Monitor and respond to security incidents using SIEM/IDS/firewalls; perform vulnerability assessments and penetration testing; analyze threat intelligence; collaborate with IT to implement security best practices; support SOC 2 compliance, reporting, policies, and employee training.
Cybersecurity Analyst is a detail-oriented and proactive member of our dynamic infrastructure team.
This position monitors, analyzes and responds to security incidents, ensuring compliance with industry standards and helping to fortify our defenses against emerging risks. This role plays a critical part in protecting our organization's information systems from cyber threats.
If you're passionate about cybersecurity and thrive in a fast-paced environment, this is your opportunity to make a real impact.
Responsibilities- Monitor network traffic, systems, and applications for suspicious activities using security tools like SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and firewalls.
- Conduct vulnerability assessments and penetration testing to identify and mitigate potential security weaknesses.
- Investigate and respond to security incidents, including malware infections, data breaches, and unauthorized access attempts, following established incident response protocols.
- Analyze threat intelligence from various sources to stay ahead of emerging cyber threats and recommend proactive measures.
- Collaborate with IT and development teams to implement security best practices, such as secure coding, access controls, and encryption.
- Prepare detailed reports on security findings, incidents, and compliance status for management and regulatory bodies.
- Assist in developing and updating security policies, procedures, and training programs for employees.
- Ensure compliance with relevant regulations (e.g., GDPR, HIPAA, NIST frameworks) and participate in audits.
- Stay current with cybersecurity trends, tools, and certifications through continuous learning and professional development.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent experience).
- 2+ years of experience in cybersecurity, IT security, or a similar role.
- Strong knowledge of networking protocols, operating systems (Windows, Linux), and cloud environments (AWS, Azure).
- Hands-on experience with vulnerability management tools (web application and infrastructure scanning)
- SOC 2 compliance knowledge: Understanding of Type 1 & Type 2 controls, audit processes, and evidence requirements
- SQL proficiency: Comfortable writing queries to analyze logs, generate reports, and support compliance activities
- Cloud security experience: Working knowledge of Microsoft 365/Azure, AWS, or GCP environments
- Incident response skills: Experience investigating and responding to security incidents, phishing, account compromises
- Access management: Understanding of least-privilege principles and user access controls in SaaS environments
- Ability to work independently and as part of a team in high-pressure situations.
Top Skills
Siem,Ids,Firewalls,Windows,Linux,Aws,Azure,Gcp,Microsoft 365,Sql,Vulnerability Scanning,Penetration Testing
Similar Jobs
Edtech • Healthtech
Lead institution-wide cybersecurity risk and assurance activities, perform vulnerability management and application security testing (DAST/SAST/SCA), drive remediation (POA&M), support continuous monitoring, respond to client security questionnaires, oversee third-party risk and data governance, and serve as AIR's HIPAA Security Officer.
Top Skills:
Dast,Sast,Sca,Cnapp,Azure,Aws,Google Cloud,Vulnerability Scanning,Static Code Analysis,Dynamic Application Security Testing,Container Security,Red Teaming,Continuous Threat Exposure Management,Forensic Log Analysis,Security Posture Management
Retail • Sports
Lead cybersecurity operations by guiding incident investigations, enhancing detection capabilities, mentoring analysts, and advising on emerging risks and strategies.
Top Skills:
AIAutomationCloud ControlsEdrEmail/Web GatewaysSIEM
Hardware • Information Technology • Other • Software • Analytics
The Cybersecurity Compliance Analyst is responsible for ensuring compliance with frameworks like SOC, NIST, and ISO standards through audits and improvements. The role involves gap analysis, collaboration with stakeholders, and presenting metrics to leadership.
Top Skills:
AWSAzureGCPIso 27001Iso 27701Iso 42001JIRANist 800-171Soc 1Soc 2Splunk
What you need to know about the Austin Tech Scene
Austin has a diverse and thriving tech ecosystem thanks to home-grown companies like Dell and major campuses for IBM, AMD and Apple. The state’s flagship university, the University of Texas at Austin, is known for its engineering school, and the city is known for its annual South by Southwest tech and media conference. Austin’s tech scene spans many verticals, but it’s particularly known for hardware, including semiconductors, as well as AI, biotechnology and cloud computing. And its food and music scene, low taxes and favorable climate has made the city a destination for tech workers from across the country.
Key Facts About Austin Tech
- Number of Tech Workers: 180,500; 13.7% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Dell, IBM, AMD, Apple, Alphabet
- Key Industries: Artificial intelligence, hardware, cloud computing, software, healthtech
- Funding Landscape: $4.5 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Live Oak Ventures, Austin Ventures, Hinge Capital, Gigafund, KdT Ventures, Next Coast Ventures, Silverton Partners
- Research Centers and Universities: University of Texas, Southwestern University, Texas State University, Center for Complex Quantum Systems, Oden Institute for Computational Engineering and Sciences, Texas Advanced Computing Center


