our overall security awareness, role based security trainings and phishing simulation programs across the enterprise.
Assists in conducting user activity audits where required.
Requirements
6+ years' experience performing risk and compliance activities or open to less with a relevant degree
Project management experience.
Experience managing multiple priorities independently and in a team environment to achieve goals.
Excellent organizational, planning and time management skills.
Excellent research and analytical skills.
Excellent verbal and written communication skills.
Ability to exercise good judgement and tact in dealing with Bonterra senior management.
Proficient with technology and ability to learn our software systems, including GRC, ticketing and project management software and workflows.
Proven track record of proactively identifying needs and implementing solutions.
Information systems security professional certifications preferred (CRISC, CISA, CISSP, CISM, GSEC, GCFA, GCTI, CCSP, or other relevant Information Security certifications).
At Bonterra, we're building AI-powered tools to solve real human challenges-and we want teammates who share that enthusiasm.We value people who will champion AI and bring diverse perspectives from different industries, backgrounds, and cultures. Together, we create AI that breaks down barriers, empowers communities, and delivers better outcomes.
At this time, we are unable to consider candidates who require current or future sponsorship for employment authorization.
____________________________________________________________________________________
Our Culture
At Bonterra, we're innovating with a higher purpose: to increase giving to 3% of US GDP by 2033, creating $573 billion more in global impact every year. At Bonterra, we foster an inclusive, equitable culture where every team member belongs and contributes to meaningful impact. Read more about our values and culture here.
Compensation & Benefits
We offer a comprehensive benefits package that supports your health, well-being and growth - explore full details here.
Compensation and benefits for this role apply to full-time employees in the United States and may vary based on local standards, laws and norms. Pay is determined by location, skills, experience, and education, and is one part of Bonterra's total rewards package, which may also include bonuses, incentives, equity, and a comprehensive benefits program.
____________________________________________________________________________________
Equal Opportunity & Accommodations
At Bonterra, we are proud to be an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We provide equal employment opportunities without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, disability, veteran status, or any other characteristic protected by law.
If you require a reasonable accommodation during the application process, please submit a request.
$76k-100k yearly 5d ago
Security Engineer II
Procore 4.5
Cyber security analyst job in Austin, TX
We're looking for a Security Engineer II to join Procore's Security Engineering team. In this role, you'll be a key contributor, focused on building, implementing, and operating the foundational security controls that protect our platform, data, and users. Your primary goal is to help build and maintain a secure, scalable, and resilient cloud product and infrastructure.
As a Security Engineer II, you'll work with Engineering, IT, Security Operations, and GRC to apply security principles to our systems. Use your experience in cloud security, automation, and core security principles to implement and operate automated security controls across our SaaS ecosystem. This is a fantastic opportunity to grow your skills and make a real impact on protecting the data of millions of users-Apply today.
This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately.
What you'll do:
Configure and support IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments.
Implement and support automated pipelines for asset inventory and Software Bill of Materials (SBOM) generation.
Support the implementation of data protection tools and processes, including key management and encryption.
Implement secure configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows under the guidance of senior engineers.
Collaborate with Product & Technology teams to test and document resilience patterns.
Assist GRC and Internal Audit teams by gathering data and providing context on security controls.
Operate and triage alerts from security tools and platforms, and help drive remediation.
Participate in the evaluation of new security technologies and tools.
Provide on-call support on a rotational basis.
What we're looking for:
Bachelor's degree in Computer Science or equivalent practical experience.
2+ years of experience in a hands-on technical security or IT/ops role with a security focus.
Solid understanding of core security domains such as IAM, network security, and infrastructure security.
Hands-on experience with at least one major cloud provider (AWS preferred).
Hands-on experience identifying and exploiting common web/API vulnerabilities (e.g., Burp Suite usage) and secure API design.
Proficiency in scripting to automate simple security tasks or checks.
Familiarity with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM).
Experience with, or a strong desire to learn, IaC (Terraform) and container orchestration (Kubernetes).
Understanding of data protection principles, including encryption and key management.
A passion for automation and experience with scripting languages (Python, Go, or similar).
Good communication skills and a collaborative, team-oriented attitude.
Additional Information
Base Pay Range:
113,040.00 - 155,430.00 USD Annual
This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location.
This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract.
For Los Angeles County (unincorporated) Candidates:
Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act.
A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
$89k-113k yearly est. 3d ago
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in Austin, TX
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$75k-103k yearly est. Easy Apply 6d ago
Cyber Security Analyst
Insight Global
Cyber security analyst job in Austin, TX
The CybersecurityAnalyst will be responsible for safeguarding the organization's information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.
The ideal candidate will possess 3-5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.
Key Responsibilities
Security Operations & Monitoring
· Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.
· Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.
· Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.
Network & Infrastructure Security
· Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.
· Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.
· Perform network hardening to reduce the attack surface, following best practices and compliance standards.
Server & System Hardening
· Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.
· Review and implement secure configurations, patch management, and vulnerability remediation.
Disaster Recovery & Continuity
· Participate in DR drills and testing to validate readiness and response effectiveness.
Policy, Documentation & Compliance
· Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.
· Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 3-5 years of hands-on experience managing and securing enterprise networks and systems.
- Proven experience with:
- Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint
- Fortinet Gateways
- Duo MFA
- Server and Network Hardening
- Disaster Recovery implementation and testing
- Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles.
- Familiarity with incident response, threat intelligence, and vulnerability management processes.
- Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent).
- Experience with other routing protocols (EIGRP, BGP) and advanced firewall features.
- Familiarity with automation tools (Python, Ansible, Netmiko) for network management.
- Experience in high-availability enterprise or government environments.
$75k-103k yearly est. 47d ago
Cyber Threat & Response Engineer (L2)
3M Companies 4.6
Cyber security analyst job in Austin, TX
Collaborate with Innovative 3Mers Around the World Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 2, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
* Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
* Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
* Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
* Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
* Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Technical
* Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
* Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
* Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
* Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
* Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
* Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
* Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
* Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms
* Skilled in correlating data from multiple sources to identify and escalate confirmed threats
* Proficient in supporting incident response efforts and conducting initial root cause analysis
* Strong understanding of threat intelligence and its application in operational workflows
* Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
* Effective communicator with the ability to document investigations clearly and collaborate across teams
* Committed to continuous learning and development in threat detection and response
* Analytical thinker with a proactive approach to identifying and mitigating risks
* Reliable team player in a 24/7 SOC environment, contributing to operational excellence
Your Skills and Expertise
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
* Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
* High School diploma (completed and verified prior to start) and four (4) years of hands-on experience (completed and verified prior to start)
AND
* Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
* Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
* Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
* Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
* Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
* Strong analytical and problem-solving skills with attention to detail
* Effective communicator with the ability to document investigations and collaborate with cross-functional teams
* Certifications such as CompTIA Security+, CySA+, or GCIH
Work location: On site in Austin TX
Travel: May include up to 10% domestic and international
Relocation Assistance: Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well-being
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Chat with Max
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $164,612 - $201,193, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ***************************************************************
Good Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled
All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Pay & Benefits Overview: https://**********/3M/en_US/careers-us/working-at-3m/benefits/
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
$164.6k-201.2k yearly Auto-Apply 23d ago
Network Security Analyst III
Stratacuity
Cyber security analyst job in Austin, TX
If you are interested in applying for this role, please email your resume to Maddie Watt at [email protected] Job Title: Network SecurityAnalyst III Client Type: Government - Transportation and Infrastructure Contract Length: 12 months - potential to extend or convert
Location: Austin, TX - On-site 4x per week
Rate: up to $100/hr.
Location notes: Candidates must reside in Texas. Preference for Austin-based candidates, but exceptional candidates elsewhere in Texas will be considered.
About the Role
Our client is looking for a seasoned Network SecurityAnalyst 3 to join their cybersecurity team. This role focuses on supervising and managing the Cybersecurity Operations Tools Team, ensuring the resilience and administration of critical security tools, and supporting incident response activities. You'll work under minimal supervision with significant latitude for independent judgment.
What You'll Do
* Oversee and assist in managing the Cybersecurity Operations Tools Team (8 contractors).
* Administer and maintain cybersecurity tools to ensure operational resilience.
* Provide real-time data, metrics, and incident input for CSOC monitoring and response.
* Support daily operations and incident response activities.
* Deliver tooling input for monthly and annual reporting.
* Recommend improvements for operational resilience and cybersecurity maturity.
* Plan and manage deployment and operation of security toolsets.
* Assist in managing ongoing cybersecurity programs (e.g., tabletop exercises).
Areas of Service Include:
* Custom Managed Scanning Services
* Custom Managed Endpoint Protection
* Managed CISCO Secure Network Analytics Service
* SIEM Administration
Required Qualifications
* 8+ years technical team management experience.
* 8+ years deploying and configuring network security monitoring and incident response tools (EDR, Scanners, SIEM, NetFlow, etc.).
* 8+ years administering network security monitoring and incident response tools.
* 8+ years' experience in intrusion detection and incident response activities.
* Strong professional communication and reporting skills.
* Experience with Wiz cloud management (required).
Preferred Qualifications
* 8+ years' experience with CISCO security suite of tools.
* 8+ years' experience with Microsoft EDR tools.
* 8+ years' experience with Microsoft Sentinel.
* 8+ years' experience with Tenable suite of tools.
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details.
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide.
Employee Type:
Contract
Location:
Austin, TX, US
Job Type:
Date Posted:
December 17, 2025
Similar Jobs
* Network Security Engineer
* Network Security Engineer
* IT Security Specialist III
* IT Business Analyst III
* Network Operations Analyst
$67k-91k yearly est. 1d ago
Network Security Analyst
Techtalenthunt
Cyber security analyst job in Austin, TX
Requirement details: Internal job ID:TWK_2002 Network SecurityAnalyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state
EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only.
Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification.
Job Description:
This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security
SKILLS AND QUALIFICATIONS
Years Required Experience
2 Required Information security analysis work or related IT security work
4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally
2 Preferred with a cybersecurity architecture and data flow documentation
2 Preferred with a Vulnerability Management programs
2 Preferred doing web application security scans/assessments
2 Preferred with custom dashboards and/or configurations of SIEM tools
2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
$67k-91k yearly est. 60d+ ago
Senior Security Analyst
Tricentis USA Corp
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. 3d ago
Senior Security Analyst
Tricentis Gmbh
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. Auto-Apply 4d ago
TCEQ - Information Security Analyst
Capps
Cyber security analyst job in Austin, TX
TCEQ - Information SecurityAnalyst (00055197) Organization: TEXAS COMMISSION ON ENVIRONMENTAL QUALITY Primary Location: Texas-Austin Work Locations: Headquarters (582-HQAUS) 12100 Park 35 Circle Austin 78753 Job: Computer and Mathematical Employee Status: Regular Schedule: Full-time Standard Hours Per Week: 40.
00 State Job Code: 0230 Salary Admin Plan: B Grade: 18 Salary (Pay Basis): 4,454.
00 - 4,454.
00 (Monthly) Number of Openings: 1 Overtime Status: Non-exempt Job Posting: Jan 16, 2026, 3:37:06 PM Closing Date: Jan 31, 2026, 5:59:00 AM Description Are you an experienced Information SecurityAnalyst, ready for a unique opportunity to grow with an environmental state agency? Join TCEQ! We bring passion and drive to carry out our mission of protecting our state's public health and natural resources.
YOUR FUTURE TEAMAs part of TCEQ Administrative Services, you would help support the logistical and operational structure for TCEQ statewide -- the business foundation for the whole agency.
See details about what we do.
This position is a member of our Cybersecurity Division.
HERE'S WHAT YOU'LL BE DOINGPerform the management of the agency's cybersecurity awareness program and provide IT security support for the Cybersecurity team of the Texas Commission on Environmental Quality (TCEQ).
Lead the cybersecurity training program in achieving compliance with state requirements.
Assist Human Resources and Staff Services (HRSS) in selecting a Department of Information Resources (DIR) certified cybersecuritysecurity training course for all Full-Time Employees (FTEs).
Administer and manage a learning managed system for non-FTEs to ensure training compliance.
Provide reports throughout the year to support cybersecurity training program.
Develop and deliver training materials and sessions to educate employees on security policies and best practices.
Work with the cybersecurity team, Data Management and Privacy Officers to tailor content to specific operational areas.
Promote cybersecurity awareness through staff events, such as October Cybersecurity Awareness Month.
Administer software used to support security awareness through phishing campaigns.
Develop and execute phishing campaigns to test security measures and educate employees on phishing tactics.
Monitor the effectiveness of the phishing campaigns and report findings to the Chief Information Security Officer.
Monitor, document and track security questions and incidents sent to agency security mailbox.
Analyze phishing and spam incidents and take required measures to block identified threat actor.
Qualifications KEY QUALIFICATIONSExperience with training development in an IT or Cybersecurity setting.
Experience with phishing campaigns.
Experience analyzing email for phishing.
REQUIRED EDUCATION & EXPERIENCETwo (2) years full-time experience in data processing OR assisting users in computer application use OR in troubleshooting computer systems problems (hardware/software).
ORFifteen semester hours in computer science from an accredited college or university, or 300 clock hours in computer science from a licensed vocational, technical, or business school, plus one (1) year of full-time experience in data processing OR assisting users in computer application use OR troubleshooting computer systems problems (hardware/software).
ORAn associate degree or higher in computer science.
OROne (1) year of full-time experience in TCEQ as an IT Support Specialist II.
***Employees in this classification series may research, work on, or have access to critical infrastructure, including but not limited to a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.
See Tex.
Business & Commerce Code Section 117.
001(2).
Accordingly, the ability to maintain the security or integrity of the infrastructure is a requirement to be hired for and to continue to be employed with TCEQ.
TRANSCRIPT/ COLLEGE HOURS or COURSE WORK See instructions on how to attach documents.
A copy of your official college transcript or evaluation of foreign credentials in CAPPS is required if needed to meet the qualifications listed above.
WORK SCHEDULEStandard business hours are M-F, 8:00 a.
m.
- 5:00 p.
m.
Individual and work group schedule determined by the TCEQ Cybersecurity Division.
BENEFITSOptional 401(k) and 457 plans Insurance: Health, Vision, Dental, and optional FSAPaid day(s) off from work on national holidays and holidays that the state observes Professional development opportunities Longevity pay based on your number of years working for the state Wellness Program and ActivitiesOnsite Nurse Practitioner in HQWork-Life BalanceCONDITION OF EMPLOYMENTTCEQ will conduct a criminal history records search, driving history (if required for the job) on candidates offered employment.
In compliance with ADA, if you need any special accommodations during the employment process, please contact HRSS for assistance at **************.
MILITARY OCCUPATIONAL SPECIALTY (MOS) CODESM.
O.
S.
codes can be found at: ***********
sao.
texas.
gov/CompensationSystem/JobDescriptions/ Please click the hyperlink under ‘Occupational Category' for the respective Class Title.
Texas Commission on Environmental Quality is an Equal Opportunity Employer.
$75k-108k yearly est. Auto-Apply 9h ago
Junior Information Security Analyst #2925
Genius Road
Cyber security analyst job in Austin, TX
Junior Information SecurityAnalyst 12 month Contract (with strong potential for extension and career advancement) Our client is seeking a Junior Information SecurityAnalyst to assist in supporting and enhancing cybersecurity initiatives across their organization. This role will focus on implementing and monitoring security controls aligned with the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards.
This is a great opportunity for an early-career professional eager to gain deep experience in information security within an enterprise environment.
Required Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field
Security certifications such as CompTIA Security+, GSEC, or equivalent
2+ years of experience in information security, cybersecurity, or a related IT field
Working knowledge of common security frameworks including:
NIST Risk Management Framework (RMF)
NIST Cybersecurity Framework (CSF)
Texas Information Security Standards
Experience with basic project planning and system development methodologies
Strong analytical, communication, and documentation skills
Ability to work independently with minimal supervisio
Familiarity with enterprise-level IT systems or public-sector environments is highly preferred
Key Responsibilities:
Assist in implementing and monitoring security measures across systems and applications
Support security risk assessments and compliance reviews
Help maintain and document security policies, procedures, and standards
Coordinate with internal teams and external vendors on security initiatives
Assist in identifying and recommending improvements to existing security processes
Participate in incident response and audit support activities
Support research and evaluation of emerging cybersecurity tools and technologies
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
$75k-108k yearly est. 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Austin, TX
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Cyber security analyst job in Austin, TX
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cybersecurity and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cybersecurity policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cybersecurity risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
$72k-100k yearly est. Auto-Apply 60d+ ago
Information Systems Security Officer (ISSO)
Saronic
Cyber security analyst job in Austin, TX
Saronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms. Position OverviewWe are seeking an experienced ISSO to lead the stand-up, accreditation, and continuous monitoring of classified networks in support of U.S. Government customers. The ideal candidate has direct, hands-on experience securing Authorities to Operate (ATO) for SIPRNet (DCSA) and JWICS (Navy/IC) environments, with proven expertise managing ATO lifecycles across the DOW, IC, and specific Navy stakeholders. Experience with CWAN and/or enabling Defense Contractors to build compliant, customer-aligned classified enclaves is preferred.This role reports to the Industrial Security Manager and works closely with Cybersecurity, Information Technology, Business Development, and Growth Teams to deliver accredited classified capabilities on time and within scope.Key Responsibilities
Serve as the primary ISSO for SIPRNet (DCSA) and JWICS (Navy/IC) ATO packages, including RMF workflow in eMASS, Xacta, or equivalent.
Lead ATO development, submission, assessment, and authorization with DCSA, Navy AO/DAO, and IC CAFs (e.g., DIA, NSA, NRO).
SOCOM-Specific Functions
Author and maintain USSOCOM 10-702 RMF overlays for SOF-unique systems (e.g., SOFNET, SOF-IA, Mission Command Systems).
Manage ATO packages under SOCOM's J6/J39 using eMASS Enterprise and SOCOM's Risk Management Framework Process Guide.
Coordinate with TSOC ISSMs and Component Command Validators for deployment of classified SOF enclaves worldwide.
Navy-Specific Functions
Interface directly with NAVCYBERFOR, FLTCYBERCOM, and SPAWAR/NAVWAR for CANES, ADNS, and ISNS integration into contractor JWICS drops.
Execute Navy RMF per NAVSEA 9400 series and SECNAV M-5239.2 for ship-to-shore and afloat classified networks.
Manage JWICS ATOs under Navy DAO (OPNAV N2N6), including Type-1 encryption and NSA Commercial Solutions for Classified (CSfC) implementations.
SAP/SCI Environment Functions
Act as SAP ISSO for Special Access Programs (SAP) under DoD SAPCO, Service SAPCOs, and IC SAPCOs.
Participate in the development of SAP Security Plans (SAPSP), Fixed Facility Checklists (FFC), and TEMPEST addendums for SAP facilities.
Oversee SAP network carve-outs, air-gapped systems, and bilateral SAP-to-SCI cross-domain transfers.
Manage classified network stand-up for Defense Contractor facilities, including:
Design and implementation of secure enclaves (SIPR, JWICS, CWAN, SAP)
Cross-domain solutions (CDS), VTC, and secure voice
Compliance with ICD 503, JSIG, NISPOM, DAAPM, and CNSSI 1253
Oversee continuous monitoring, POA&M management, and annual re-accreditation for CWAN-connected systems and/or SAP collateral networks.
Coordinate with Navy SPAWAR, NRO, DISA, SOCOM J6, and IC customers to align technical solutions with mission requirements.
Conduct security audits, vulnerability scans (ACAS), STIG compliance, and incident response for classified systems.
Mentor junior ISSOs and interface with CPSO/FSO on physical, personnel, and COMSEC requirements.
Required Qualifications
5+ years as ISSO in classified DoD/IC environments (SIPR/JWICS and SAP mandatory).
Direct experience obtaining and maintaining ATOs with:
DCSA for SIPRNet
DOW for JWICS
CWAN-connected networks
USSOCOM or SAP AOs for SOF/SAP systems
Proficiency with RMF, eMASS, Xacta 360, SOCOM 10-702 overlays, and SCAP/STIGs.
Current DoD 8570 IAT/IAM Level III certification (e.g., CISSP, CISM, GSLC).
Active TS/SCI with Full-Scope Poly (or CI Poly with ability to obtain FS).
Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience).
Travel: Occasional (10-15%)
Preferred Qualifications
Prior CWAN and SOCOM SOFNET accreditation and operations experience.
Experience with Navy FLTCYBERCOM, SPAWAR, ONR, or SOCOM J39 classified programs.
Familiarity with CDS (ISSE Guard, Radiant Mercury), CSfC, and secure VTC (SVTC).
SAP ISSM training (e.g., CDSE SAP Security Management) and ICD 705 SCIF accreditation experience.
Experience supporting Defense Contractors in building customer-dedicated classified networks (e.g., SCIF-in-SCIF, dedicated JWICS/SAP drops).
Physical Demands
Prolonged periods of sitting at a desk and working on a computer
Occasional standing and walking within the office and production environments
Manual dexterity to operate a computer keyboard, mouse, and other office equipment
Visual acuity to read screens, documents, and reports
Occasional reaching, bending, or stooping
Lifting and carrying items up to 20 pounds
Benefits
Medical Insurance: Comprehensive health insurance plans covering a range of services
Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care
Saronic pays 100% of the premium for employees and 80% for dependents
Time Off: Generous PTO and Holidays
Parental Leave: Paid maternity and paternity leave to support new parents
Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses
Retirement Plan: 401(k) plan
Stock Options: Equity options to give employees a stake in the company's success
Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage
Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) .
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
$72k-100k yearly est. Auto-Apply 60d+ ago
Security Analyst I P68
Texas A&M International University 4.0
Cyber security analyst job in Austin, TX
Job Title SecurityAnalyst I P68 Agency Texas A&M University System Offices Department Cyber Operations Proposed Minimum Salary Commensurate Job Type Staff The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 12 universities, a comprehensive health science center, nine state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond.
The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan to include an employer contribution through Teachers Retirement System of Texas (TRS); if applicable, a defined contribution retirement plan to include an employer contribution through an approved ORP vendor: additional voluntary tax deferred annuity (TDA) options; tuition assistance; and wellness programs to promote work/life balance.
Salary:
$3,896.88 - $5,416.66 per month commensurate with experience.
Job Description Summary:
The SecurityAnalyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The securityanalyst's primary focus will be investigating and responding to cyber threats.
Responsibilities:
* Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
* Document and escalate incidents that may cause ongoing and immediate impact to the environment.
* Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
* Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
* Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
* Other duties as assigned.
Education and Experience:
* Bachelor's degree in applicable field or equivalent combination of education and experience.
* Four months of information technology, information security or cybersecurity work experience.
Knowledge, Skills and Abilities:
* Knowledge of computer networking concepts and protocols, and network security methodologies.
* Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
* Knowledge of cyber threats and vulnerabilities.
* Knowledge of adversarial tactics, techniques, and procedures.
* Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
* Skilled in researching vulnerabilities and exploits utilized in traffic.
* Skilled in using protocol analyzers.
* Skilled in performing packet-level analysis.
* Skilled in technical writing.
* Skilled in preserving evidence integrity according to standard operating procedures or national standards.
* Ability to interpret the information collected by network and host detection tools.
* Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
* Ability to multi-task and work cooperatively with others.
Other Requirements:
This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being rejected without an option to reapply. A cover letter and resume may be required in addition to a completed employment application.
All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution's verification of credentials and/or other information required by the institution's procedures, including the completion of the criminal history check.
Equal Opportunity/Veterans/Disability Employer.
$3.9k-5.4k monthly Auto-Apply 34d ago
Staff Security Engineer
Procore 4.5
Cyber security analyst job in Austin, TX
We're looking for a Staff Security Engineer to join Procore's Security Engineering team. In this role, you'll be a key technical leader responsible for designing and implementing foundational security controls that protect our platform, data, and users. Your primary goal is to drive the implementation of a secure, scalable, and resilient cloud product and infrastructure by default.
As a Staff Security Engineer, you'll partner with Product & Technology, IT, Security Operations, and GRC to embed security into the development lifecycle. Use your deep expertise in cloud architecture, data protection, and identity and access management to design and implement robust, automated security guardrails across our SaaS ecosystem. This is a high-impact opportunity to solve complex security challenges and protect the data of millions of users-Apply today.
This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately.
What you'll do:
Design and implement scalable IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments, including identity governance, PAM, and service-to-service authentication.
Mentor other engineers and help scale security knowledge across the organization.
Lead the evaluation and implementation of new security technologies and platforms from proof-of-concept to production.
Design the long-term application security strategy and roadmap (e.g., Zero Trust architecture for apps).
Solve entire classes of vulnerabilities permanently by re-architecting frameworks or platforms.
Lead critical incident response efforts for product security breaches.
Design and build automated pipelines for authoritative asset inventory and Software Bill of Materials (SBOM) generation.
Drive the technical roadmap for data protection, including key management (KMS), encryption-at-rest/in-transit, and tokenization.
Build and implement secure-by-default configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows.
Partner with Product & Technology teams to engineer technical resilience patterns, auto-healing systems, and verifiable disaster recovery capabilities.
Act as a senior technical expert to provide authoritative context on security controls and designs to our GRC and Internal Audit teams.
Provide on-call support on a rotational basis.
What we're looking for:
Bachelor's degree in Computer Science or equivalent practical experience.
6+ years of experience in a hands-on technical security role, with at least 3 years focused on cloud security in a large-scale SaaS environment.
Deep expertise in multiple security domains including product/application security, IAM, IaaS, network, etc.
Deep expertise with at least one major cloud provider (AWS preferred) and its security services (IAM, KMS, Security Hub, GuardDuty).
Strong experience with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM).
Proven experience building security guardrails for IaC (Terraform preferred), CI/CD pipelines, and container orchestration (Kubernetes).
Ability to influence engineering leadership and drive cultural change (shifting security left).
Experience writing custom security tooling or rules engines (e.g., CodeQL custom rules) to scale detection
Strong understanding of data protection principles, including encryption, key management, tokenization, and data loss prevention (DLP).
A "builder" mindset with a passion for automation (Python, Go, or similar) and shipping solutions as code.
Excellent communication skills with the ability to translate complex technical concepts for technical and non-technical stakeholders.
Additional Information
Base Pay Range:
168,560.00 - 231,770.00 USD Annual
This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location.
This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract.
For Los Angeles County (unincorporated) Candidates:
Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act.
A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
$89k-113k yearly est. 4d ago
Cyber Threat & Response Engineer (L2)
3M 4.6
Cyber security analyst job in Austin, TX
Collaborate with Innovative 3Mers Around the World
Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 2, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Technical
Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms
Skilled in correlating data from multiple sources to identify and escalate confirmed threats
Proficient in supporting incident response efforts and conducting initial root cause analysis
Strong understanding of threat intelligence and its application in operational workflows
Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
Effective communicator with the ability to document investigations clearly and collaborate across teams
Committed to continuous learning and development in threat detection and response
Analytical thinker with a proactive approach to identifying and mitigating risks
Reliable team player in a 24/7 SOC environment, contributing to operational excellence
Your Skills and Expertise
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
High School diploma (completed and verified prior to start) and four (4) years of hands-on experience (completed and verified prior to start)
AND
Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
Strong analytical and problem-solving skills with attention to detail
Effective communicator with the ability to document investigations and collaborate with cross-functional teams
Certifications such as CompTIA Security+, CySA+, or GCIH
Work location: On site in Austin TX
Travel: May include up to 10% domestic and international
Relocation Assistance: Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well-being
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Chat with Max
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $164,612 - $201,193, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ******************************************************************* Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.Pay & Benefits Overview: https://**********/3M/en_US/careers-us/working-at-3m/benefits/3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
$164.6k-201.2k yearly Auto-Apply 32d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Austin, TX
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Information System Security Officer #2765
Genius Road
Cyber security analyst job in Austin, TX
Information System Security Officer - Assessor Contract - 12-24 months *must be local to the Austin area and be willing to be ONSITE Daily The ideal candidate will be responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by the information systems to determine the overall effectiveness of the controls.
Qualifications/Requirements:
At least 5 years of experience in common information security and risk management frameworks
Security + certification (at a minimum) is required
3+ years of experience with NIST Compliance and Third Party Risk assessments
Strong knowledge of information security practices, procedures, and regulations
Previous experience in a government agency environment is highly desirable
Ability to work independently with minimal oversight to complete assigned projects
General Duties:
Assist with implementation and management the Organization's Secure Systems
Perform security assessments and reviews of account permissions, computer data access needs, security violations, and programming changes
Develop appropriate plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
Coordinate the implementation of system security plans for internal personnel and outside vendors
Coordinate account permissions and data access needs
Review security violations and programming changes required
Advise management and users regarding security configurations and procedures
Participate in the development of information technology disaster recovery and business continuity planning
Continuously review and assess technical risks of new and existing applications and systems, including data center physical security and environment
Research, evaluate, and recommend systems and procedures for the prevention, detection, containment, and correction of data security breaches
Prepare final security assessment reports containing findings
May be asked to perform additional duties as required
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
How much does a cyber security analyst earn in Georgetown, TX?
The average cyber security analyst in Georgetown, TX earns between $65,000 and $119,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Georgetown, TX