Cyber security analyst jobs in Round Rock, TX - 151 jobs
All
Cyber Security Analyst
Information Systems Security Officer
Cyber Security Engineer
Information Security Engineer
Network Security Analyst
Information Security Analyst
Senior Security Analyst
Securities Analyst
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in Austin, TX
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$75k-103k yearly est. Easy Apply 7d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst
Insight Global
Cyber security analyst job in Austin, TX
The CybersecurityAnalyst will be responsible for safeguarding the organization's information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.
The ideal candidate will possess 3-5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.
Key Responsibilities
Security Operations & Monitoring
· Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.
· Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.
· Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.
Network & Infrastructure Security
· Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.
· Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.
· Perform network hardening to reduce the attack surface, following best practices and compliance standards.
Server & System Hardening
· Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.
· Review and implement secure configurations, patch management, and vulnerability remediation.
Disaster Recovery & Continuity
· Participate in DR drills and testing to validate readiness and response effectiveness.
Policy, Documentation & Compliance
· Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.
· Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 3-5 years of hands-on experience managing and securing enterprise networks and systems.
- Proven experience with:
- Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint
- Fortinet Gateways
- Duo MFA
- Server and Network Hardening
- Disaster Recovery implementation and testing
- Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles.
- Familiarity with incident response, threat intelligence, and vulnerability management processes.
- Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent).
- Experience with other routing protocols (EIGRP, BGP) and advanced firewall features.
- Familiarity with automation tools (Python, Ansible, Netmiko) for network management.
- Experience in high-availability enterprise or government environments.
$75k-103k yearly est. 47d ago
Cyber Threat & Response Engineer (L3)
3M 4.6
Cyber security analyst job in Austin, TX
**Collaborate with Innovative 3Mers Around the World** Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
**This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.**
**The Impact You Will Make in this Role**
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
**Management**
+ Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
+ Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
+ Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
+ Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
+ Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
**Technical**
+ Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
+ Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
+ Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
+ Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
**Organizational**
+ Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
+ Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
+ Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
+ Senior-level expertise in leading complex investigations and responding to advanced cyber threats
+ Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments
+ Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors
+ Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain
+ Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
+ Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC
+ Experienced in coordinating incident response efforts and communicating findings to stakeholders
+ Committed to continuous improvement of SOC processes, playbooks, and detection capabilities
+ Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity
**Your Skills and Expertise**
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
+ Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
+ High School diploma (completed and verified prior to start) and four (4) years of hands-on experience
AND
+ Five (5) years of experience in a SOC or cybersecurity operations role, with at least (2) two years in a senior or L3 capacity in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
+ Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
+ Familiarity with threat intelligence, advanced malware analysis, and log correlation techniques
+ Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
+ Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
+ Strong analytical and problem-solving skills with attention to detail
+ Effective communicator with the ability to document investigations and collaborate with cross-functional teams
+ Certifications such as CompTIA Security+, CySA+, or GCIH
**Work location: On site in** **Austin TX**
**Travel:** **May include up to 10** **% domestic and international**
**Relocation Assistance:** **Is Authorized**
**Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).**
**Supporting Your Well-being**
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
**Chat with Max**
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $188,251 - $230,084, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ****************************************************************
Good Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled
All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Pay & Benefits Overview: https://**********/3M/en\_US/careers-us/working-at-3m/benefits/
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
**Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.**
**3M Global Terms of Use and Privacy Statement**
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here (************************************************************************************************* , select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
At 3M we apply science in collaborative ways to improve lives daily as our employees connect with customers all around the world. Learn more about 3M's creative solutions to global challenges at ********** or on Twitter @3M or @3MNews.
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
**The Role:** As a Senior CyberSecurity Engineer, you will play a critical role in safeguarding General Motors' automotive computer systems and embedded platforms against evolving cyber threats. This position focuses on the design, implementation, and maintenance of robust security services within a dynamic, high-stakes environment.
**What You'll Do:**
+ Technical Leadership: Lead the technical aspects of the application onboarding process, including the design, development, and implementation of authentication and authorization protocols (e.g., SAML, OAuth, OpenID Connect).
+ Onboarding Strategy: Develop and execute a comprehensive onboarding strategy that aligns with the overall goals of the CyberSecurity and IAM teams, ensuring secure and efficient integration of applications.
+ Collaboration: Work closely with application owners, developers, and business stakeholders to gather requirements and ensure that onboarding processes meet both security and business needs.
+ Process Improvement: Identify and implement opportunities to enhance the efficiency and effectiveness of the onboarding process, including automation and best practices.
+ Security Compliance: Ensure that all onboarded applications adhere to internal and external security policies and compliance standards, conducting risk assessments and implementing necessary controls.
+ Innovation: Stay informed on the latest trends and technologies in CyberSecurity and IAM, and incorporate innovative solutions to improve the onboarding process.
+ Mentorship: Provide guidance and mentorship to junior engineers and other team members, fostering a culture of continuous learning and professional growth.
+ Documentation: Maintain comprehensive documentation of onboarding processes, security protocols, and any custom integrations, ensuring that knowledge is easily accessible and transferable.
**Your Skills & Abilities (Required Qualifications):**
+ Bachelor's degree in CyberSecurity, Information Technology, Computer Science, or a related field. A Master's degree is preferred.
+ Minimum of 5 years of experience in CyberSecurity, with a strong focus on Identity and Access Management (IAM).
+ Proven experience in leading the integration of applications into IAM systems in a complex, enterprise environment.
+ Strong hands-on experience with authentication and authorization protocols such as SAML, OAuth, OpenID Connect.
+ Experience with automation tools and scripting languages (e.g., Python, PowerShell) to streamline processes.
+ Strong understanding of security protocols, encryption, and access control mechanisms.
+ Proficiency in Identity and Access Management platforms and tools, such as Entra ID, GCP, AWS or similar.
+ Strong problem-solving abilities, with a proactive approach to identifying and addressing challenges.
+ Leadership skills with the ability to mentor and guide junior engineers and team members.
+ Strategic thinker with a strong attention to detail and the ability to manage multiple priorities.
+ Excellent communication and collaboration skills, with the ability to work effectively with cross-functional teams and stakeholders at all levels.
**What Will Give You A Competitive Edge (Preferred Qualifications):**
+ Certifications: CISSP, CISM, CCSP, or other relevant security certifications.
+ Experience in a lead engineering role within a CyberSecurity or IAM organization.
+ Experience in project management, particularly in leading cross-functional technical initiatives.
\#LI-SB3
GM does not provide immigration-related sponsorship for this role. Do not apply for this role if you will need GM immigration sponsorship now or in the future. This includes direct company sponsorship, entry of GM as the immigration employer of record on a government form, and any work authorization requiring a written submission or other immigration support from the company (e.g., H1-B, OPT, STEM OPT, CPT, TN, J-1, etc).
This role is categorized as hybrid. This means the selected candidate is expected to report to a specific location at least 3 times a week {or other frequency dictated by their manager}.
This job may be eligible for relocation benefits.
**About GM**
Our vision is a world with Zero Crashes, Zero Emissions and Zero Congestion and we embrace the responsibility to lead the change that will make our world better, safer and more equitable for all.
**Why Join Us**
We believe we all must make a choice every day - individually and collectively - to drive meaningful change through our words, our deeds and our culture. Every day, we want every employee to feel they belong to one General Motors team.
**Benefits Overview**
From day one, we're looking out for your well-being-at work and at home-so you can focus on realizing your ambitions. Learn how GM supports a rewarding career that rewards you personally by visiting Total Rewards resources (************************************************************* .
**Non-Discrimination and Equal Employment Opportunities (U.S.)**
General Motors is committed to being a workplace that is not only free of unlawful discrimination, but one that genuinely fosters inclusion and belonging. We strongly believe that providing an inclusive workplace creates an environment in which our employees can thrive and develop better products for our customers.
All employment decisions are made on a non-discriminatory basis without regard to sex, race, color, national origin, citizenship status, religion, age, disability, pregnancy or maternity status, sexual orientation, gender identity, status as a veteran or protected veteran, or any other similarly protected status in accordance with federal, state and local laws.
We encourage interested candidates to review the key responsibilities and qualifications for each role and apply for any positions that match their skills and capabilities. Applicants in the recruitment process may be required, where applicable, to successfully complete a role-related assessment(s) and/or a pre-employment screening prior to beginning employment. To learn more, visit How we Hire (********************************************* .
**Accommodations**
General Motors offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email (Careers.Accommodations@GM.com) us or call us at ************. In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.
We are leading the change to make our world better, safer and more equitable for all through our actions and how we behave. Learn more about:
**Our Company (**************************************************
**Our Culture**
**How we hire (************************************************
Our diverse team of employees bring their collective passion for engineering, technology and design to deliver on our vision of a world with Zero Crashes, Zero Emissions and Zero Congestion. We are looking for adventure-seekers and imaginative thought leaders to help us transform mobility.
Explore our global locations (********************************************
We are determined to lead change for the world through technology, ingenuity and harnessing the creativity of our diverse team. Join us to help lead the change that will make our world better, safer and more equitable for all by becoming a member of GM's Talent Community (beamery.com) (*********************************************** . As a part of our Talent Community, you will receive updates about GM, open roles, career insights and more.
Please note that filling out the form below will not add you to our Talent Community automatically; you will need to use the link above. If you are seeking to apply to a specific role, we encourage you to click "Apply Now" on the job posting of interest.
The policy of General Motors is to extend opportunities to qualified applicants and employees on an equal basis regardless of an individual's age, race, color, sex, religion, national origin, disability, sexual orientation, gender identity/expression or veteran status. Additionally, General Motors is committed to being an Equal Employment Opportunity Employer and offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us at Careers.Accommodations@GM.com .In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.
$91k-115k yearly est. 11d ago
Network Security Analyst
Techtalenthunt
Cyber security analyst job in Austin, TX
Requirement details: Internal job ID:TWK_2002 Network SecurityAnalyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state
EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only.
Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification.
Job Description:
This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security
SKILLS AND QUALIFICATIONS
Years Required Experience
2 Required Information security analysis work or related IT security work
4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally
2 Preferred with a cybersecurity architecture and data flow documentation
2 Preferred with a Vulnerability Management programs
2 Preferred doing web application security scans/assessments
2 Preferred with custom dashboards and/or configurations of SIEM tools
2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
$67k-91k yearly est. 60d+ ago
Network Security Analyst III
Stratacuity
Cyber security analyst job in Austin, TX
If you are interested in applying for this role, please email your resume to Maddie Watt at [email protected] Job Title: Network SecurityAnalyst III Client Type: Government - Transportation and Infrastructure Contract Length: 12 months - potential to extend or convert
Location: Austin, TX - On-site 4x per week
Rate: up to $100/hr.
Location notes: Candidates must reside in Texas. Preference for Austin-based candidates, but exceptional candidates elsewhere in Texas will be considered.
About the Role
Our client is looking for a seasoned Network SecurityAnalyst 3 to join their cybersecurity team. This role focuses on supervising and managing the Cybersecurity Operations Tools Team, ensuring the resilience and administration of critical security tools, and supporting incident response activities. You'll work under minimal supervision with significant latitude for independent judgment.
What You'll Do
* Oversee and assist in managing the Cybersecurity Operations Tools Team (8 contractors).
* Administer and maintain cybersecurity tools to ensure operational resilience.
* Provide real-time data, metrics, and incident input for CSOC monitoring and response.
* Support daily operations and incident response activities.
* Deliver tooling input for monthly and annual reporting.
* Recommend improvements for operational resilience and cybersecurity maturity.
* Plan and manage deployment and operation of security toolsets.
* Assist in managing ongoing cybersecurity programs (e.g., tabletop exercises).
Areas of Service Include:
* Custom Managed Scanning Services
* Custom Managed Endpoint Protection
* Managed CISCO Secure Network Analytics Service
* SIEM Administration
Required Qualifications
* 8+ years technical team management experience.
* 8+ years deploying and configuring network security monitoring and incident response tools (EDR, Scanners, SIEM, NetFlow, etc.).
* 8+ years administering network security monitoring and incident response tools.
* 8+ years' experience in intrusion detection and incident response activities.
* Strong professional communication and reporting skills.
* Experience with Wiz cloud management (required).
Preferred Qualifications
* 8+ years' experience with CISCO security suite of tools.
* 8+ years' experience with Microsoft EDR tools.
* 8+ years' experience with Microsoft Sentinel.
* 8+ years' experience with Tenable suite of tools.
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details.
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide.
Employee Type:
Contract
Location:
Austin, TX, US
Job Type:
Date Posted:
December 17, 2025
Similar Jobs
* Network Security Engineer
* Network Security Engineer
* IT Security Specialist III
* IT Business Analyst III
* Network Operations Analyst
$67k-91k yearly est. 1d ago
Senior Security Analyst
Tricentis Gmbh
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. Auto-Apply 4d ago
Senior Security Analyst
Tricentis USA Corp
Cyber security analyst job in Austin, TX
The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment.
As a Senior SecurityAnalyst, you will be a key component of our front-line defense and overall security posture.
Responsibilities Include:
Monitoring and reacting to security events
Assisting in incident response efforts
Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms
Working with system owners and stakeholders to mitigate issues found in security assessments
Assist with governance, risk, and compliance initiatives as needed
Developing and curating threat intelligence
Working with the greater Information Security team to define and implement security policies, procedures, and controls
General awareness of developments in information security and help in guiding the company's response
Providing security expertise and advice to other teams within the company
Collaborating with other teams to solve business challenges
Basic Qualifications:
5+ years of experience in information security concepts, controls, and technology
Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options
Experience in a global SOC environment
Experience with Azure and/or AWS cloud environments
Experience with Log Management/SIEM tools
Experience with EDR, Antivirus, and security tools
Familiarity with the following security related disciplines with deep experience in several:
Vulnerability management
Forensic Analysis
Application Security
Cloud Security Posture Management
IAM
Penetration Testing
Malware analysis
Deep technical troubleshooting skills
Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc)
Technical degree, certification, and/or 5+ years of experience related to information security
Excellent communication skills, and the ability to explain security best practices to a non-technical audience
Willingness and aptitude for learning new skills and adapting to new technologies
Experience with programming and/or automation software
Why Tricentis?
Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events.
As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling.
Tricentis Core Values:
Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life.
Demonstrate Self-Awareness: Own your strengths and limitations.
Finish What We Start: Do what we say we are going to do.
Move Fast: Create momentum and efficiency.
Run Towards Change: Challenge the status quo.
Serve Our Customers & Communities: Create a positive experience with each interaction.
Solve Problems Together: We win or lose as one team.
Think Big & Believe: Set extraordinary goals and believe you can achieve them.
Why You'll Love Working at Tricentis:
Market conform salary + success-oriented bonus
Supportive and engaged leadership team
401(k) plan, full benefits package available
Company paid Disability and Life Insurance
Hybrid work environment
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran.
Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law.
Global Sanctions Compliance
We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment.
U.S. Work Authorization:
This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
$90k-121k yearly est. 3d ago
Junior Information Security Analyst #2925
Genius Road
Cyber security analyst job in Austin, TX
Junior Information SecurityAnalyst 12 month Contract (with strong potential for extension and career advancement) Our client is seeking a Junior Information SecurityAnalyst to assist in supporting and enhancing cybersecurity initiatives across their organization. This role will focus on implementing and monitoring security controls aligned with the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards.
This is a great opportunity for an early-career professional eager to gain deep experience in information security within an enterprise environment.
Required Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field
Security certifications such as CompTIA Security+, GSEC, or equivalent
2+ years of experience in information security, cybersecurity, or a related IT field
Working knowledge of common security frameworks including:
NIST Risk Management Framework (RMF)
NIST Cybersecurity Framework (CSF)
Texas Information Security Standards
Experience with basic project planning and system development methodologies
Strong analytical, communication, and documentation skills
Ability to work independently with minimal supervisio
Familiarity with enterprise-level IT systems or public-sector environments is highly preferred
Key Responsibilities:
Assist in implementing and monitoring security measures across systems and applications
Support security risk assessments and compliance reviews
Help maintain and document security policies, procedures, and standards
Coordinate with internal teams and external vendors on security initiatives
Assist in identifying and recommending improvements to existing security processes
Participate in incident response and audit support activities
Support research and evaluation of emerging cybersecurity tools and technologies
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
$75k-108k yearly est. 60d+ ago
TCEQ - Information Security Analyst
Capps
Cyber security analyst job in Austin, TX
TCEQ - Information SecurityAnalyst (00055197) Organization: TEXAS COMMISSION ON ENVIRONMENTAL QUALITY Primary Location: Texas-Austin Work Locations: Headquarters (582-HQAUS) 12100 Park 35 Circle Austin 78753 Job: Computer and Mathematical Employee Status: Regular Schedule: Full-time Standard Hours Per Week: 40.
00 State Job Code: 0230 Salary Admin Plan: B Grade: 18 Salary (Pay Basis): 4,454.
00 - 4,454.
00 (Monthly) Number of Openings: 1 Overtime Status: Non-exempt Job Posting: Jan 16, 2026, 3:37:06 PM Closing Date: Jan 31, 2026, 5:59:00 AM Description Are you an experienced Information SecurityAnalyst, ready for a unique opportunity to grow with an environmental state agency? Join TCEQ! We bring passion and drive to carry out our mission of protecting our state's public health and natural resources.
YOUR FUTURE TEAMAs part of TCEQ Administrative Services, you would help support the logistical and operational structure for TCEQ statewide -- the business foundation for the whole agency.
See details about what we do.
This position is a member of our Cybersecurity Division.
HERE'S WHAT YOU'LL BE DOINGPerform the management of the agency's cybersecurity awareness program and provide IT security support for the Cybersecurity team of the Texas Commission on Environmental Quality (TCEQ).
Lead the cybersecurity training program in achieving compliance with state requirements.
Assist Human Resources and Staff Services (HRSS) in selecting a Department of Information Resources (DIR) certified cybersecuritysecurity training course for all Full-Time Employees (FTEs).
Administer and manage a learning managed system for non-FTEs to ensure training compliance.
Provide reports throughout the year to support cybersecurity training program.
Develop and deliver training materials and sessions to educate employees on security policies and best practices.
Work with the cybersecurity team, Data Management and Privacy Officers to tailor content to specific operational areas.
Promote cybersecurity awareness through staff events, such as October Cybersecurity Awareness Month.
Administer software used to support security awareness through phishing campaigns.
Develop and execute phishing campaigns to test security measures and educate employees on phishing tactics.
Monitor the effectiveness of the phishing campaigns and report findings to the Chief Information Security Officer.
Monitor, document and track security questions and incidents sent to agency security mailbox.
Analyze phishing and spam incidents and take required measures to block identified threat actor.
Qualifications KEY QUALIFICATIONSExperience with training development in an IT or Cybersecurity setting.
Experience with phishing campaigns.
Experience analyzing email for phishing.
REQUIRED EDUCATION & EXPERIENCETwo (2) years full-time experience in data processing OR assisting users in computer application use OR in troubleshooting computer systems problems (hardware/software).
ORFifteen semester hours in computer science from an accredited college or university, or 300 clock hours in computer science from a licensed vocational, technical, or business school, plus one (1) year of full-time experience in data processing OR assisting users in computer application use OR troubleshooting computer systems problems (hardware/software).
ORAn associate degree or higher in computer science.
OROne (1) year of full-time experience in TCEQ as an IT Support Specialist II.
***Employees in this classification series may research, work on, or have access to critical infrastructure, including but not limited to a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.
See Tex.
Business & Commerce Code Section 117.
001(2).
Accordingly, the ability to maintain the security or integrity of the infrastructure is a requirement to be hired for and to continue to be employed with TCEQ.
TRANSCRIPT/ COLLEGE HOURS or COURSE WORK See instructions on how to attach documents.
A copy of your official college transcript or evaluation of foreign credentials in CAPPS is required if needed to meet the qualifications listed above.
WORK SCHEDULEStandard business hours are M-F, 8:00 a.
m.
- 5:00 p.
m.
Individual and work group schedule determined by the TCEQ Cybersecurity Division.
BENEFITSOptional 401(k) and 457 plans Insurance: Health, Vision, Dental, and optional FSAPaid day(s) off from work on national holidays and holidays that the state observes Professional development opportunities Longevity pay based on your number of years working for the state Wellness Program and ActivitiesOnsite Nurse Practitioner in HQWork-Life BalanceCONDITION OF EMPLOYMENTTCEQ will conduct a criminal history records search, driving history (if required for the job) on candidates offered employment.
In compliance with ADA, if you need any special accommodations during the employment process, please contact HRSS for assistance at **************.
MILITARY OCCUPATIONAL SPECIALTY (MOS) CODESM.
O.
S.
codes can be found at: ***********
sao.
texas.
gov/CompensationSystem/JobDescriptions/ Please click the hyperlink under ‘Occupational Category' for the respective Class Title.
Texas Commission on Environmental Quality is an Equal Opportunity Employer.
$75k-108k yearly est. Auto-Apply 13h ago
Information Systems Security Officer (ISSO)
Saronic
Cyber security analyst job in Austin, TX
Job DescriptionSaronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms. Position OverviewWe are seeking an experienced ISSO to lead the stand-up, accreditation, and continuous monitoring of classified networks in support of U.S. Government customers. The ideal candidate has direct, hands-on experience securing Authorities to Operate (ATO) for SIPRNet (DCSA) and JWICS (Navy/IC) environments, with proven expertise managing ATO lifecycles across the DOW, IC, and specific Navy stakeholders. Experience with CWAN and/or enabling Defense Contractors to build compliant, customer-aligned classified enclaves is preferred.This role reports to the Industrial Security Manager and works closely with Cybersecurity, Information Technology, Business Development, and Growth Teams to deliver accredited classified capabilities on time and within scope.Key Responsibilities
Serve as the primary ISSO for SIPRNet (DCSA) and JWICS (Navy/IC) ATO packages, including RMF workflow in eMASS, Xacta, or equivalent.
Lead ATO development, submission, assessment, and authorization with DCSA, Navy AO/DAO, and IC CAFs (e.g., DIA, NSA, NRO).
SOCOM-Specific Functions
Author and maintain USSOCOM 10-702 RMF overlays for SOF-unique systems (e.g., SOFNET, SOF-IA, Mission Command Systems).
Manage ATO packages under SOCOM's J6/J39 using eMASS Enterprise and SOCOM's Risk Management Framework Process Guide.
Coordinate with TSOC ISSMs and Component Command Validators for deployment of classified SOF enclaves worldwide.
Navy-Specific Functions
Interface directly with NAVCYBERFOR, FLTCYBERCOM, and SPAWAR/NAVWAR for CANES, ADNS, and ISNS integration into contractor JWICS drops.
Execute Navy RMF per NAVSEA 9400 series and SECNAV M-5239.2 for ship-to-shore and afloat classified networks.
Manage JWICS ATOs under Navy DAO (OPNAV N2N6), including Type-1 encryption and NSA Commercial Solutions for Classified (CSfC) implementations.
SAP/SCI Environment Functions
Act as SAP ISSO for Special Access Programs (SAP) under DoD SAPCO, Service SAPCOs, and IC SAPCOs.
Participate in the development of SAP Security Plans (SAPSP), Fixed Facility Checklists (FFC), and TEMPEST addendums for SAP facilities.
Oversee SAP network carve-outs, air-gapped systems, and bilateral SAP-to-SCI cross-domain transfers.
Manage classified network stand-up for Defense Contractor facilities, including:
Design and implementation of secure enclaves (SIPR, JWICS, CWAN, SAP)
Cross-domain solutions (CDS), VTC, and secure voice
Compliance with ICD 503, JSIG, NISPOM, DAAPM, and CNSSI 1253
Oversee continuous monitoring, POA&M management, and annual re-accreditation for CWAN-connected systems and/or SAP collateral networks.
Coordinate with Navy SPAWAR, NRO, DISA, SOCOM J6, and IC customers to align technical solutions with mission requirements.
Conduct security audits, vulnerability scans (ACAS), STIG compliance, and incident response for classified systems.
Mentor junior ISSOs and interface with CPSO/FSO on physical, personnel, and COMSEC requirements.
Required Qualifications
5+ years as ISSO in classified DoD/IC environments (SIPR/JWICS and SAP mandatory).
Direct experience obtaining and maintaining ATOs with:
DCSA for SIPRNet
DOW for JWICS
CWAN-connected networks
USSOCOM or SAP AOs for SOF/SAP systems
Proficiency with RMF, eMASS, Xacta 360, SOCOM 10-702 overlays, and SCAP/STIGs.
Current DoD 8570 IAT/IAM Level III certification (e.g., CISSP, CISM, GSLC).
Active TS/SCI with Full-Scope Poly (or CI Poly with ability to obtain FS).
Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience).
Travel: Occasional (10-15%)
Preferred Qualifications
Prior CWAN and SOCOM SOFNET accreditation and operations experience.
Experience with Navy FLTCYBERCOM, SPAWAR, ONR, or SOCOM J39 classified programs.
Familiarity with CDS (ISSE Guard, Radiant Mercury), CSfC, and secure VTC (SVTC).
SAP ISSM training (e.g., CDSE SAP Security Management) and ICD 705 SCIF accreditation experience.
Experience supporting Defense Contractors in building customer-dedicated classified networks (e.g., SCIF-in-SCIF, dedicated JWICS/SAP drops).
Physical Demands
Prolonged periods of sitting at a desk and working on a computer
Occasional standing and walking within the office and production environments
Manual dexterity to operate a computer keyboard, mouse, and other office equipment
Visual acuity to read screens, documents, and reports
Occasional reaching, bending, or stooping
Lifting and carrying items up to 20 pounds
Benefits
Medical Insurance: Comprehensive health insurance plans covering a range of services
Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care
Saronic pays 100% of the premium for employees and 80% for dependents
Time Off: Generous PTO and Holidays
Parental Leave: Paid maternity and paternity leave to support new parents
Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses
Retirement Plan: 401(k) plan
Stock Options: Equity options to give employees a stake in the company's success
Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage
Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) .
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
$72k-100k yearly est. 17d ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Cyber security analyst job in Austin, TX
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cybersecurity and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cybersecurity policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cybersecurity risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
$72k-100k yearly est. Auto-Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Austin, TX
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d ago
Security Analyst I P68
Texas A&M International University 4.0
Cyber security analyst job in Austin, TX
Job Title SecurityAnalyst I P68 Agency Texas A&M University System Offices Department Cyber Operations Proposed Minimum Salary Commensurate Job Type Staff The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 12 universities, a comprehensive health science center, nine state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond.
The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan to include an employer contribution through Teachers Retirement System of Texas (TRS); if applicable, a defined contribution retirement plan to include an employer contribution through an approved ORP vendor: additional voluntary tax deferred annuity (TDA) options; tuition assistance; and wellness programs to promote work/life balance.
Salary:
$3,896.88 - $5,416.66 per month commensurate with experience.
Job Description Summary:
The SecurityAnalyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The securityanalyst's primary focus will be investigating and responding to cyber threats.
Responsibilities:
* Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
* Document and escalate incidents that may cause ongoing and immediate impact to the environment.
* Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
* Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
* Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
* Other duties as assigned.
Education and Experience:
* Bachelor's degree in applicable field or equivalent combination of education and experience.
* Four months of information technology, information security or cybersecurity work experience.
Knowledge, Skills and Abilities:
* Knowledge of computer networking concepts and protocols, and network security methodologies.
* Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
* Knowledge of cyber threats and vulnerabilities.
* Knowledge of adversarial tactics, techniques, and procedures.
* Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
* Skilled in researching vulnerabilities and exploits utilized in traffic.
* Skilled in using protocol analyzers.
* Skilled in performing packet-level analysis.
* Skilled in technical writing.
* Skilled in preserving evidence integrity according to standard operating procedures or national standards.
* Ability to interpret the information collected by network and host detection tools.
* Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
* Ability to multi-task and work cooperatively with others.
Other Requirements:
This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being rejected without an option to reapply. A cover letter and resume may be required in addition to a completed employment application.
All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution's verification of credentials and/or other information required by the institution's procedures, including the completion of the criminal history check.
Equal Opportunity/Veterans/Disability Employer.
$3.9k-5.4k monthly Auto-Apply 34d ago
Cyber Threat & Response Engineer (L2)
3M 4.6
Cyber security analyst job in Austin, TX
Collaborate with Innovative 3Mers Around the World
Choosing where to start and grow your career has a major impact on your professional and personal life, so it's equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer - Level 2, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you'll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you'll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay.
We're looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you're ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents-keeping attackers on the run.
Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Technical
Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary:
Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms
Skilled in correlating data from multiple sources to identify and escalate confirmed threats
Proficient in supporting incident response efforts and conducting initial root cause analysis
Strong understanding of threat intelligence and its application in operational workflows
Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
Effective communicator with the ability to document investigations clearly and collaborate across teams
Committed to continuous learning and development in threat detection and response
Analytical thinker with a proactive approach to identifying and mitigating risks
Reliable team player in a 24/7 SOC environment, contributing to operational excellence
Your Skills and Expertise
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
High School diploma (completed and verified prior to start) and four (4) years of hands-on experience (completed and verified prior to start)
AND
Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
Strong analytical and problem-solving skills with attention to detail
Effective communicator with the ability to document investigations and collaborate with cross-functional teams
Certifications such as CompTIA Security+, CySA+, or GCIH
Work location: On site in Austin TX
Travel: May include up to 10% domestic and international
Relocation Assistance: Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well-being
3M offers many programs to help you live your best life - both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Chat with Max
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Applicable to US Applicants Only:The expected compensation range for this position is $164,612 - $201,193, which includes base pay plus variable incentive pay, if eligible. This range represents a good faith estimate for this position. The specific compensation offered to a candidate may vary based on factors including, but not limited to, the candidate's relevant knowledge, training, skills, work location, and/or experience. In addition, this position may be eligible for a range of benefits (e.g., Medical, Dental & Vision, Health Savings Accounts, Health Care & Dependent Care Flexible Spending Accounts, Disability Benefits, Life Insurance, Voluntary Benefits, Paid Absences and Retirement Benefits, etc.). Additional information is available at: ******************************************************************* Faith Posting Date Range 12/19/2025 To 01/18/2026 Or until filled All US-based 3M full time employees will need to sign an employee agreement as a condition of employment with 3M. This agreement lays out key terms on using 3M Confidential Information and Trade Secrets. It also has provisions discussing conflicts of interest and how inventions are assigned. Employees that are Job Grade 7 or equivalent and above may also have obligations to not compete against 3M or solicit its employees or customers, both during their employment, and for a period after they leave 3M.Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.Responsibilities of this position include that corporate policies, procedures and security standards are complied with while performing assigned duties.Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.Pay & Benefits Overview: https://**********/3M/en_US/careers-us/working-at-3m/benefits/3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
The Role: As a Senior CyberSecurity Engineer, you will play a critical role in safeguarding General Motors' automotive computer systems and embedded platforms against evolving cyber threats. This position focuses on the design, implementation, and maintenance of robust security services within a dynamic, high-stakes environment.
What You'll Do:
* Technical Leadership: Lead the technical aspects of the application onboarding process, including the design, development, and implementation of authentication and authorization protocols (e.g., SAML, OAuth, OpenID Connect).
* Onboarding Strategy: Develop and execute a comprehensive onboarding strategy that aligns with the overall goals of the CyberSecurity and IAM teams, ensuring secure and efficient integration of applications.
* Collaboration: Work closely with application owners, developers, and business stakeholders to gather requirements and ensure that onboarding processes meet both security and business needs.
* Process Improvement: Identify and implement opportunities to enhance the efficiency and effectiveness of the onboarding process, including automation and best practices.
* Security Compliance: Ensure that all onboarded applications adhere to internal and external security policies and compliance standards, conducting risk assessments and implementing necessary controls.
* Innovation: Stay informed on the latest trends and technologies in CyberSecurity and IAM, and incorporate innovative solutions to improve the onboarding process.
* Mentorship: Provide guidance and mentorship to junior engineers and other team members, fostering a culture of continuous learning and professional growth.
* Documentation: Maintain comprehensive documentation of onboarding processes, security protocols, and any custom integrations, ensuring that knowledge is easily accessible and transferable.
Your Skills & Abilities (Required Qualifications):
* Bachelor's degree in CyberSecurity, Information Technology, Computer Science, or a related field. A Master's degree is preferred.
* Minimum of 5 years of experience in CyberSecurity, with a strong focus on Identity and Access Management (IAM).
* Proven experience in leading the integration of applications into IAM systems in a complex, enterprise environment.
* Strong hands-on experience with authentication and authorization protocols such as SAML, OAuth, OpenID Connect.
* Experience with automation tools and scripting languages (e.g., Python, PowerShell) to streamline processes.
* Strong understanding of security protocols, encryption, and access control mechanisms.
* Proficiency in Identity and Access Management platforms and tools, such as Entra ID, GCP, AWS or similar.
* Strong problem-solving abilities, with a proactive approach to identifying and addressing challenges.
* Leadership skills with the ability to mentor and guide junior engineers and team members.
* Strategic thinker with a strong attention to detail and the ability to manage multiple priorities.
* Excellent communication and collaboration skills, with the ability to work effectively with cross-functional teams and stakeholders at all levels.
What Will Give You A Competitive Edge (Preferred Qualifications):
* Certifications: CISSP, CISM, CCSP, or other relevant security certifications.
* Experience in a lead engineering role within a CyberSecurity or IAM organization.
* Experience in project management, particularly in leading cross-functional technical initiatives.
#LI-SB3
GM does not provide immigration-related sponsorship for this role. Do not apply for this role if you will need GM immigration sponsorship now or in the future. This includes direct company sponsorship, entry of GM as the immigration employer of record on a government form, and any work authorization requiring a written submission or other immigration support from the company (e.g., H1-B, OPT, STEM OPT, CPT, TN, J-1, etc).
This role is categorized as hybrid. This means the selected candidate is expected to report to a specific location at least 3 times a week {or other frequency dictated by their manager}.
This job may be eligible for relocation benefits.
About GM
Our vision is a world with Zero Crashes, Zero Emissions and Zero Congestion and we embrace the responsibility to lead the change that will make our world better, safer and more equitable for all.
Why Join Us
We believe we all must make a choice every day - individually and collectively - to drive meaningful change through our words, our deeds and our culture. Every day, we want every employee to feel they belong to one General Motors team.
Benefits Overview
From day one, we're looking out for your well-being-at work and at home-so you can focus on realizing your ambitions. Learn how GM supports a rewarding career that rewards you personally by visiting Total Rewards resources.
Non-Discrimination and Equal Employment Opportunities (U.S.)
General Motors is committed to being a workplace that is not only free of unlawful discrimination, but one that genuinely fosters inclusion and belonging. We strongly believe that providing an inclusive workplace creates an environment in which our employees can thrive and develop better products for our customers.
All employment decisions are made on a non-discriminatory basis without regard to sex, race, color, national origin, citizenship status, religion, age, disability, pregnancy or maternity status, sexual orientation, gender identity, status as a veteran or protected veteran, or any other similarly protected status in accordance with federal, state and local laws.
We encourage interested candidates to review the key responsibilities and qualifications for each role and apply for any positions that match their skills and capabilities. Applicants in the recruitment process may be required, where applicable, to successfully complete a role-related assessment(s) and/or a pre-employment screening prior to beginning employment. To learn more, visit How we Hire.
Accommodations
General Motors offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us or call us at ************. In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.
$91k-115k yearly est. Auto-Apply 11d ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Cyber security analyst job in Austin, TX
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cybersecurity and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cybersecurity policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cybersecurity risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$72k-100k yearly est. Easy Apply 6d ago
Information Systems Security Officer (ISSO)
Saronic
Cyber security analyst job in Austin, TX
Saronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms. We are seeking an experienced ISSO to lead the stand-up, accreditation, and continuous monitoring of classified networks in support of U.S. Government customers. The ideal candidate has direct, hands-on experience securing Authorities to Operate (ATO) for SIPRNet (DCSA) and JWICS (Navy/IC) environments, with proven expertise managing ATO lifecycles across the DOW, IC, and specific Navy stakeholders. Experience with CWAN and/or enabling Defense Contractors to build compliant, customer-aligned classified enclaves is preferred.
This role reports to the Industrial Security Manager and works closely with Cybersecurity, Information Technology, Business Development, and Growth Teams to deliver accredited classified capabilities on time and within scope.
Key Responsibilities
* Serve as the primary ISSO for SIPRNet (DCSA) and JWICS (Navy/IC) ATO packages, including RMF workflow in eMASS, Xacta, or equivalent.
* Lead ATO development, submission, assessment, and authorization with DCSA, Navy AO/DAO, and IC CAFs (e.g., DIA, NSA, NRO).
SOCOM-Specific Functions
Author and maintain USSOCOM 10-702 RMF overlays for SOF-unique systems (e.g., SOFNET, SOF-IA, Mission Command Systems).Manage ATO packages under SOCOM's J6/J39 using eMASS Enterprise and SOCOM's Risk Management Framework Process Guide.Coordinate with TSOC ISSMs and Component Command Validators for deployment of classified SOF enclaves worldwide.
Navy-Specific Functions
Interface directly with NAVCYBERFOR, FLTCYBERCOM, and SPAWAR/NAVWAR for CANES, ADNS, and ISNS integration into contractor JWICS drops.Execute Navy RMF per NAVSEA 9400 series and SECNAV M-5239.2 for ship-to-shore and afloat classified networks.Manage JWICS ATOs under Navy DAO (OPNAV N2N6), including Type-1 encryption and NSA Commercial Solutions for Classified (CSfC) implementations.
SAP/SCI Environment Functions
Act as SAP ISSO for Special Access Programs (SAP) under DoD SAPCO, Service SAPCOs, and IC SAPCOs.Participate in the development of SAP Security Plans (SAPSP), Fixed Facility Checklists (FFC), and TEMPEST addendums for SAP facilities.Oversee SAP network carve-outs, air-gapped systems, and bilateral SAP-to-SCI cross-domain transfers.Manage classified network stand-up for Defense Contractor facilities, including: Design and implementation of secure enclaves (SIPR, JWICS, CWAN, SAP) Cross-domain solutions (CDS), VTC, and secure voice Compliance with ICD 503, JSIG, NISPOM, DAAPM, and CNSSI 1253 Oversee continuous monitoring, POA&M management, and annual re-accreditation for CWAN-connected systems and/or SAP collateral networks. Coordinate with Navy SPAWAR, NRO, DISA, SOCOM J6, and IC customers to align technical solutions with mission requirements. Conduct security audits, vulnerability scans (ACAS), STIG compliance, and incident response for classified systems. Mentor junior ISSOs and interface with CPSO/FSO on physical, personnel, and COMSEC requirements.
Required Qualifications
* 5+ years as ISSO in classified DoD/IC environments (SIPR/JWICS and SAP mandatory).
* Direct experience obtaining and maintaining ATOs with:
* DCSA for SIPRNet
* DOW for JWICS
* CWAN-connected networks
* USSOCOM or SAP AOs for SOF/SAP systems
* Proficiency with RMF, eMASS, Xacta 360, SOCOM 10-702 overlays, and SCAP/STIGs.
* Current DoD 8570 IAT/IAM Level III certification (e.g., CISSP, CISM, GSLC).
* Active TS/SCI with Full-Scope Poly (or CI Poly with ability to obtain FS).
* Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience).
* Travel: Occasional (10-15%)
Preferred Qualifications
* Prior CWAN and SOCOM SOFNET accreditation and operations experience.
* Experience with Navy FLTCYBERCOM, SPAWAR, ONR, or SOCOM J39 classified programs.
* Familiarity with CDS (ISSE Guard, Radiant Mercury), CSfC, and secure VTC (SVTC).
* SAP ISSM training (e.g., CDSE SAP Security Management) and ICD 705 SCIF accreditation experience.
* Experience supporting Defense Contractors in building customer-dedicated classified networks (e.g., SCIF-in-SCIF, dedicated JWICS/SAP drops).
Physical Demands
* Prolonged periods of sitting at a desk and working on a computer
* Occasional standing and walking within the office and production environments
* Manual dexterity to operate a computer keyboard, mouse, and other office equipment
* Visual acuity to read screens, documents, and reports
* Occasional reaching, bending, or stooping
* Lifting and carrying items up to 20 pounds
Benefits
* Medical Insurance: Comprehensive health insurance plans covering a range of services
* Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care
* Saronic pays 100% of the premium for employees and 80% for dependents
* Time Off: Generous PTO and Holidays
* Parental Leave: Paid maternity and paternity leave to support new parents
* Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses
* Retirement Plan: 401(k) plan
* Stock Options: Equity options to give employees a stake in the company's success
* Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage
* Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require "U.S. Person" status. As defined by U.S. law, individuals who are any one of the following are considered to be a "U.S. Person": (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) .
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
$72k-100k yearly est. 60d+ ago
Information System Security Officer #2765
Genius Road
Cyber security analyst job in Austin, TX
Information System Security Officer - Assessor Contract - 12-24 months *must be local to the Austin area and be willing to be ONSITE Daily The ideal candidate will be responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by the information systems to determine the overall effectiveness of the controls.
Qualifications/Requirements:
At least 5 years of experience in common information security and risk management frameworks
Security + certification (at a minimum) is required
3+ years of experience with NIST Compliance and Third Party Risk assessments
Strong knowledge of information security practices, procedures, and regulations
Previous experience in a government agency environment is highly desirable
Ability to work independently with minimal oversight to complete assigned projects
General Duties:
Assist with implementation and management the Organization's Secure Systems
Perform security assessments and reviews of account permissions, computer data access needs, security violations, and programming changes
Develop appropriate plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
Coordinate the implementation of system security plans for internal personnel and outside vendors
Coordinate account permissions and data access needs
Review security violations and programming changes required
Advise management and users regarding security configurations and procedures
Participate in the development of information technology disaster recovery and business continuity planning
Continuously review and assess technical risks of new and existing applications and systems, including data center physical security and environment
Research, evaluate, and recommend systems and procedures for the prevention, detection, containment, and correction of data security breaches
Prepare final security assessment reports containing findings
May be asked to perform additional duties as required
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
$72k-100k yearly est. 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Austin, TX
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
How much does a cyber security analyst earn in Round Rock, TX?
The average cyber security analyst in Round Rock, TX earns between $65,000 and $119,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Round Rock, TX