Post job

Information security analyst jobs in Round Rock, TX - 182 jobs

All
Information Security Analyst
Information Systems Security Officer
Security Engineer
Network Security Analyst
Cyber Security Analyst
Senior Security Analyst
Securities Analyst
Cyber Security Engineer
Senior Security Consultant
Information Security Manager
Senior Security Engineer
  • Information Security Compliance Analyst

    Social Solutions Global 4.1company rating

    Information security analyst job in Austin, TX

    US Salary: $76,000 - $100,000 About Us Bonterra exists to propel every doer of good to their peak impact. We measure that impact against our vision to increase the giving rate as a percentage of GDP from 2% to 3% by 2033. We know that this goal is lofty, but we are confident that the right technology and expertise will strengthen trust in the sector, allowing the social good industry to accelerate growth and reach peak impact. Bonterra's differentiated, end-to-end solutions collectively support a unique network of over 20,000 customers, including over 16,000 nonprofit organizations and over 50 percent of Fortune 100 companies. Learn more at bonterratech.com. About the Role The Bonterra Information Security Risk and Compliance department is looking to hire a Compliance Specialist to our team. If you enjoy problem solving, are enthusiastic working in a team format and want to thrive in the ever-changing risk & compliance field while learning new concepts and principles as part of your continuing education, look no further! Job Responsibilities: Perform as the primary in the executing our annual Service Organization Controls (SOC) reporting initiatives, which includes several Bonterra products. Works closely with other members of the Information Security Risk team. Works closely with control owners across the company and internal and external auditors to ensure requests are completed in a timely manner as part of the overall project management process. Performs technical risk assessments of third party suppliers' security and privacy controls. Maintains register of relevant suppliers/vendors, controls, and risks for ongoing vendor risk management activities. Will be responsible the play book for reporting of high risk events that involve compliance, risk and information security. Assists in maintaining our overall security awareness, role based security trainings and phishing simulation programs across the enterprise. Assists in conducting user activity audits where required. Requirements 6+ years' experience performing risk and compliance activities or open to less with a relevant degree Project management experience. Experience managing multiple priorities independently and in a team environment to achieve goals. Excellent organizational, planning and time management skills. Excellent research and analytical skills. Excellent verbal and written communication skills. Ability to exercise good judgement and tact in dealing with Bonterra senior management. Proficient with technology and ability to learn our software systems, including GRC, ticketing and project management software and workflows. Proven track record of proactively identifying needs and implementing solutions. Information systems security professional certifications preferred (CRISC, CISA, CISSP, CISM, GSEC, GCFA, GCTI, CCSP, or other relevant Information Security certifications). At Bonterra, we're building AI-powered tools to solve real human challenges-and we want teammates who share that enthusiasm.We value people who will champion AI and bring diverse perspectives from different industries, backgrounds, and cultures. Together, we create AI that breaks down barriers, empowers communities, and delivers better outcomes. At this time, we are unable to consider candidates who require current or future sponsorship for employment authorization. ____________________________________________________________________________________ Our Culture At Bonterra, we're innovating with a higher purpose: to increase giving to 3% of US GDP by 2033, creating $573 billion more in global impact every year. At Bonterra, we foster an inclusive, equitable culture where every team member belongs and contributes to meaningful impact. Read more about our values and culture here. Compensation & Benefits We offer a comprehensive benefits package that supports your health, well-being and growth - explore full details here. Compensation and benefits for this role apply to full-time employees in the United States and may vary based on local standards, laws and norms. Pay is determined by location, skills, experience, and education, and is one part of Bonterra's total rewards package, which may also include bonuses, incentives, equity, and a comprehensive benefits program. ____________________________________________________________________________________ Equal Opportunity & Accommodations At Bonterra, we are proud to be an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We provide equal employment opportunities without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, disability, veteran status, or any other characteristic protected by law. If you require a reasonable accommodation during the application process, please submit a request.
    $76k-100k yearly 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Engineer - Sr. Consultant level - ForgeRock

    Visa 4.5company rating

    Information security analyst job in Austin, TX

    Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose - to uplift everyone, everywhere by being the best way to pay and be paid. Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa. Job Description Information security is an integral part of Visa's corporate culture. It is essential to maintain our position as an industry leader in electronic payments, and it is the responsibility of each employee to safeguard information, protect it from unauthorized access, and ensure regulatory compliance. Information security has a significant effect on privacy, consumer confidence, external reputation, and/or the bottom line, and it is a priority on everyone's agenda The successful incumbent will bepart of Visa's Business to Business Identity & Access Management team, which is part of the larger Cybersecurity organization.TheB2B IAMteam has a Global focus, and is responsive to an evolving threat landscape, regulatory compliance, IT security requirements and technology architecture. The B2B IAM team is responsible for secure access to business portals and associated services. Essential Functions Deep understanding of web applications integration for single sign on using ForgeRock Setting up federation agreements using SAML 2, OpenID and OAuth protocols Setting up authorization policies and configuring authentication chains in ForgeRock AM Installation and configuration of ForgeRock AM Deep understanding of session management across geographically distributed locations Installation and configuration of ForgeRock Directory Server (DS) Deep understanding of replication and user directory synchronization Good knowledge of OpenID connects and OAuth protocols. Setting up LDAP password policies and ACIs using custom scripts Building a performance lab and setting up scripts to load test the different access management functions Building scripts to monitor production traffic patterns and translate the numbers into scripts for performance lab Familiarity with all different flavors of web servers and app servers including IIS, Apache, MGINX, Apache Tomcat and Node.js Installation of configuration of ForgeRock agents on web servers and app servers Demonstrate ability to work in a complex organization to determine business and customer needs, providing the best solution to meet those needs You will work closely with Operations, database, and middleware engineering teams to maintain high system up time according to agreed SLA Operate with little supervision and oversight Able to collaborate effectively with teams spread across different time zones Serve as the Subject Matter Expert (SME) for the team, acting as the primary point of contact for cross-functional teams and various support groups within Technology's global teams Take ondecision-makingresponsibilities that directly and significantly impact the productivity of individual support teams and the users they support Developtechnical designand build documentation for all aspects of the technical infrastructure Proficiency in Multi-Factor Authentication and its various implementations This is a hybrid position. Expectation of days in office will be confirmed by your hiring manager. Qualifications Basic Qualifications *8+ years of relevant work experience with a Bachelor's Degree or at least 5 years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 2 years of work experience with a PhD, OR 11+ years of relevant work experience. Preferred Qualifications *9 or more years of relevant work experience with a Bachelor Degree or 7 or more relevant years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 3 or more years of experience with a PhD *B.S. degree with 8+ years or M.S. degree with 5+ years of experience in managing global enterprise-wide platform solutions *Knowledgeable and working experience with Http web servers, Apache, IIS, Tomcat, JWS, *Knowledgeable and working experience with LDAP technologies *Knowledgeable and working experience with Linux & Windows operating systems *Knowledgeable and working experience with application system and performance monitoring software tools *Able to work with cross-functional teams from different geographic locations globally. *Understand various development methodology, including waterfall and Agile/Scrum *Proven track record of executing and driving results in a collaborative and thoughtful manner *Excellent verbal and written communication skills *Understands release managements and familiar with tools like Jira *Familiarity with various industry audit/security standards including PCI-DSS, NIST and FFIEC *Strong knowledge of web-based 3-tier application and security architecture. *Good knowledge of overall network architecture including firewalls, load balancer and WAF *Knowledge and working experience of API authentication and authorization *Understanding of incident, change, and problem management, as well as software release management processes *Experience with Java and other scripting languages to develop custom IAM solutions *Familiarity with Cloud-based Identity and Access Management (IAM) solutions Additional Information Work Hours: Varies upon the needs of the department. Travel Requirements: This position requires travel5-10% of the time. Mental/Physical Requirements: This position will be performed in an office setting. The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers. Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law. Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code. U.S. APPLICANTS ONLY: The estimated salary range for a new hire into this position is 157,100.00 to 227,900.00 USD per year, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.
    $86k-112k yearly est. 5d ago
  • Security Engineer II

    Procore 4.5company rating

    Information security analyst job in Austin, TX

    We're looking for a Security Engineer II to join Procore's Security Engineering team. In this role, you'll be a key contributor, focused on building, implementing, and operating the foundational security controls that protect our platform, data, and users. Your primary goal is to help build and maintain a secure, scalable, and resilient cloud product and infrastructure. As a Security Engineer II, you'll work with Engineering, IT, Security Operations, and GRC to apply security principles to our systems. Use your experience in cloud security, automation, and core security principles to implement and operate automated security controls across our SaaS ecosystem. This is a fantastic opportunity to grow your skills and make a real impact on protecting the data of millions of users-Apply today. This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately. What you'll do: Configure and support IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments. Implement and support automated pipelines for asset inventory and Software Bill of Materials (SBOM) generation. Support the implementation of data protection tools and processes, including key management and encryption. Implement secure configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows under the guidance of senior engineers. Collaborate with Product & Technology teams to test and document resilience patterns. Assist GRC and Internal Audit teams by gathering data and providing context on security controls. Operate and triage alerts from security tools and platforms, and help drive remediation. Participate in the evaluation of new security technologies and tools. Provide on-call support on a rotational basis. What we're looking for: Bachelor's degree in Computer Science or equivalent practical experience. 2+ years of experience in a hands-on technical security or IT/ops role with a security focus. Solid understanding of core security domains such as IAM, network security, and infrastructure security. Hands-on experience with at least one major cloud provider (AWS preferred). Hands-on experience identifying and exploiting common web/API vulnerabilities (e.g., Burp Suite usage) and secure API design. Proficiency in scripting to automate simple security tasks or checks. Familiarity with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM). Experience with, or a strong desire to learn, IaC (Terraform) and container orchestration (Kubernetes). Understanding of data protection principles, including encryption and key management. A passion for automation and experience with scripting languages (Python, Go, or similar). Good communication skills and a collaborative, team-oriented attitude. Additional Information Base Pay Range: 113,040.00 - 155,430.00 USD Annual This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location. This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract. For Los Angeles County (unincorporated) Candidates: Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
    $89k-113k yearly est. 3d ago
  • Cyber Security Analyst

    Zone It Solutions

    Information security analyst job in Austin, TX

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $75k-103k yearly est. Easy Apply 6d ago
  • Cyber Security Analyst

    Insight Global

    Information security analyst job in Austin, TX

    The Cybersecurity Analyst will be responsible for safeguarding the organization's information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA. The ideal candidate will possess 3-5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats. Key Responsibilities Security Operations & Monitoring · Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response. · Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools. · Investigate, analyze, and respond to security breaches, threats, and vulnerabilities. Network & Infrastructure Security · Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management. · Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection. · Perform network hardening to reduce the attack surface, following best practices and compliance standards. Server & System Hardening · Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards. · Review and implement secure configurations, patch management, and vulnerability remediation. Disaster Recovery & Continuity · Participate in DR drills and testing to validate readiness and response effectiveness. Policy, Documentation & Compliance · Maintain up-to-date documentation of network security configurations, standards, and incident response procedures. · Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements - Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience). - 3-5 years of hands-on experience managing and securing enterprise networks and systems. - Proven experience with: - Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint - Fortinet Gateways - Duo MFA - Server and Network Hardening - Disaster Recovery implementation and testing - Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles. - Familiarity with incident response, threat intelligence, and vulnerability management processes. - Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent). - Experience with other routing protocols (EIGRP, BGP) and advanced firewall features. - Familiarity with automation tools (Python, Ansible, Netmiko) for network management. - Experience in high-availability enterprise or government environments.
    $75k-103k yearly est. 47d ago
  • Junior Information Security Analyst #2925

    Genius Road

    Information security analyst job in Austin, TX

    Junior Information Security Analyst 12 month Contract (with strong potential for extension and career advancement) Our client is seeking a Junior Information Security Analyst to assist in supporting and enhancing cybersecurity initiatives across their organization. This role will focus on implementing and monitoring security controls aligned with the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards. This is a great opportunity for an early-career professional eager to gain deep experience in information security within an enterprise environment. Required Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field Security certifications such as CompTIA Security+, GSEC, or equivalent 2+ years of experience in information security, cybersecurity, or a related IT field Working knowledge of common security frameworks including: NIST Risk Management Framework (RMF) NIST Cybersecurity Framework (CSF) Texas Information Security Standards Experience with basic project planning and system development methodologies Strong analytical, communication, and documentation skills Ability to work independently with minimal supervisio Familiarity with enterprise-level IT systems or public-sector environments is highly preferred Key Responsibilities: Assist in implementing and monitoring security measures across systems and applications Support security risk assessments and compliance reviews Help maintain and document security policies, procedures, and standards Coordinate with internal teams and external vendors on security initiatives Assist in identifying and recommending improvements to existing security processes Participate in incident response and audit support activities Support research and evaluation of emerging cybersecurity tools and technologies Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
    $75k-108k yearly est. 60d+ ago
  • TCEQ - Information Security Analyst

    Capps

    Information security analyst job in Austin, TX

    TCEQ - Information Security Analyst (00055197) Organization: TEXAS COMMISSION ON ENVIRONMENTAL QUALITY Primary Location: Texas-Austin Work Locations: Headquarters (582-HQAUS) 12100 Park 35 Circle Austin 78753 Job: Computer and Mathematical Employee Status: Regular Schedule: Full-time Standard Hours Per Week: 40. 00 State Job Code: 0230 Salary Admin Plan: B Grade: 18 Salary (Pay Basis): 4,454. 00 - 4,454. 00 (Monthly) Number of Openings: 1 Overtime Status: Non-exempt Job Posting: Jan 16, 2026, 3:37:06 PM Closing Date: Jan 31, 2026, 5:59:00 AM Description Are you an experienced Information Security Analyst, ready for a unique opportunity to grow with an environmental state agency? Join TCEQ! We bring passion and drive to carry out our mission of protecting our state's public health and natural resources. YOUR FUTURE TEAMAs part of TCEQ Administrative Services, you would help support the logistical and operational structure for TCEQ statewide -- the business foundation for the whole agency. See details about what we do. This position is a member of our Cybersecurity Division. HERE'S WHAT YOU'LL BE DOINGPerform the management of the agency's cybersecurity awareness program and provide IT security support for the Cybersecurity team of the Texas Commission on Environmental Quality (TCEQ). Lead the cybersecurity training program in achieving compliance with state requirements. Assist Human Resources and Staff Services (HRSS) in selecting a Department of Information Resources (DIR) certified cybersecurity security training course for all Full-Time Employees (FTEs). Administer and manage a learning managed system for non-FTEs to ensure training compliance. Provide reports throughout the year to support cybersecurity training program. Develop and deliver training materials and sessions to educate employees on security policies and best practices. Work with the cybersecurity team, Data Management and Privacy Officers to tailor content to specific operational areas. Promote cybersecurity awareness through staff events, such as October Cybersecurity Awareness Month. Administer software used to support security awareness through phishing campaigns. Develop and execute phishing campaigns to test security measures and educate employees on phishing tactics. Monitor the effectiveness of the phishing campaigns and report findings to the Chief Information Security Officer. Monitor, document and track security questions and incidents sent to agency security mailbox. Analyze phishing and spam incidents and take required measures to block identified threat actor. Qualifications KEY QUALIFICATIONSExperience with training development in an IT or Cybersecurity setting. Experience with phishing campaigns. Experience analyzing email for phishing. REQUIRED EDUCATION & EXPERIENCETwo (2) years full-time experience in data processing OR assisting users in computer application use OR in troubleshooting computer systems problems (hardware/software). ORFifteen semester hours in computer science from an accredited college or university, or 300 clock hours in computer science from a licensed vocational, technical, or business school, plus one (1) year of full-time experience in data processing OR assisting users in computer application use OR troubleshooting computer systems problems (hardware/software). ORAn associate degree or higher in computer science. OROne (1) year of full-time experience in TCEQ as an IT Support Specialist II. ***Employees in this classification series may research, work on, or have access to critical infrastructure, including but not limited to a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility. See Tex. Business & Commerce Code Section 117. 001(2). Accordingly, the ability to maintain the security or integrity of the infrastructure is a requirement to be hired for and to continue to be employed with TCEQ. TRANSCRIPT/ COLLEGE HOURS or COURSE WORK See instructions on how to attach documents. A copy of your official college transcript or evaluation of foreign credentials in CAPPS is required if needed to meet the qualifications listed above. WORK SCHEDULEStandard business hours are M-F, 8:00 a. m. - 5:00 p. m. Individual and work group schedule determined by the TCEQ Cybersecurity Division. BENEFITSOptional 401(k) and 457 plans Insurance: Health, Vision, Dental, and optional FSAPaid day(s) off from work on national holidays and holidays that the state observes Professional development opportunities Longevity pay based on your number of years working for the state Wellness Program and ActivitiesOnsite Nurse Practitioner in HQWork-Life BalanceCONDITION OF EMPLOYMENTTCEQ will conduct a criminal history records search, driving history (if required for the job) on candidates offered employment. In compliance with ADA, if you need any special accommodations during the employment process, please contact HRSS for assistance at **************. MILITARY OCCUPATIONAL SPECIALTY (MOS) CODESM. O. S. codes can be found at: *********** sao. texas. gov/CompensationSystem/JobDescriptions/ Please click the hyperlink under ‘Occupational Category' for the respective Class Title. Texas Commission on Environmental Quality is an Equal Opportunity Employer.
    $75k-108k yearly est. Auto-Apply 7h ago
  • Senior Security Analyst

    Tricentis USA Corp

    Information security analyst job in Austin, TX

    The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment. As a Senior Security Analyst, you will be a key component of our front-line defense and overall security posture. Responsibilities Include: Monitoring and reacting to security events Assisting in incident response efforts Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms Working with system owners and stakeholders to mitigate issues found in security assessments Assist with governance, risk, and compliance initiatives as needed Developing and curating threat intelligence Working with the greater Information Security team to define and implement security policies, procedures, and controls General awareness of developments in information security and help in guiding the company's response Providing security expertise and advice to other teams within the company Collaborating with other teams to solve business challenges Basic Qualifications: 5+ years of experience in information security concepts, controls, and technology Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options Experience in a global SOC environment Experience with Azure and/or AWS cloud environments Experience with Log Management/SIEM tools Experience with EDR, Antivirus, and security tools Familiarity with the following security related disciplines with deep experience in several: Vulnerability management Forensic Analysis Application Security Cloud Security Posture Management IAM Penetration Testing Malware analysis Deep technical troubleshooting skills Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc) Technical degree, certification, and/or 5+ years of experience related to information security Excellent communication skills, and the ability to explain security best practices to a non-technical audience Willingness and aptitude for learning new skills and adapting to new technologies Experience with programming and/or automation software Why Tricentis? Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events. As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling. Tricentis Core Values: Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life. Demonstrate Self-Awareness: Own your strengths and limitations. Finish What We Start: Do what we say we are going to do. Move Fast: Create momentum and efficiency. Run Towards Change: Challenge the status quo. Serve Our Customers & Communities: Create a positive experience with each interaction. Solve Problems Together: We win or lose as one team. Think Big & Believe: Set extraordinary goals and believe you can achieve them. Why You'll Love Working at Tricentis: Market conform salary + success-oriented bonus Supportive and engaged leadership team 401(k) plan, full benefits package available Company paid Disability and Life Insurance Hybrid work environment Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran. Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law. Global Sanctions Compliance We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment. U.S. Work Authorization: This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
    $90k-121k yearly est. 2d ago
  • Senior Security Analyst

    Tricentis Gmbh

    Information security analyst job in Austin, TX

    The Security Operations team is responsible for designing and driving information security initiatives at Tricentis including defining and enforcing policy, engineering defensive controls, and responding to incidents. We are seeking a candidate with a strong technical background who can adapt and thrive within a fast-growing SaaS environment. As a Senior Security Analyst, you will be a key component of our front-line defense and overall security posture. Responsibilities Include: Monitoring and reacting to security events Assisting in incident response efforts Planning, coordinating, and/or executing security assessments of networks, systems, applications, and cloud platforms Working with system owners and stakeholders to mitigate issues found in security assessments Assist with governance, risk, and compliance initiatives as needed Developing and curating threat intelligence Working with the greater Information Security team to define and implement security policies, procedures, and controls General awareness of developments in information security and help in guiding the company's response Providing security expertise and advice to other teams within the company Collaborating with other teams to solve business challenges Basic Qualifications: 5+ years of experience in information security concepts, controls, and technology Extensive experience with servers/workstations, computer networks, cloud platforms, their built-in security capabilities and hardening options Experience in a global SOC environment Experience with Azure and/or AWS cloud environments Experience with Log Management/SIEM tools Experience with EDR, Antivirus, and security tools Familiarity with the following security related disciplines with deep experience in several: Vulnerability management Forensic Analysis Application Security Cloud Security Posture Management IAM Penetration Testing Malware analysis Deep technical troubleshooting skills Familiarity with industry or regulatory compliance standards (CIS, NIST, SOC2, etc) Technical degree, certification, and/or 5+ years of experience related to information security Excellent communication skills, and the ability to explain security best practices to a non-technical audience Willingness and aptitude for learning new skills and adapting to new technologies Experience with programming and/or automation software Why Tricentis? Tricentis is currently investing heavily in our information security efforts so that means investing in YOU. We've allocated a budget for training, certifications, conference attendance, etc. and support participation in industry groups as well as speaking at events. As you are joining a company in a growth phase, we are interested in developing individuals that show leadership qualities into those that will build and oversee future teams. In addition to significant growth opportunities, you will get to help build our security stack, sourced from best-in-breed solutions and tooling. Tricentis Core Values: Knowing what we need to achieve and how to achieve it is important. Tricentis core values define our ways of working and the behaviors we model that create an enjoyable and successful Tricentis life. Demonstrate Self-Awareness: Own your strengths and limitations. Finish What We Start: Do what we say we are going to do. Move Fast: Create momentum and efficiency. Run Towards Change: Challenge the status quo. Serve Our Customers & Communities: Create a positive experience with each interaction. Solve Problems Together: We win or lose as one team. Think Big & Believe: Set extraordinary goals and believe you can achieve them. Why You'll Love Working at Tricentis: Market conform salary + success-oriented bonus Supportive and engaged leadership team 401(k) plan, full benefits package available Company paid Disability and Life Insurance Hybrid work environment Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran. Tricentis is proud to be an equal opportunity workplace. Qualified applicants will receive consideration for employment without regard to race, color, ethnicity, gender, religious affiliation, age, sexual orientation, socioeconomic status, or physical and mental disability and other statuses protected by law. Global Sanctions Compliance We comply with all applicable global sanctions and export control laws. Candidates must not be listed on any government restricted party lists (including OFAC SDN List and U.S. Commerce Department restricted lists) and must certify that their employment would not violate any sanctions or export control regulations. Candidates must notify us of any changes to their status during the application process or subsequent employment. U.S. Work Authorization: This role is not eligible for employer-sponsored work visas. Applicants must be authorized to work in the U.S. without current or future sponsorship.
    $90k-121k yearly est. Auto-Apply 4d ago
  • Security Analyst

    Disco 4.7company rating

    Information security analyst job in Austin, TX

    Your Impact The Security Analyst is a foundational member of the Information Security team, responsible for executing daily security operations and contributing to the security posture of the environment. This role focuses on alert triage, initial incident response activities, and developing core security skills under regular supervision. What You'll Do Security Operations: The analyst conducts day-to-day security monitoring, prioritizing, and classifying incoming alerts from SIEM, EDR, and other security tools. They perform initial triage to distinguish true incidents from false alarms, and conduct basic checks on agent and log status to ensure data continuity. Incident Response (Initial): The analyst is the first responder responsible for initiating the formal IR process, including incident ticket kickoff and stakeholder notification. They execute response actions according to approved playbooks and meticulously document all initial actions, observations, and evidence for seamless escalation to senior team members. Data Protection & Phishing: Conduct initial review and triage of Data Loss Prevention (DLP) alerts and assist with DLP investigations. They also manage the phishing email queue, verifying reported threats, blocking malicious content, and ensuring prompt, accurate escalation of novel or complex phishing campaigns. Systems Support: The analyst focuses on operational stability working directly with the system owner. They execute routine maintenance tasks (updates, deployments, clean-up) and assist senior team members with system enhancements. Project Contribution: Assist Security Architects and Engineers with system updates, selection and deployment of new security tooling. Implementation of security standards, compliance activities and other projects as required. Who You Are 1+ year of dedicated Information Security experience required. 2-3 years working in enterprise IT roles such as System Administrator or HelpDesk. Familiarity with Incident Response Processes and Remediation Strategies. Experience managing and maintaining Security or Enterprise IT tools In-depth technical knowledge of network, PC, and platform operating systems, including Linux, mac OS and Windows Strong TCP/IP networking, DNS, and HTTP knowledge Even Better If You Have… Experience with Enterprise EDR solutions Experience with compliance frameworks such as HITRUST, ISO27001, SOC2 or FedRAMP Experience securing the public cloud environments (AWS, GCP, Azure) Authorization to Work in the U.S.: Candidates must be legally authorized to work in the United States without sponsorship now or in the future. DISCO is not currently sponsoring visas, including, but not limited to, H-1B, TN, or EAD, and we are not accepting visa transfers. Perks of DISCO Open, inclusive, and fun environment Benefits, including medical, dental and vision insurance, as well as 401(k) Competitive salary plus RSUs Flexible PTO Opportunity to be a part of a company that is revolutionizing the legal industry Growth opportunities throughout the company About DISCO DISCO provides a cloud-native, artificial intelligence-powered legal solution that simplifies ediscovery, legal document review and case management for enterprises, law firms, legal services providers and governments. Our scalable, integrated solution enables legal departments to easily collect, process and review enterprise data that is relevant or potentially relevant to legal matters. Are you ready to help us fulfill our mission to use technology to strengthen the rule of law? Join us! We are an equal opportunity employer and value diversity. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $78k-100k yearly est. Auto-Apply 17h ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services, LLC

    Information security analyst job in Austin, TX

    ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment. Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality. Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: ******************* #CJ
    $72k-100k yearly est. Auto-Apply 60d+ ago
  • Information Systems Security Officer (ISSO)

    Saronic

    Information security analyst job in Austin, TX

    Saronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms. Position OverviewWe are seeking an experienced ISSO to lead the stand-up, accreditation, and continuous monitoring of classified networks in support of U.S. Government customers. The ideal candidate has direct, hands-on experience securing Authorities to Operate (ATO) for SIPRNet (DCSA) and JWICS (Navy/IC) environments, with proven expertise managing ATO lifecycles across the DOW, IC, and specific Navy stakeholders. Experience with CWAN and/or enabling Defense Contractors to build compliant, customer-aligned classified enclaves is preferred.This role reports to the Industrial Security Manager and works closely with Cybersecurity, Information Technology, Business Development, and Growth Teams to deliver accredited classified capabilities on time and within scope.Key Responsibilities Serve as the primary ISSO for SIPRNet (DCSA) and JWICS (Navy/IC) ATO packages, including RMF workflow in eMASS, Xacta, or equivalent. Lead ATO development, submission, assessment, and authorization with DCSA, Navy AO/DAO, and IC CAFs (e.g., DIA, NSA, NRO). SOCOM-Specific Functions Author and maintain USSOCOM 10-702 RMF overlays for SOF-unique systems (e.g., SOFNET, SOF-IA, Mission Command Systems). Manage ATO packages under SOCOM's J6/J39 using eMASS Enterprise and SOCOM's Risk Management Framework Process Guide. Coordinate with TSOC ISSMs and Component Command Validators for deployment of classified SOF enclaves worldwide. Navy-Specific Functions Interface directly with NAVCYBERFOR, FLTCYBERCOM, and SPAWAR/NAVWAR for CANES, ADNS, and ISNS integration into contractor JWICS drops. Execute Navy RMF per NAVSEA 9400 series and SECNAV M-5239.2 for ship-to-shore and afloat classified networks. Manage JWICS ATOs under Navy DAO (OPNAV N2N6), including Type-1 encryption and NSA Commercial Solutions for Classified (CSfC) implementations. SAP/SCI Environment Functions Act as SAP ISSO for Special Access Programs (SAP) under DoD SAPCO, Service SAPCOs, and IC SAPCOs. Participate in the development of SAP Security Plans (SAPSP), Fixed Facility Checklists (FFC), and TEMPEST addendums for SAP facilities. Oversee SAP network carve-outs, air-gapped systems, and bilateral SAP-to-SCI cross-domain transfers. Manage classified network stand-up for Defense Contractor facilities, including: Design and implementation of secure enclaves (SIPR, JWICS, CWAN, SAP) Cross-domain solutions (CDS), VTC, and secure voice Compliance with ICD 503, JSIG, NISPOM, DAAPM, and CNSSI 1253 Oversee continuous monitoring, POA&M management, and annual re-accreditation for CWAN-connected systems and/or SAP collateral networks. Coordinate with Navy SPAWAR, NRO, DISA, SOCOM J6, and IC customers to align technical solutions with mission requirements. Conduct security audits, vulnerability scans (ACAS), STIG compliance, and incident response for classified systems. Mentor junior ISSOs and interface with CPSO/FSO on physical, personnel, and COMSEC requirements. Required Qualifications 5+ years as ISSO in classified DoD/IC environments (SIPR/JWICS and SAP mandatory). Direct experience obtaining and maintaining ATOs with: DCSA for SIPRNet DOW for JWICS CWAN-connected networks USSOCOM or SAP AOs for SOF/SAP systems Proficiency with RMF, eMASS, Xacta 360, SOCOM 10-702 overlays, and SCAP/STIGs. Current DoD 8570 IAT/IAM Level III certification (e.g., CISSP, CISM, GSLC). Active TS/SCI with Full-Scope Poly (or CI Poly with ability to obtain FS). Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience). Travel: Occasional (10-15%) Preferred Qualifications Prior CWAN and SOCOM SOFNET accreditation and operations experience. Experience with Navy FLTCYBERCOM, SPAWAR, ONR, or SOCOM J39 classified programs. Familiarity with CDS (ISSE Guard, Radiant Mercury), CSfC, and secure VTC (SVTC). SAP ISSM training (e.g., CDSE SAP Security Management) and ICD 705 SCIF accreditation experience. Experience supporting Defense Contractors in building customer-dedicated classified networks (e.g., SCIF-in-SCIF, dedicated JWICS/SAP drops). Physical Demands Prolonged periods of sitting at a desk and working on a computer Occasional standing and walking within the office and production environments Manual dexterity to operate a computer keyboard, mouse, and other office equipment Visual acuity to read screens, documents, and reports Occasional reaching, bending, or stooping Lifting and carrying items up to 20 pounds Benefits Medical Insurance: Comprehensive health insurance plans covering a range of services Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium for employees and 80% for dependents Time Off: Generous PTO and Holidays Parental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) . Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
    $72k-100k yearly est. Auto-Apply 60d+ ago
  • Manager, Information Security & Compliance

    Comtecinfo

    Information security analyst job in Austin, TX

    Title: Manager, Information Security & Compliance Duration: Fulltime Permanent with Client ________________________________ Responsibilities: Provide leadership, management, and guidance to the Operational Technology Security & Compliance team. Oversee and manage the security patch management, password management, configuration management and logging solution. Develop and maintain maintenance and configuration procedures, schedules and related evidentiary documentation. Manage on-call schedule. Maintain security system standards and NERC compliance in accordance with good utility practices. Manage daily system monitoring, verifying the integrity and availability of hardware, server resources, systems and key processes, reviewing and verifying system and application logs. Coordinate testing and implementing operating system patches in the operations technology environment. Ensure NERC CIP requirements are implemented when performing any work. Requirements: 5+ years of experience managing information security and compliance team. 10+ years of experience with security and compliance functions (Access Management, Threat and Vulnerability Management, Security Monitoring, Patch Management, Password Management, Configuration Management and Logging). Experience supporting CIP compliance is a plus. Experience working with a team required to operate in 24/7 shifts. Strong writing and communication skills. Commitment to providing excellent customer service. Qualifications NERC CIP Additional Information All your information will be kept confidential according to EEO guidelines.
    $103k-149k yearly est. 60d+ ago
  • Network Security Analyst III

    Stratacuity

    Information security analyst job in Austin, TX

    If you are interested in applying for this role, please email your resume to Maddie Watt at [email protected] Job Title: Network Security Analyst III Client Type: Government - Transportation and Infrastructure Contract Length: 12 months - potential to extend or convert Location: Austin, TX - On-site 4x per week Rate: up to $100/hr. Location notes: Candidates must reside in Texas. Preference for Austin-based candidates, but exceptional candidates elsewhere in Texas will be considered. About the Role Our client is looking for a seasoned Network Security Analyst 3 to join their cybersecurity team. This role focuses on supervising and managing the Cybersecurity Operations Tools Team, ensuring the resilience and administration of critical security tools, and supporting incident response activities. You'll work under minimal supervision with significant latitude for independent judgment. What You'll Do * Oversee and assist in managing the Cybersecurity Operations Tools Team (8 contractors). * Administer and maintain cybersecurity tools to ensure operational resilience. * Provide real-time data, metrics, and incident input for CSOC monitoring and response. * Support daily operations and incident response activities. * Deliver tooling input for monthly and annual reporting. * Recommend improvements for operational resilience and cybersecurity maturity. * Plan and manage deployment and operation of security toolsets. * Assist in managing ongoing cybersecurity programs (e.g., tabletop exercises). Areas of Service Include: * Custom Managed Scanning Services * Custom Managed Endpoint Protection * Managed CISCO Secure Network Analytics Service * SIEM Administration Required Qualifications * 8+ years technical team management experience. * 8+ years deploying and configuring network security monitoring and incident response tools (EDR, Scanners, SIEM, NetFlow, etc.). * 8+ years administering network security monitoring and incident response tools. * 8+ years' experience in intrusion detection and incident response activities. * Strong professional communication and reporting skills. * Experience with Wiz cloud management (required). Preferred Qualifications * 8+ years' experience with CISCO security suite of tools. * 8+ years' experience with Microsoft EDR tools. * 8+ years' experience with Microsoft Sentinel. * 8+ years' experience with Tenable suite of tools. EEO Employer Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************. Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Location: Austin, TX, US Job Type: Date Posted: December 17, 2025 Similar Jobs * Network Security Engineer * Network Security Engineer * IT Security Specialist III * IT Business Analyst III * Network Operations Analyst
    $67k-91k yearly est. 1d ago
  • Network Security Analyst

    Techtalenthunt

    Information security analyst job in Austin, TX

    Requirement details: Internal job ID:TWK_2002 Network Security Analyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only. Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification. Job Description: This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services. This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security SKILLS AND QUALIFICATIONS Years Required Experience 2 Required Information security analysis work or related IT security work 4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally 2 Preferred with a cybersecurity architecture and data flow documentation 2 Preferred with a Vulnerability Management programs 2 Preferred doing web application security scans/assessments 2 Preferred with custom dashboards and/or configurations of SIEM tools 2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
    $67k-91k yearly est. 60d+ ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Information security analyst job in Austin, TX

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
    $92k-115k yearly est. Auto-Apply 60d+ ago
  • Security Analyst I P68

    Texas A&M International University 4.0company rating

    Information security analyst job in Austin, TX

    Job Title Security Analyst I P68 Agency Texas A&M University System Offices Department Cyber Operations Proposed Minimum Salary Commensurate Job Type Staff The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 12 universities, a comprehensive health science center, nine state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond. The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan to include an employer contribution through Teachers Retirement System of Texas (TRS); if applicable, a defined contribution retirement plan to include an employer contribution through an approved ORP vendor: additional voluntary tax deferred annuity (TDA) options; tuition assistance; and wellness programs to promote work/life balance. Salary: $3,896.88 - $5,416.66 per month commensurate with experience. Job Description Summary: The Security Analyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The security analyst's primary focus will be investigating and responding to cyber threats. Responsibilities: * Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. * Document and escalate incidents that may cause ongoing and immediate impact to the environment. * Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. * Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. * Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. * Other duties as assigned. Education and Experience: * Bachelor's degree in applicable field or equivalent combination of education and experience. * Four months of information technology, information security or cybersecurity work experience. Knowledge, Skills and Abilities: * Knowledge of computer networking concepts and protocols, and network security methodologies. * Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. * Knowledge of cyber threats and vulnerabilities. * Knowledge of adversarial tactics, techniques, and procedures. * Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Skilled in researching vulnerabilities and exploits utilized in traffic. * Skilled in using protocol analyzers. * Skilled in performing packet-level analysis. * Skilled in technical writing. * Skilled in preserving evidence integrity according to standard operating procedures or national standards. * Ability to interpret the information collected by network and host detection tools. * Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies. * Ability to multi-task and work cooperatively with others. Other Requirements: This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being rejected without an option to reapply. A cover letter and resume may be required in addition to a completed employment application. All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution's verification of credentials and/or other information required by the institution's procedures, including the completion of the criminal history check. Equal Opportunity/Veterans/Disability Employer.
    $3.9k-5.4k monthly Auto-Apply 34d ago
  • Staff Security Engineer

    Procore 4.5company rating

    Information security analyst job in Austin, TX

    We're looking for a Staff Security Engineer to join Procore's Security Engineering team. In this role, you'll be a key technical leader responsible for designing and implementing foundational security controls that protect our platform, data, and users. Your primary goal is to drive the implementation of a secure, scalable, and resilient cloud product and infrastructure by default. As a Staff Security Engineer, you'll partner with Product & Technology, IT, Security Operations, and GRC to embed security into the development lifecycle. Use your deep expertise in cloud architecture, data protection, and identity and access management to design and implement robust, automated security guardrails across our SaaS ecosystem. This is a high-impact opportunity to solve complex security challenges and protect the data of millions of users-Apply today. This position reports into the Senior Director, Security Engineering and will be based in our Austin, TX office. We're looking for someone to join us immediately. What you'll do: Design and implement scalable IAM guardrails for cloud (AWS/GCP/Azure) and corporate (Okta) environments, including identity governance, PAM, and service-to-service authentication. Mentor other engineers and help scale security knowledge across the organization. Lead the evaluation and implementation of new security technologies and platforms from proof-of-concept to production. Design the long-term application security strategy and roadmap (e.g., Zero Trust architecture for apps). Solve entire classes of vulnerabilities permanently by re-architecting frameworks or platforms. Lead critical incident response efforts for product security breaches. Design and build automated pipelines for authoritative asset inventory and Software Bill of Materials (SBOM) generation. Drive the technical roadmap for data protection, including key management (KMS), encryption-at-rest/in-transit, and tokenization. Build and implement secure-by-default configurations for our containerized (Kubernetes, EKS) and IaC (Terraform) workflows. Partner with Product & Technology teams to engineer technical resilience patterns, auto-healing systems, and verifiable disaster recovery capabilities. Act as a senior technical expert to provide authoritative context on security controls and designs to our GRC and Internal Audit teams. Provide on-call support on a rotational basis. What we're looking for: Bachelor's degree in Computer Science or equivalent practical experience. 6+ years of experience in a hands-on technical security role, with at least 3 years focused on cloud security in a large-scale SaaS environment. Deep expertise in multiple security domains including product/application security, IAM, IaaS, network, etc. Deep expertise with at least one major cloud provider (AWS preferred) and its security services (IAM, KMS, Security Hub, GuardDuty). Strong experience with identity and access management platforms platforms (IdP, IGA, PAM), joiner-mover-leaver (JML) mechanisms, and concepts (SAML, OAuth 2.0, OIDC, SCIM). Proven experience building security guardrails for IaC (Terraform preferred), CI/CD pipelines, and container orchestration (Kubernetes). Ability to influence engineering leadership and drive cultural change (shifting security left). Experience writing custom security tooling or rules engines (e.g., CodeQL custom rules) to scale detection Strong understanding of data protection principles, including encryption, key management, tokenization, and data loss prevention (DLP). A "builder" mindset with a passion for automation (Python, Go, or similar) and shipping solutions as code. Excellent communication skills with the ability to translate complex technical concepts for technical and non-technical stakeholders. Additional Information Base Pay Range: 168,560.00 - 231,770.00 USD Annual This role may also eligible for Equity Compensation. Procore is committed to offering competitive, fair, and commensurate compensation, and has provided an estimated pay range for this role. Actual compensation will be based on a candidate's job-related skills, experience, education or training, and location. This position requires access to technology, software, and data that is controlled or restricted under U.S. law, regulation, executive order, or government contract. For Los Angeles County (unincorporated) Candidates: Procore will consider for employment all qualified applicants, including those with arrest or conviction records, in accordance with the requirements of applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. A criminal history may have a direct, adverse, and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment: 1. appropriately managing, accessing, and handling confidential information including proprietary and trade secret information, as well as accessing Procore's information technology systems and platforms; 2. interacting with and occasionally having unsupervised contact with internal/external customers, stakeholders, and/or colleagues; and 3. exercising sound judgment.
    $89k-113k yearly est. 4d ago
  • Cybersecurity Engineer - Sr. Consultant Level - Enterprise Security Architecture

    Visa 4.5company rating

    Information security analyst job in Austin, TX

    Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose - to uplift everyone, everywhere by being the best way to pay and be paid. Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa. Job Description: Cybersecurity is at the heart of our culture. Our diligence and expertise are what makes us the undisputed leader in electronic payments. We've made it our priority to create a top-tier Security Architecture team, poised to defend us against any potential cyber threats. As Enterprise Security Architect, you will be part of a team that supports the technology organization in embedding Cybersecurity into their products and services globally. Additionally, you will leverage AI to integrate business processes, identify opportunities for transformation, and implement AI-driven security solutions to enhance our security measures and optimize workflows. Essential Functions: Utilize AI to integrate business processes, enhancing security measures and optimizing workflows. Identify opportunities for transformation using AI, leveraging AI-driven insights to improve security architecture and business processes. Implement AI-driven security solutions, ensuring they are scalable, secure, and cost-effective. Develop and maintain the enterprise security architecture strategy, ensuring alignment with business goals and objectives. Design and implement enterprise security architecture frameworks and standards, ensuring the integration of security controls into business processes, data, and applications. Create and maintain technology roadmapsthat outline the future direction of Visa's security landscape and identify opportunities for innovation and efficiency improvements, including cloud and hybrid cloud environments. Establish and enforce governance processesto ensure adherence to enterprise security architecture standards and best practices, and conduct architecture reviews with recommendations for improvement. Evaluate emerging security technologies and industry trends, including cloud and hybrid cloud security, to determine their potential impact on Visa's security landscape, and make recommendations for adoption where appropriate. Identify and mitigate risks associated with security solutions, ensuring security and compliance requirements are integrated into the architecture design. Create and maintain comprehensive documentation of the enterprise security architecture, including diagrams, models, and guidelines, ensuring it is up-to-date and accessible to relevant stakeholders. Develop and maintain threat modelsto identify, assess, and prioritize potential security threats and vulnerabilities within Visa's systems, applications, and infrastructure. Contribute to the development and refinement of Technology Security Requirementsand Data Security Requirements, ensuring alignment with Visa's security policies and standards. This is a hybrid position. Expectation of days in office will be confirmed by your Hiring Manager. Qualifications Basic Qualifications: * 8+ years of relevant work experience with a Bachelor's Degree or at least 5 years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 2 years of work experience with a PhD, OR 11+ years of relevant work experience.. Preferred Qualifications: Experience in utilizing AI to integrate business processes, enhancing security measures and optimizing workflows. Proven track record of identifying opportunities for transformation using AI, leveraging AI-driven insights to improve security architecture and business processes. Minimum of 10 years of experience in IT, with at least 5 years in an enterprise security architecture role. Strong technical knowledge of cloud and hybrid cloud computing, data architecture, security, and integration patterns. Proficiency in relevant tools and technologies, including but not limited to firewalls, encryption, identity and access management (IAM), and security information and event management (SIEM). Strong analytical and problem-solving skills, with the ability to analyze complex business and technical requirements and develop effective security solutions. Excellent verbal and written communication skills, with the ability to communicate complex technical concepts to non-technical stakeholders. Additional Information Work Hours: Varies upon the needs of the department. Travel Requirements: This position requires travel5-10% of the time. Mental/Physical Requirements: This position will be performed in an office setting. The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers. Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law. Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code. U.S. APPLICANTS ONLY: The estimated salary range for this positionis $162,500.00 to $260,400.00 USD per year, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.
    $82k-105k yearly est. 5d ago
  • Information System Security Officer #2765

    Genius Road

    Information security analyst job in Austin, TX

    Information System Security Officer - Assessor Contract - 12-24 months *must be local to the Austin area and be willing to be ONSITE Daily The ideal candidate will be responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by the information systems to determine the overall effectiveness of the controls. Qualifications/Requirements: At least 5 years of experience in common information security and risk management frameworks Security + certification (at a minimum) is required 3+ years of experience with NIST Compliance and Third Party Risk assessments Strong knowledge of information security practices, procedures, and regulations Previous experience in a government agency environment is highly desirable Ability to work independently with minimal oversight to complete assigned projects General Duties: Assist with implementation and management the Organization's Secure Systems Perform security assessments and reviews of account permissions, computer data access needs, security violations, and programming changes Develop appropriate plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs Coordinate the implementation of system security plans for internal personnel and outside vendors Coordinate account permissions and data access needs Review security violations and programming changes required Advise management and users regarding security configurations and procedures Participate in the development of information technology disaster recovery and business continuity planning Continuously review and assess technical risks of new and existing applications and systems, including data center physical security and environment Research, evaluate, and recommend systems and procedures for the prevention, detection, containment, and correction of data security breaches Prepare final security assessment reports containing findings May be asked to perform additional duties as required Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
    $72k-100k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Round Rock, TX?

The average information security analyst in Round Rock, TX earns between $63,000 and $128,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Round Rock, TX

$90,000
Job type you want
Full Time
Part Time
Internship
Temporary