Cyber security analyst jobs in Jollyville, TX - 144 jobs
All
Cyber Security Analyst
Information Security Analyst
Cyber Security Engineer
Information Security Engineer
Security Engineer
Network Security Analyst
Data Security Analyst
Senior Security Analyst
Information Systems Security Officer
Securities Analyst
Information Security Compliance Analyst
Social Solutions Global 4.1
Cyber security analyst job in Austin, TX
US Salary: $76,000 - $100,000
About Us
Bonterra exists to propel every doer of good to their peak impact. We measure that impact against our vision to increase the giving rate as a percentage of GDP from 2% to 3% by 2033. We know that this goal is lofty, but we are confident that the right technology and expertise will strengthen trust in the sector, allowing the social good industry to accelerate growth and reach peak impact. Bonterra's differentiated, end-to-end solutions collectively support a unique network of over 20,000 customers, including over 16,000 nonprofit organizations and over 50 percent of Fortune 100 companies. Learn more at bonterratech.com.
About the Role
The Bonterra Information Security Risk and Compliance department is looking to hire a Compliance Specialist to our team. If you enjoy problem solving, are enthusiastic working in a team format and want to thrive in the ever-changing risk & compliance field while learning new concepts and principles as part of your continuing education, look no further!
Job Responsibilities:
Perform as the primary in the executing our annual Service Organization Controls (SOC) reporting initiatives, which includes several Bonterra products.
Works closely with other members of the Information Security Risk team.
Works closely with control owners across the company and internal and external auditors to ensure requests are completed in a timely manner as part of the overall project management process.
Performs technical risk assessments of third party suppliers' security and privacy controls.
Maintains register of relevant suppliers/vendors, controls, and risks for ongoing vendor risk management activities.
Will be responsible the play book for reporting of high risk events that involve compliance, risk and information security.
Assists in maintaining our overall security awareness, role based security trainings and phishing simulation programs across the enterprise.
Assists in conducting user activity audits where required.
Requirements
6+ years' experience performing risk and compliance activities or open to less with a relevant degree
Project management experience.
Experience managing multiple priorities independently and in a team environment to achieve goals.
Excellent organizational, planning and time management skills.
Excellent research and analytical skills.
Excellent verbal and written communication skills.
Ability to exercise good judgement and tact in dealing with Bonterra senior management.
Proficient with technology and ability to learn our software systems, including GRC, ticketing and project management software and workflows.
Proven track record of proactively identifying needs and implementing solutions.
Information systems security professional certifications preferred (CRISC, CISA, CISSP, CISM, GSEC, GCFA, GCTI, CCSP, or other relevant Information Security certifications).
At Bonterra, we're building AI-powered tools to solve real human challenges-and we want teammates who share that enthusiasm.We value people who will champion AI and bring diverse perspectives from different industries, backgrounds, and cultures. Together, we create AI that breaks down barriers, empowers communities, and delivers better outcomes.
At this time, we are unable to consider candidates who require current or future sponsorship for employment authorization.
____________________________________________________________________________________
Our Culture
At Bonterra, we're innovating with a higher purpose: to increase giving to 3% of US GDP by 2033, creating $573 billion more in global impact every year. At Bonterra, we foster an inclusive, equitable culture where every team member belongs and contributes to meaningful impact. Read more about our values and culture here.
Compensation & Benefits
We offer a comprehensive benefits package that supports your health, well-being and growth - explore full details here.
Compensation and benefits for this role apply to full-time employees in the United States and may vary based on local standards, laws and norms. Pay is determined by location, skills, experience, and education, and is one part of Bonterra's total rewards package, which may also include bonuses, incentives, equity, and a comprehensive benefits program.
____________________________________________________________________________________
Equal Opportunity & Accommodations
At Bonterra, we are proud to be an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We provide equal employment opportunities without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, disability, veteran status, or any other characteristic protected by law.
If you require a reasonable accommodation during the application process, please submit a request.
$76k-100k yearly 2d ago
Looking for a job?
Let Zippia find it for you.
Staff Security Engineer
Procore 4.5
Cyber security analyst job in Austin, TX
We're looking for a Staff Security Engineer to join Procore's Security Engineering team. In this role, you'll be a key technical leader responsible for designing and implementing foundational security controls that protect our platform, data, and users. Your primary goal is to drive the implementation of a secure, scalable, and resilient cloud product and infrastructure by default.
As a Staff Security Engineer, you'll partner with Product & Technology, IT, Security Operations, and GRC to embed security into the development lifecycle. Use your deep expertise in cloud architecture, data protection, and identity and access management to design and implement robust, automated security guardrails across our SaaS ecosystem. This is a high-impact opportunity to solve complex security challenges and protect the data of millions of users-Apply today.
This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately.
What you'll do:
Design and implement scalable IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments, including identity governance, PAM, and service-to-service authentication.
Mentor other engineers and help scale security knowledge across the organization.
Lead the evaluation and implementation of new security technologies and platforms from proof-of-concept to production.
Design the long-term application security strategy and roadmap (e.g., Zero Trust architecture for apps).
Solve entire classes of vulnerabilities permanently by re-architecting frameworks or platforms.
Lead critical incident response efforts for product security breaches.
Design and build automated pipelines for authoritative asset inventory and Software Bill of Materials (SBOM) generation.
Drive the technical roadmap for data protection, including key management (KMS), encryption-at-rest/in-transit, and tokenization.
Build and implement secure-by-default configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows.
Partner with Product & Technology teams to engineer technical resilience patterns, auto-healing systems, and verifiable disaster recovery capabilities.
Act as a senior technical expert to provide authoritative context on security controls and designs to our GRC and Internal Audit teams.
Provide on-call support on a rotational basis.
What we're looking for:
Bachelor's degree in Computer Science or equivalent practical experience.
6+ years of experience in a hands-on technical security role, with at least 3 years focused on cloud security in a large-scale SaaS environment.
Deep expertise in multiple security domains including product/application security, IAM, IaaS, network, etc.
Deep expertise with at least one major cloud provider (AWS preferred) and its security services (IAM, KMS, Security Hub, GuardDuty).
Strong experience with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM).
Proven experience building security guardrails for IaC (Terraform preferred), CI/CD pipelines, and container orchestration (Kubernetes).
Ability to influence engineering leadership and drive cultural change (shifting security left).
Experience writing custom security tooling or rules engines (e.g., CodeQL custom rules) to scale detection
Strong understanding of data protection principles, including encryption, key management, tokenization, and data loss prevention (DLP).
A "builder" mindset with a passion for automation (Python, Go, or similar) and shipping solutions as code.
Excellent communication skills with the ability to translate complex technical concepts for technical and non-technical stakeholders.
Additional Information
Base Pay Range:
168,560.00 - 231,770.00 USD Annual
This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location.
This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract.
For Los Angeles County (unincorporated) Candidates:
Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act.
A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
$89k-113k yearly est. 1d ago
Cyber Security Analyst
Insight Global
Cyber security analyst job in Austin, TX
The CybersecurityAnalyst will be responsible for safeguarding the organization's information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.
The ideal candidate will possess 3-5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.
Key Responsibilities
Security Operations & Monitoring
· Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.
· Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.
· Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.
Network & Infrastructure Security
· Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.
· Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.
· Perform network hardening to reduce the attack surface, following best practices and compliance standards.
Server & System Hardening
· Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.
· Review and implement secure configurations, patch management, and vulnerability remediation.
Disaster Recovery & Continuity
· Participate in DR drills and testing to validate readiness and response effectiveness.
Policy, Documentation & Compliance
· Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.
· Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 3-5 years of hands-on experience managing and securing enterprise networks and systems.
- Proven experience with:
- Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint
- Fortinet Gateways
- Duo MFA
- Server and Network Hardening
- Disaster Recovery implementation and testing
- Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles.
- Familiarity with incident response, threat intelligence, and vulnerability management processes.
- Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent).
- Experience with other routing protocols (EIGRP, BGP) and advanced firewall features.
- Familiarity with automation tools (Python, Ansible, Netmiko) for network management.
- Experience in high-availability enterprise or government environments.
$75k-103k yearly est. 49d ago
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in Austin, TX
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$75k-103k yearly est. Easy Apply 9d ago
Cyber Threat & Response Engineer (L3)
3M 4.6
Cyber security analyst job in Austin, TX
**Collaborate with Innovative 3Mers Around the World** Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
**This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.**
**The Impact You Will Make in this Role**
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
**Management**
+ Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
+ Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
+ Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
+ Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
+ Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
**Technical**
+ Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
+ Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
+ Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
+ Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
**Organizational**
+ Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
+ Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
+ Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
+ Senior-level expertise in leading complex investigations and responding to advanced cyber threats
+ Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments
+ Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors
+ Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain
+ Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
+ Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC
+ Experienced in coordinating incident response efforts and communicating findings to stakeholders
+ Committed to continuous improvement of SOC processes, playbooks, and detection capabilities
+ Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity
**Your Skills and Expertise**
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
+ Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
+ High School diploma (completed and verified prior to start) and four (4) years of hands-on experience
AND
+ Five (5) years of experience in a SOC or cybersecurity operations role, with at least (2) two years in a senior or L3 capacity in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
+ Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
+ Familiarity with threat intelligence, advanced malware analysis, and log correlation techniques
+ Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
+ Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
+ Strong analytical and problem-solving skills with attention to detail
+ Effective communicator with the ability to document investigations and collaborate with cross-functional teams
+ Certifications such as CompTIA Security+, CySA+, or GCIH
**Work location: On site in** **Austin TX**
**Travel:** **May include up to 10** **% domestic and international**
**Relocation Assistance:** **Is Authorized**
**Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).**
**Supporting Your Well-being**
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
**Chat with Max**
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $188,251 - $230,084, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ****************************************************************
Good Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled
All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Pay & Benefits Overview: https://**********/3M/en\_US/careers-us/working-at-3m/benefits/
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
**Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.**
**3M Global Terms of Use and Privacy Statement**
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here (************************************************************************************************* , select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
At 3M we apply science in collaborative ways to improve lives daily as our employees connect with customers all around the world. Learn more about 3M's creative solutions to global challenges at ********** or on Twitter @3M or @3MNews.
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
$188.3k-230.1k yearly 33d ago
Data Security Analyst
Cayuse Shared Services
Cyber security analyst job in Austin, TX
JOB TITLE:
Data SecurityAnalyst
CAYUSE COMPANY:
Cayuse Civil Services, LLC
LOCATION
Austin, TX - Hybrid (3 day remote | Mon & Fri Onsite)
SALARY:
Based on experience and position level
**This position is posted for future opportunities. Please submit your application to be considered for similar upcoming roles**
Responsibilities
The Work
The Data SecurityAnalyst role will safeguard the client's sensitive data and be responsible for installing, uninstalling, and maintaining cutting-edge security programs to ensure the integrity, confidentiality, and availability of our information systems. This position involves the use of advanced security tools, such as firewalls and data encryption technologies, to protect sensitive data from cyber threats. The Data SecurityAnalyst will work as part of a dedicated team of IT security professionals to continuously enhance the client's data security framework.
This position aligns with Cayuse's core values of Innovation, Excellence, Collaboration, Adaptability, and Integrity by fostering technical solutions that meet customer needs, promoting teamwork, and prioritizing quality in deliverables.
Key Responsibilities
Install and uninstall a variety of cybersecurity programs to protect system resources and sensitive data.
Configure and update firewalls, data encryption systems, and other security tools to ensure maximum protection against unauthorized access, hacking, and data breaches.
Regularly evaluate and update cybersecurity programs to enhance performance, address potential vulnerabilities, and integrate new features.
Monitor and assess system security to identify risks, perform vulnerability analyses, and implement timely remediation plans.
Participate in the deployment and maintenance of encryption strategies to safeguard sensitive organizational data during transmission and storage.
Perform periodic assessments to ensure all security programs comply with industry best practices, government regulations, and organizational requirements.
Respond to security incidents and collaborate with the IT and cybersecurity teams to develop and execute incident response plans.
Maintain detailed documentation of all security activities, system configurations, program modifications, and incident response actions.
Stay current on emerging cybersecurity threats and recommend appropriate proactive solutions to address evolving risks.
Provide training and guidance to employees on data security policies, ensuring they follow established procedures for protecting sensitive information.
Other duties as assigned.
Qualifications
Qualifications - Here's What You Need
The qualifications and skills listed below are intended to provide a general overview of the requirements for this position. However, due to the anticipated nature of the contract and the absence of a finalized task order from the client, this list should not be considered all-encompassing. Additional qualifications, certifications, skills, or experience specific to the client's requirements may be identified and requested upon award of the task order. Candidates should demonstrate flexibility and a willingness to adapt to evolving responsibilities as outlined by the client.
Level 1: 1-3 years of experience in the field or in a related area. Has knowledge of commonly used concepts, practices, and procedures within a particular field. Relies on instructions and pre-established guidelines to perform the functions of the job. Primary job functions do not typically require exercising independent judgment.
Level 2: 4-7 years of experience in the field or in a related area. Familiar with standard concepts, practices, and procedures within a particular field. Relies on limited experience and judgment to plan and accomplish goals. A certain degree of creativity and latitude is required. Works under limited supervision with considerable latitude for the use of initiative and independent judgment.
Level 3: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.
Minimum Skills:
Exceptional interpersonal skills with the ability to communicate in a clear, professional, and articulate manner.
Exceptional verbal and written communication skills.
Excellent organizational, analytical, and problem-solving skills with high-level attention to detail.
Ability to analyze systems and procedures
Strong multitasking skills with the ability to manage multiple design streams across concurrent work effort.
Must be self-motivated and able to work well independently as well as on a multi-functional team.
Ability to handle sensitive and confidential information appropriately.
Desired Qualifications:
Proven experience as a Data SecurityAnalyst, Cybersecurity Specialist, or in a related role.
In-depth understanding of information security concepts, including firewalls, malware detection, encryption technologies, and intrusion detection systems.
Experience in installing, configuring, and managing security programs effectively.
Strong analytical and problem-solving skills with the ability to identify and mitigate security risks.
Familiarity with regulatory compliance standards such as GDPR, HIPAA, or ISO 27001 is highly desirable.
Ability to stay updated on the latest cybersecurity developments and apply them to the organization's security framework.
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field.
Relevant certifications, such as CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), or CISM (Certified Information Security Manager), are strongly preferred.
Our Commitment to you / overview of benefits
Medical, Dental and Vision Insurance; Wellness Program
Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
Short-Term and Long-Term Disability options
Basic Life and AD&D Insurance (Company Provided)
Voluntary Life and AD&D options
401(k) Retirement Savings Plan with matching after one year
Paid Time Off
Reports to: Program Manager
Working Conditions
Professional office environment, with the ability to work onsite in the main office.
Must reside in the Austin area.
Must be physically and mentally able to perform duties extended periods of time.
Ability to use a computer and other office productivity tools with sufficient speed to meet the demands of this position.
Must be able to establish a productive and professional workspace.
Must be able to sit for long periods of time looking at computer screen.
May be asked to work a flexible schedule which may include holidays.
May be asked to travel for business or professional development purposes.
May be asked to work hours outside of normal business hours.
Travel costs, per diem, and other related expenses must be pre-approved in compliance with State of Texas travel guidelines.
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
Cayuse is an Equal Opportunity Employer. All employment decisions are based on merit, qualifications, skills, and abilities. All qualified applicants will receive consideration for employment in accordance with any applicable federal, state, or local law.
Pay Range USD $100,000.00 - USD $155,000.00 /Yr.
$100k-155k yearly Auto-Apply 2d ago
Data Security Analyst
Cayuse Holdings
Cyber security analyst job in Austin, TX
JOB TITLE:
Data SecurityAnalyst
CAYUSE COMPANY:
Cayuse Civil Services, LLC
LOCATION
Austin, TX - Hybrid (3 day remote | Mon & Fri Onsite)
SALARY:
Based on experience and position level
**This position is posted for future opportunities. Please submit your application to be considered for similar upcoming roles**
Responsibilities
The Work
The Data SecurityAnalyst role will safeguard the client's sensitive data and be responsible for installing, uninstalling, and maintaining cutting-edge security programs to ensure the integrity, confidentiality, and availability of our information systems. This position involves the use of advanced security tools, such as firewalls and data encryption technologies, to protect sensitive data from cyber threats. The Data SecurityAnalyst will work as part of a dedicated team of IT security professionals to continuously enhance the client's data security framework.
This position aligns with Cayuse's core values of Innovation, Excellence, Collaboration, Adaptability, and Integrity by fostering technical solutions that meet customer needs, promoting teamwork, and prioritizing quality in deliverables.
Key Responsibilities
Install and uninstall a variety of cybersecurity programs to protect system resources and sensitive data.
Configure and update firewalls, data encryption systems, and other security tools to ensure maximum protection against unauthorized access, hacking, and data breaches.
Regularly evaluate and update cybersecurity programs to enhance performance, address potential vulnerabilities, and integrate new features.
Monitor and assess system security to identify risks, perform vulnerability analyses, and implement timely remediation plans.
Participate in the deployment and maintenance of encryption strategies to safeguard sensitive organizational data during transmission and storage.
Perform periodic assessments to ensure all security programs comply with industry best practices, government regulations, and organizational requirements.
Respond to security incidents and collaborate with the IT and cybersecurity teams to develop and execute incident response plans.
Maintain detailed documentation of all security activities, system configurations, program modifications, and incident response actions.
Stay current on emerging cybersecurity threats and recommend appropriate proactive solutions to address evolving risks.
Provide training and guidance to employees on data security policies, ensuring they follow established procedures for protecting sensitive information.
Other duties as assigned.
Qualifications
Qualifications - Here's What You Need
The qualifications and skills listed below are intended to provide a general overview of the requirements for this position. However, due to the anticipated nature of the contract and the absence of a finalized task order from the client, this list should not be considered all-encompassing. Additional qualifications, certifications, skills, or experience specific to the client's requirements may be identified and requested upon award of the task order. Candidates should demonstrate flexibility and a willingness to adapt to evolving responsibilities as outlined by the client.
Level 1: 1-3 years of experience in the field or in a related area. Has knowledge of commonly used concepts, practices, and procedures within a particular field. Relies on instructions and pre-established guidelines to perform the functions of the job. Primary job functions do not typically require exercising independent judgment.
Level 2: 4-7 years of experience in the field or in a related area. Familiar with standard concepts, practices, and procedures within a particular field. Relies on limited experience and judgment to plan and accomplish goals. A certain degree of creativity and latitude is . Works under limited supervision with considerable latitude for the use of initiative and independent judgment.
Level 3: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.
Minimum Skills:
Exceptional interpersonal skills with the ability to communicate in a clear, professional, and articulate manner.
Exceptional verbal and written communication skills.
Excellent organizational, analytical, and problem-solving skills with high-level attention to detail.
Ability to analyze systems and procedures
Strong multitasking skills with the ability to manage multiple design streams across concurrent work effort.
Must be self-motivated and able to work well independently as well as on a multi-functional team.
Ability to handle sensitive and confidential information appropriately.
Desired Qualifications:
Proven experience as a Data SecurityAnalyst, Cybersecurity Specialist, or in a related role.
In-depth understanding of information security concepts, including firewalls, malware detection, encryption technologies, and intrusion detection systems.
Experience in installing, configuring, and managing security programs effectively.
Strong analytical and problem-solving skills with the ability to identify and mitigate security risks.
Familiarity with regulatory compliance standards such as GDPR, HIPAA, or ISO 27001 is highly desirable.
Ability to stay updated on the latest cybersecurity developments and apply them to the organization's security framework.
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field.
Relevant certifications, such as CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), or CISM (Certified Information Security Manager), are strongly preferred.
Our Commitment to you / overview of benefits
Medical, Dental and Vision Insurance; Wellness Program
Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
Short-Term and Long-Term Disability options
Basic Life and AD&D Insurance (Company Provided)
Voluntary Life and AD&D options
401(k) Retirement Savings Plan with matching after one year
Paid Time Off
Reports to: Program Manager
Working Conditions
Professional office environment, with the ability to work onsite in the main office.
Must reside in the Austin area.
Must be physically and mentally able to perform duties extended periods of time.
Ability to use a computer and other office productivity tools with sufficient speed to meet the demands of this position.
Must be able to establish a productive and professional workspace.
Must be able to sit for long periods of time looking at computer screen.
May be asked to work a flexible schedule which may include holidays.
May be asked to travel for business or professional development purposes.
May be asked to work hours outside of normal business hours.
Travel costs, per diem, and other related expenses must be pre-approved in compliance with State of Texas travel guidelines.
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
Cayuse is an Equal Opportunity Employer. All employment decisions are based on merit, qualifications, skills, and abilities. All qualified applicants will receive consideration for employment in accordance with any applicable federal, state, or local law.
Pay Range USD $100,000.00 - USD $155,000.00 /Yr.
$100k-155k yearly Auto-Apply 23h ago
Systems Analyst - Physical Security
General Motors 4.6
Cyber security analyst job in Austin, TX
The Role: The Systems Analysts in physical security play a pivotal role in designing, developing, and implementing innovative software solutions that drive our global security operations. What You'll Do: The ideal candidate can take a concept and drive it through technical implementation while managing changing priorities. As an IT Systems Analyst, this role is responsible for working with our business partners in the Global Security business organization to deliver technical solutions that meet the business and system requirements that are part of the strategic roadmap and support the transformation of General Motors. Our projects are typically complex and large.
What You'll Do (Responsibilities):
* Support design, development, and maintenance of our physical security applications and systems.
* Analyze business requirements and translate them into technical specifications and computer program designs.
* Act as the technical contact between business and IT teams.
* Maintain strong knowledge of business processes, best practices, and technologies.
* Promote technical best practices and drive process improvements.
* Stay updated on supplier systems and GM IT platforms for HR.
* Provide technical training and mentorship within the team.
* Improve IT customer satisfaction through transparent communication.
* Collaborate with cross-functional teams to integrate new systems and features, ensuring seamless operation and user experience.
* Participate in the entire software development lifecycle, from conceptualization and design to testing, deployment, and ongoing support, using Jira.
* Proactively identify and resolve technical issues, performing root cause analysis and implementing corrective actions.
* Manage and implement Identity Access Management (IAM) solutions to secure sensitive data and systems.
* Ability to learn quickly and think creatively.
* Document technical specifications, program designs, and system architectures for future reference and knowledge transfer.
* Stay abreast of emerging technologies and industry best practices to continuously improve systems and processes.
* Create and execute SIT and QA testing.
Your Skills & Abilities (Required Qualifications):
* Bachelor's in Information Systems or equivalent field
* 5+ years of technical experience in systems engineering or HR technology roles in complex, high-growth, or global tech-forward environments.
* Ability to implement and support software integration solutions with existing or new software/systems.
* Technical understanding and working knowledge with Windows, Ubuntu, SQL, Postgres, Oracle, IIS, Apache etc,..
* Ability to interpret and apply API documentation for integration and troubleshooting.
* Databases working knowledge: SQL Server, PostgreSQL, and DB2 (highly preferred).
* Web Application Servers: WebLogic, TomCat (highly preferred).
* Knowledge of physical security software(s) standards compliance.
* Experienced in Agile, Iterative, and Waterfall methodologies using Jira.
* Team player with strong interpersonal skills and leadership capabilities.
* Work autonomously with diverse teams and clients.
What Will Give You A Competitive Edge (Preferred Qualifications):
* Master's in Information Systems or equivalent field
* 7+ years of technical experience in systems engineering or HR technology roles in complex, high-growth, or global tech-forward environments.
#LI-SB3
GM does not provide immigration-related sponsorship for this role. Do not apply for this role if you will need GM immigration sponsorship now or in the future. This includes direct company sponsorship, entry of GM as the immigration employer of record on a government form, and any work authorization requiring a written submission or other immigration support from the company (e.g., H1-B, OPT, STEM OPT, CPT, TN, J-1, etc).
This role is categorized as hybrid. This means the selected candidate is expected to report to a specific location at least 3 times a week {or other frequency dictated by their manager}.
This job is not eligible for relocation benefits. Any relocation costs would be the responsibility of the selected candidate.
About GM
Our vision is a world with Zero Crashes, Zero Emissions and Zero Congestion and we embrace the responsibility to lead the change that will make our world better, safer and more equitable for all.
Why Join Us
We believe we all must make a choice every day - individually and collectively - to drive meaningful change through our words, our deeds and our culture. Every day, we want every employee to feel they belong to one General Motors team.
Benefits Overview
From day one, we're looking out for your well-being-at work and at home-so you can focus on realizing your ambitions. Learn how GM supports a rewarding career that rewards you personally by visiting Total Rewards resources.
Non-Discrimination and Equal Employment Opportunities (U.S.)
General Motors is committed to being a workplace that is not only free of unlawful discrimination, but one that genuinely fosters inclusion and belonging. We strongly believe that providing an inclusive workplace creates an environment in which our employees can thrive and develop better products for our customers.
All employment decisions are made on a non-discriminatory basis without regard to sex, race, color, national origin, citizenship status, religion, age, disability, pregnancy or maternity status, sexual orientation, gender identity, status as a veteran or protected veteran, or any other similarly protected status in accordance with federal, state and local laws.
We encourage interested candidates to review the key responsibilities and qualifications for each role and apply for any positions that match their skills and capabilities. Applicants in the recruitment process may be required, where applicable, to successfully complete a role-related assessment(s) and/or a pre-employment screening prior to beginning employment. To learn more, visit How we Hire.
Accommodations
General Motors offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us or call us at ************. In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.
$92k-115k yearly est. Auto-Apply 1d ago
Cyber Security Analyst
Pacific Investment Management Co 4.9
Cyber security analyst job in Austin, TX
We are a leading global asset management firm with over 3,000 employees across 20 offices in 15 countries; we help millions of investors around the world pursue their financial goals.
We hire critical thinkers. People who thrive in a collaborative culture like ours where we solve real problems while building the future of finance.
You
Are excited to be part of a vibrant engineering community that values diversity, hard work, and continuous learning.
Love solving complex real-world business problems.
Recognize that cross-functional collaboration is a core component of success for the team.
Believe there are multiple ways to solve most technical problems and are willing to debate the trade-offs.
Have become a stronger engineer by making mistakes and learning from them.
Are a doer, someone who wants to grow their career and gain experience across technologies and business functions.
We
Continuously invest in a high-performance and inclusive culture, in which a diversity of backgrounds, experiences and viewpoints are celebrated and valued.
Encourage career mobility, so you can benefit from learning different functions and technologies, and we gain the benefits of your experience across teams.
Run technology pro bono programs that help the non-profit community and give our engineering community opportunities to volunteer and participate.
Offer education reimbursements and ongoing training in technology, communication, and diversity & inclusion.
Embrace knowledge sharing through lunch-and-learns, demos, and technical forums.
Consider our people to be our greatest asset-we will help you learn what PIMCO Technology has to offer so you can participate in activities that benefit your career while delivering impactful technology solutions.
The PIMCO Information Security Organization is seeking a GRC Analyst to support key governance, risk, and compliance initiatives. This role is ideal for a candidate with strong organizational and analytical skills, a foundational understanding of cybersecurity principles, and a proactive approach to supporting cross-functional teams.
The analyst will be responsible for managing cybersecurity-related projects, maintaining and enhancing cyber metrics and reporting, assisting in the completion of client due diligence questionnaires (DDQs), and supporting the GRC team in preparing reports and presentation materials. The role requires a detail-oriented individual who can thrive in a fast-paced environment and contribute to the continuous improvement of GRC processes.
Responsibilities
Coordinate and manage cybersecurity-related projects.
Maintain and enhance cyber metrics, dashboards, and reporting frameworks.
Assist in the completion of client DDQs and other external assurance requests.
Support the GRC team in updating internal reports and compiling presentation decks.
Collaborate with stakeholders to ensure timely and accurate delivery of GRC outputs.
Contribute to process optimization and documentation efforts across cybersecurity workstreams.
Required Experience
Bachelor's degree in computer science, Information Systems, Cybersecurity, or related field.
1-5 years of experience in cybersecurity, GRC, or IT risk management.
Proficiency in Microsoft Excel and PowerPoint.
Excellent written and verbal communication skills.
Ability to manage multiple priorities and deliver under tight deadlines.
Familiarity with cybersecurity frameworks and risk management principles.
Desired Certifications: CompTIA Security+, CRISC, PMP, or similar.
PIMCO follows a total compensation approach when rewarding employees which includes a base salary and a discretionary bonus. Base salary is the fixed component of compensation that is determined by core job responsibilities, relevant experience, internal level, and market factors. The discretionary bonus is used to award performance and therefore is determined by company, business, team, and individual performance.
Salary Range: $ 90,000.00 - $ 100,000.00
Equal Employment Opportunity and Affirmative Action Statement
PIMCO recruits and hires qualified candidates without regard to race, national origin, ancestry, religion (including religious dress and grooming practices), sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), sexual orientation, gender (including gender identity and expression), age, military or veteran status, disability (physical or mental), any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity and affirmative action, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other basis such as medical condition, or marital status under applicable laws.
Applicants with Disabilities
PIMCO is an Equal Employment Opportunity/Affirmative Action employer. We provide reasonable accommodation for qualified individuals with disabilities, including veterans, in job application procedures. If you have any difficulty using our online system due to a disability and you would like to request an accommodation, you may contact us at ************ and leave a message. This is a dedicated line designed exclusively to assist job seekers with disabilities to apply online. Only messages left for this purpose will be considered. A response to your request may take up to two business days.
$90k-100k yearly Auto-Apply 1d ago
Network Security Analyst III
Stratacuity
Cyber security analyst job in Austin, TX
If you are interested in applying for this role, please email your resume to Maddie Watt at [email protected] Job Title: Network SecurityAnalyst III Client Type: Government - Transportation and Infrastructure Contract Length: 12 months - potential to extend or convert
Location: Austin, TX - On-site 4x per week
Rate: up to $100/hr.
Location notes: Candidates must reside in Texas. Preference for Austin-based candidates, but exceptional candidates elsewhere in Texas will be considered.
About the Role
Our client is looking for a seasoned Network SecurityAnalyst 3 to join their cybersecurity team. This role focuses on supervising and managing the Cybersecurity Operations Tools Team, ensuring the resilience and administration of critical security tools, and supporting incident response activities. You'll work under minimal supervision with significant latitude for independent judgment.
What You'll Do
* Oversee and assist in managing the Cybersecurity Operations Tools Team (8 contractors).
* Administer and maintain cybersecurity tools to ensure operational resilience.
* Provide real-time data, metrics, and incident input for CSOC monitoring and response.
* Support daily operations and incident response activities.
* Deliver tooling input for monthly and annual reporting.
* Recommend improvements for operational resilience and cybersecurity maturity.
* Plan and manage deployment and operation of security toolsets.
* Assist in managing ongoing cybersecurity programs (e.g., tabletop exercises).
Areas of Service Include:
* Custom Managed Scanning Services
* Custom Managed Endpoint Protection
* Managed CISCO Secure Network Analytics Service
* SIEM Administration
Required Qualifications
* 8+ years technical team management experience.
* 8+ years deploying and configuring network security monitoring and incident response tools (EDR, Scanners, SIEM, NetFlow, etc.).
* 8+ years administering network security monitoring and incident response tools.
* 8+ years' experience in intrusion detection and incident response activities.
* Strong professional communication and reporting skills.
* Experience with Wiz cloud management (required).
Preferred Qualifications
* 8+ years' experience with CISCO security suite of tools.
* 8+ years' experience with Microsoft EDR tools.
* 8+ years' experience with Microsoft Sentinel.
* 8+ years' experience with Tenable suite of tools.
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details.
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide.
Employee Type:
Contract
Location:
Austin, TX, US
Job Type:
Date Posted:
December 17, 2025
Similar Jobs
* Network Security Engineer
* Network Security Engineer
* IT Security Specialist III
* IT Business Analyst III
* Network Operations Analyst
$67k-91k yearly est. 3d ago
Network Security Analyst
Techtalenthunt
Cyber security analyst job in Austin, TX
Requirement details: Internal job ID:TWK_2002 Network SecurityAnalyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state
EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only.
Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification.
Job Description:
This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security
SKILLS AND QUALIFICATIONS
Years Required Experience
2 Required Information security analysis work or related IT security work
4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally
2 Preferred with a cybersecurity architecture and data flow documentation
2 Preferred with a Vulnerability Management programs
2 Preferred doing web application security scans/assessments
2 Preferred with custom dashboards and/or configurations of SIEM tools
2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
$67k-91k yearly est. 60d+ ago
Senior Security Analyst
Tricentis USA Corp
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. 5d ago
Senior Security Analyst
Tricentis Gmbh
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. Auto-Apply 6d ago
TCEQ - Information Security Analyst
Capps
Cyber security analyst job in Austin, TX
TCEQ - Information SecurityAnalyst (00055197) Organization: TEXAS COMMISSION ON ENVIRONMENTAL QUALITY Primary Location: Texas-Austin Work Locations: Headquarters (582-HQAUS) 12100 Park 35 Circle Austin 78753 Job: Computer and Mathematical Employee Status: Regular Schedule: Full-time Standard Hours Per Week: 40.
00 State Job Code: 0230 Salary Admin Plan: B Grade: 18 Salary (Pay Basis): 4,454.
00 - 4,454.
00 (Monthly) Number of Openings: 1 Overtime Status: Non-exempt Job Posting: Jan 16, 2026, 9:37:06 AM Closing Date: Jan 30, 2026, 11:59:00 PM Description Are you an experienced Information SecurityAnalyst, ready for a unique opportunity to grow with an environmental state agency? Join TCEQ! We bring passion and drive to carry out our mission of protecting our state's public health and natural resources.
YOUR FUTURE TEAMAs part of TCEQ Administrative Services, you would help support the logistical and operational structure for TCEQ statewide -- the business foundation for the whole agency.
See details about what we do.
This position is a member of our Cybersecurity Division.
HERE'S WHAT YOU'LL BE DOINGPerform the management of the agency's cybersecurity awareness program and provide IT security support for the Cybersecurity team of the Texas Commission on Environmental Quality (TCEQ).
Lead the cybersecurity training program in achieving compliance with state requirements.
Assist Human Resources and Staff Services (HRSS) in selecting a Department of Information Resources (DIR) certified cybersecuritysecurity training course for all Full-Time Employees (FTEs).
Administer and manage a learning managed system for non-FTEs to ensure training compliance.
Provide reports throughout the year to support cybersecurity training program.
Develop and deliver training materials and sessions to educate employees on security policies and best practices.
Work with the cybersecurity team, Data Management and Privacy Officers to tailor content to specific operational areas.
Promote cybersecurity awareness through staff events, such as October Cybersecurity Awareness Month.
Administer software used to support security awareness through phishing campaigns.
Develop and execute phishing campaigns to test security measures and educate employees on phishing tactics.
Monitor the effectiveness of the phishing campaigns and report findings to the Chief Information Security Officer.
Monitor, document and track security questions and incidents sent to agency security mailbox.
Analyze phishing and spam incidents and take required measures to block identified threat actor.
Qualifications KEY QUALIFICATIONSExperience with training development in an IT or Cybersecurity setting.
Experience with phishing campaigns.
Experience analyzing email for phishing.
REQUIRED EDUCATION & EXPERIENCETwo (2) years full-time experience in data processing OR assisting users in computer application use OR in troubleshooting computer systems problems (hardware/software).
ORFifteen semester hours in computer science from an accredited college or university, or 300 clock hours in computer science from a licensed vocational, technical, or business school, plus one (1) year of full-time experience in data processing OR assisting users in computer application use OR troubleshooting computer systems problems (hardware/software).
ORAn associate degree or higher in computer science.
OROne (1) year of full-time experience in TCEQ as an IT Support Specialist II.
***Employees in this classification series may research, work on, or have access to critical infrastructure, including but not limited to a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.
See Tex.
Business & Commerce Code Section 117.
001(2).
Accordingly, the ability to maintain the security or integrity of the infrastructure is a requirement to be hired for and to continue to be employed with TCEQ.
TRANSCRIPT/ COLLEGE HOURS or COURSE WORK See instructions on how to attach documents.
A copy of your official college transcript or evaluation of foreign credentials in CAPPS is required if needed to meet the qualifications listed above.
WORK SCHEDULEStandard business hours are M-F, 8:00 a.
m.
- 5:00 p.
m.
Individual and work group schedule determined by the TCEQ Cybersecurity Division.
BENEFITSOptional 401(k) and 457 plans Insurance: Health, Vision, Dental, and optional FSAPaid day(s) off from work on national holidays and holidays that the state observes Professional development opportunities Longevity pay based on your number of years working for the state Wellness Program and ActivitiesOnsite Nurse Practitioner in HQWork-Life BalanceCONDITION OF EMPLOYMENTTCEQ will conduct a criminal history records search, driving history (if required for the job) on candidates offered employment.
In compliance with ADA, if you need any special accommodations during the employment process, please contact HRSS for assistance at **************.
MILITARY OCCUPATIONAL SPECIALTY (MOS) CODESM.
O.
S.
codes can be found at: ***********
sao.
texas.
gov/CompensationSystem/JobDescriptions/ Please click the hyperlink under ‘Occupational Category' for the respective Class Title.
Texas Commission on Environmental Quality is an Equal Opportunity Employer.
$75k-108k yearly est. Auto-Apply 8h ago
Junior Information Security Analyst #2925
Genius Road
Cyber security analyst job in Austin, TX
Junior Information SecurityAnalyst 12 month Contract (with strong potential for extension and career advancement) Our client is seeking a Junior Information SecurityAnalyst to assist in supporting and enhancing cybersecurity initiatives across their organization. This role will focus on implementing and monitoring security controls aligned with the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards.
This is a great opportunity for an early-career professional eager to gain deep experience in information security within an enterprise environment.
Required Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field
Security certifications such as CompTIA Security+, GSEC, or equivalent
2+ years of experience in information security, cybersecurity, or a related IT field
Working knowledge of common security frameworks including:
NIST Risk Management Framework (RMF)
NIST Cybersecurity Framework (CSF)
Texas Information Security Standards
Experience with basic project planning and system development methodologies
Strong analytical, communication, and documentation skills
Ability to work independently with minimal supervisio
Familiarity with enterprise-level IT systems or public-sector environments is highly preferred
Key Responsibilities:
Assist in implementing and monitoring security measures across systems and applications
Support security risk assessments and compliance reviews
Help maintain and document security policies, procedures, and standards
Coordinate with internal teams and external vendors on security initiatives
Assist in identifying and recommending improvements to existing security processes
Participate in incident response and audit support activities
Support research and evaluation of emerging cybersecurity tools and technologies
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
$75k-108k yearly est. 60d+ ago
Information Systems Security Officer (ISSO)
Saronic
Cyber security analyst job in Austin, TX
Saronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms. We are seeking an experienced ISSO to lead the stand-up, accreditation, and continuous monitoring of classified networks in support of U.S. Government customers. The ideal candidate has direct, hands-on experience securing Authorities to Operate (ATO) for SIPRNet (DCSA) and JWICS (Navy/IC) environments, with proven expertise managing ATO lifecycles across the DOW, IC, and specific Navy stakeholders. Experience with CWAN and/or enabling Defense Contractors to build compliant, customer-aligned classified enclaves is preferred.
This role reports to the Industrial Security Manager and works closely with Cybersecurity, Information Technology, Business Development, and Growth Teams to deliver accredited classified capabilities on time and within scope.
Key Responsibilities
* Serve as the primary ISSO for SIPRNet (DCSA) and JWICS (Navy/IC) ATO packages, including RMF workflow in eMASS, Xacta, or equivalent.
* Lead ATO development, submission, assessment, and authorization with DCSA, Navy AO/DAO, and IC CAFs (e.g., DIA, NSA, NRO).
SOCOM-Specific Functions
Author and maintain USSOCOM 10-702 RMF overlays for SOF-unique systems (e.g., SOFNET, SOF-IA, Mission Command Systems).Manage ATO packages under SOCOM's J6/J39 using eMASS Enterprise and SOCOM's Risk Management Framework Process Guide.Coordinate with TSOC ISSMs and Component Command Validators for deployment of classified SOF enclaves worldwide.
Navy-Specific Functions
Interface directly with NAVCYBERFOR, FLTCYBERCOM, and SPAWAR/NAVWAR for CANES, ADNS, and ISNS integration into contractor JWICS drops.Execute Navy RMF per NAVSEA 9400 series and SECNAV M-5239.2 for ship-to-shore and afloat classified networks.Manage JWICS ATOs under Navy DAO (OPNAV N2N6), including Type-1 encryption and NSA Commercial Solutions for Classified (CSfC) implementations.
SAP/SCI Environment Functions
Act as SAP ISSO for Special Access Programs (SAP) under DoD SAPCO, Service SAPCOs, and IC SAPCOs.Participate in the development of SAP Security Plans (SAPSP), Fixed Facility Checklists (FFC), and TEMPEST addendums for SAP facilities.Oversee SAP network carve-outs, air-gapped systems, and bilateral SAP-to-SCI cross-domain transfers.Manage classified network stand-up for Defense Contractor facilities, including: Design and implementation of secure enclaves (SIPR, JWICS, CWAN, SAP) Cross-domain solutions (CDS), VTC, and secure voice Compliance with ICD 503, JSIG, NISPOM, DAAPM, and CNSSI 1253 Oversee continuous monitoring, POA&M management, and annual re-accreditation for CWAN-connected systems and/or SAP collateral networks. Coordinate with Navy SPAWAR, NRO, DISA, SOCOM J6, and IC customers to align technical solutions with mission requirements. Conduct security audits, vulnerability scans (ACAS), STIG compliance, and incident response for classified systems. Mentor junior ISSOs and interface with CPSO/FSO on physical, personnel, and COMSEC requirements.
Required Qualifications
* 5+ years as ISSO in classified DoD/IC environments (SIPR/JWICS and SAP mandatory).
* Direct experience obtaining and maintaining ATOs with:
* DCSA for SIPRNet
* DOW for JWICS
* CWAN-connected networks
* USSOCOM or SAP AOs for SOF/SAP systems
* Proficiency with RMF, eMASS, Xacta 360, SOCOM 10-702 overlays, and SCAP/STIGs.
* Current DoD 8570 IAT/IAM Level III certification (e.g., CISSP, CISM, GSLC).
* Active TS/SCI with Full-Scope Poly (or CI Poly with ability to obtain FS).
* Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience).
* Travel: Occasional (10-15%)
Preferred Qualifications
* Prior CWAN and SOCOM SOFNET accreditation and operations experience.
* Experience with Navy FLTCYBERCOM, SPAWAR, ONR, or SOCOM J39 classified programs.
* Familiarity with CDS (ISSE Guard, Radiant Mercury), CSfC, and secure VTC (SVTC).
* SAP ISSM training (e.g., CDSE SAP Security Management) and ICD 705 SCIF accreditation experience.
* Experience supporting Defense Contractors in building customer-dedicated classified networks (e.g., SCIF-in-SCIF, dedicated JWICS/SAP drops).
Physical Demands
* Prolonged periods of sitting at a desk and working on a computer
* Occasional standing and walking within the office and production environments
* Manual dexterity to operate a computer keyboard, mouse, and other office equipment
* Visual acuity to read screens, documents, and reports
* Occasional reaching, bending, or stooping
* Lifting and carrying items up to 20 pounds
Benefits
* Medical Insurance: Comprehensive health insurance plans covering a range of services
* Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care
* Saronic pays 100% of the premium for employees and 80% for dependents
* Time Off: Generous PTO and Holidays
* Parental Leave: Paid maternity and paternity leave to support new parents
* Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses
* Retirement Plan: 401(k) plan
* Stock Options: Equity options to give employees a stake in the company's success
* Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage
* Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require "U.S. Person" status. As defined by U.S. law, individuals who are any one of the following are considered to be a "U.S. Person": (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) .
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
$72k-100k yearly est. 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Austin, TX
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Security Analyst I P68
Texas A&M International University 4.0
Cyber security analyst job in Austin, TX
Job Title SecurityAnalyst I P68 Agency Texas A&M University System Offices Department Cyber Operations Proposed Minimum Salary Commensurate Job Type Staff The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 12 universities, a comprehensive health science center, nine state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond.
The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan to include an employer contribution through Teachers Retirement System of Texas (TRS); if applicable, a defined contribution retirement plan to include an employer contribution through an approved ORP vendor: additional voluntary tax deferred annuity (TDA) options; tuition assistance; and wellness programs to promote work/life balance.
Salary:
$3,896.88 - $5,416.66 per month commensurate with experience.
Job Description Summary:
The SecurityAnalyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The securityanalyst's primary focus will be investigating and responding to cyber threats.
Responsibilities:
* Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
* Document and escalate incidents that may cause ongoing and immediate impact to the environment.
* Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
* Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
* Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
* Other duties as assigned.
Education and Experience:
* Bachelor's degree in applicable field or equivalent combination of education and experience.
* Four months of information technology, information security or cybersecurity work experience.
Knowledge, Skills and Abilities:
* Knowledge of computer networking concepts and protocols, and network security methodologies.
* Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
* Knowledge of cyber threats and vulnerabilities.
* Knowledge of adversarial tactics, techniques, and procedures.
* Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
* Skilled in researching vulnerabilities and exploits utilized in traffic.
* Skilled in using protocol analyzers.
* Skilled in performing packet-level analysis.
* Skilled in technical writing.
* Skilled in preserving evidence integrity according to standard operating procedures or national standards.
* Ability to interpret the information collected by network and host detection tools.
* Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
* Ability to multi-task and work cooperatively with others.
Other Requirements:
This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being rejected without an option to reapply. A cover letter and resume may be required in addition to a completed employment application.
All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution's verification of credentials and/or other information required by the institution's procedures, including the completion of the criminal history check.
Equal Opportunity/Veterans/Disability Employer.
$3.9k-5.4k monthly Auto-Apply 36d ago
Security Engineer II
Procore 4.5
Cyber security analyst job in Austin, TX
We're looking for a Security Engineer II to join Procore's Security Engineering team. In this role, you'll be a key contributor, focused on building, implementing, and operating the foundational security controls that protect our platform, data, and users. Your primary goal is to help build and maintain a secure, scalable, and resilient cloud product and infrastructure.
As a Security Engineer II, you'll work with Engineering, IT, Security Operations, and GRC to apply security principles to our systems. Use your experience in cloud security, automation, and core security principles to implement and operate automated security controls across our SaaS ecosystem. This is a fantastic opportunity to grow your skills and make a real impact on protecting the data of millions of users-Apply today.
This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately.
What you'll do:
Configure and support IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments.
Implement and support automated pipelines for asset inventory and Software Bill of Materials (SBOM) generation.
Support the implementation of data protection tools and processes, including key management and encryption.
Implement secure configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows under the guidance of senior engineers.
Collaborate with Product & Technology teams to test and document resilience patterns.
Assist GRC and Internal Audit teams by gathering data and providing context on security controls.
Operate and triage alerts from security tools and platforms, and help drive remediation.
Participate in the evaluation of new security technologies and tools.
Provide on-call support on a rotational basis.
What we're looking for:
Bachelor's degree in Computer Science or equivalent practical experience.
2+ years of experience in a hands-on technical security or IT/ops role with a security focus.
Solid understanding of core security domains such as IAM, network security, and infrastructure security.
Hands-on experience with at least one major cloud provider (AWS preferred).
Hands-on experience identifying and exploiting common web/API vulnerabilities (e.g., Burp Suite usage) and secure API design.
Proficiency in scripting to automate simple security tasks or checks.
Familiarity with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM).
Experience with, or a strong desire to learn, IaC (Terraform) and container orchestration (Kubernetes).
Understanding of data protection principles, including encryption and key management.
A passion for automation and experience with scripting languages (Python, Go, or similar).
Good communication skills and a collaborative, team-oriented attitude.
Additional Information
Base Pay Range:
113,040.00 - 155,430.00 USD Annual
This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location.
This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract.
For Los Angeles County (unincorporated) Candidates:
Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act.
A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
$89k-113k yearly est. 5d ago
Cyber Threat & Response Engineer (L2)
3M Companies 4.6
Cyber security analyst job in Austin, TX
Collaborate with Innovative 3Mers Around the World Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 2, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
* Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
* Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
* Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
* Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
* Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Technical
* Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
* Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
* Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
* Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
* Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
* Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
* Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
* Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms
* Skilled in correlating data from multiple sources to identify and escalate confirmed threats
* Proficient in supporting incident response efforts and conducting initial root cause analysis
* Strong understanding of threat intelligence and its application in operational workflows
* Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
* Effective communicator with the ability to document investigations clearly and collaborate across teams
* Committed to continuous learning and development in threat detection and response
* Analytical thinker with a proactive approach to identifying and mitigating risks
* Reliable team player in a 24/7 SOC environment, contributing to operational excellence
Your Skills and Expertise
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
* Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
* High School diploma (completed and verified prior to start) and four (4) years of hands-on experience (completed and verified prior to start)
AND
* Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
* Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
* Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
* Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
* Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
* Strong analytical and problem-solving skills with attention to detail
* Effective communicator with the ability to document investigations and collaborate with cross-functional teams
* Certifications such as CompTIA Security+, CySA+, or GCIH
Work location: On site in Austin TX
Travel: May include up to 10% domestic and international
Relocation Assistance: Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well-being
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Chat with Max
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $164,612 - $201,193, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ***************************************************************
Good Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled
All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Pay & Benefits Overview: https://**********/3M/en_US/careers-us/working-at-3m/benefits/
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
How much does a cyber security analyst earn in Jollyville, TX?
The average cyber security analyst in Jollyville, TX earns between $65,000 and $119,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Jollyville, TX
$88,000
What are the biggest employers of Cyber Security Analysts in Jollyville, TX?
The biggest employers of Cyber Security Analysts in Jollyville, TX are: