Similar Jobs at Lansweeper
Cloud • Information Technology • Software
The Marketing Automation Specialist will execute campaigns, ensure data accuracy, improve workflows, and collaborate with teams to generate qualified leads.
Top Skills:
Ai Productivity ToolsCSSGoogle AnalyticsHTMLJIRAMarketing Cloud Account Engagement (Pardot)Salesforce CRM
Cloud • Information Technology • Software
The Manager of Technical Success will lead a team, enhance post-sales processes, develop training, and drive technical excellence with a focus on automation and metrics.
Top Skills:
AIConfluenceGainsightJIRASalesforce
Cloud • Information Technology • Software
The Digital Customer Success Manager supports customers through digital engagement, monitors health metrics, drives retention, and resolves product usage issues.
Top Skills:
ChurnzeroCrm SystemsCustomer Success PlatformsGainsightSaas Applications
As a Cybersecurity Engineer at Lansweeper, you will be responsible for protecting our platform, infrastructure, and data from evolving security threats. You will play a critical role in identifying vulnerabilities, implementing security controls, and ensuring compliance with industry standards across our products and systems. Working closely with engineering, DevOps, and IT teams, you will help embed security into every stage of the development lifecycle, while proactively monitoring and responding to potential risks. This is a high-impact role where your expertise will directly support Lansweeper's mission to deliver secure and trusted technology asset intelligence to customers worldwide.
Key Responsibilities
Security Design, Implementation & Management
Risk Assessment & Threat Detection
Customer Engagement & Education
Collaboration & Integration
Documentation & Compliance
Key Qualifications
You are someone who
Knowledge of
Experience with
Going for gold?
This role may include participation in our on-call duty system, which means being available outside regular hours to respond to urgent technical incidents. On-call weeks are planned in advance, and we offer a base allowance plus potential overtime compensation. You would need to respond within 30 minutes and be reachable by laptop, phone, or email when on call.
US: Diversity Statement - Equal Employment Opportunity
It is Lansweeper's policy to provide equal employment opportunity to all applicants and employees. Lansweeper disapproves of, and will not tolerate, unlawful discrimination against any applicant or employee because of race, color, national origin or ancestry, gender (including pregnancy, childbirth, or related medical conditions), gender identity, age, religion, disability, family care status, veteran status, marital status, sexual orientation, or any other basis protected by local, state, or federal laws.
Key Responsibilities
Security Design, Implementation & Management
- Design, implement, and maintain cybersecurity solutions to protect enterprise systems, networks, and data from threats and vulnerabilities
- Develop and manage security architectures aligned with client network topologies and organizational requirements
- Assist in the configuration and optimization of firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and SIEM tools
- Support secure onboarding and continuous monitoring for customer-facing services, ensuring high availability and resilience
Risk Assessment & Threat Detection
- Conduct risk assessments, identify and remediate security gaps
- Analyze network traffic patterns and logs to detect anomalies and contribute to threat hunting initiatives
- Stay up to date with emerging threats, industry trends, and compliance frameworks such as NIST, ISO 27001, or GDPR
Customer Engagement & Education
- Engage directly with customers to understand their security needs, provide expert guidance, and support secure solution deployments
- Educate customers on cybersecurity hygiene and help design awareness programs tailored to their risk landscape
Collaboration & Integration
- Collaborate with DevOps, IT, and engineering teams to integrate cybersecurity best practices into service workflows and infrastructure projects
Documentation & Compliance
- Create and maintain documentation for security procedures, client-specific configurations, and compliance reporting
Key Qualifications
You are someone who
- Is able to communicate complex technical issues to non-technical stakeholders
- Has customer-facing expertise: translating security posture into accessible solutions
- Is able to write clear policies, diagrams, and process documentation
- Has an analytical mindset for investigation and root-cause analysis
- Has a creative approach to layering technologies and designing secure workarounds
- Shows proactive risk identification before threats manifest
Knowledge of
- Network security architecture (LAN/WAN, cloud, hybrid environments)
- Endpoint Detection & Response (EDR), IDS/IPS, and firewalls (e.g., Palo Alto, Fortinet)
- EDR/AV: CrowdStrike, SentinelOne, Microsoft Defender
- VPN, zero trust, microsegmentation
- Security Information and Event Management (SIEM), log analysis, and threat correlation
- Compliance frameworks: NIST, ISO 27001, SOC 2, GDPR, CIS Controls
- Threat landscapes (MITRE ATT&CK, CVSS scoring framework)
- Malware behaviors, insider threats, phishing attacks
Experience with
- Vulnerability assessment and remediation planning
- Risk analysis methodologies (qualitative & quantitative)
- Threat hunting, anomaly detection, traffic analysis
- Log correlation and investigative skills using tools like Splunk, QRadar
- Configuration management and scripting: Bash, PowerShell, Python (optional but useful)
Going for gold?
- You have one or more of following certifications:
- CISSP
- CISM / CISA
- CEH / OSCP
- CompTIA Security+ (for baseline knowledge)
- Vendor-specific (e.g., Palo Alto PCNSA, Microsoft SC-200)
This role may include participation in our on-call duty system, which means being available outside regular hours to respond to urgent technical incidents. On-call weeks are planned in advance, and we offer a base allowance plus potential overtime compensation. You would need to respond within 30 minutes and be reachable by laptop, phone, or email when on call.
US: Diversity Statement - Equal Employment Opportunity
It is Lansweeper's policy to provide equal employment opportunity to all applicants and employees. Lansweeper disapproves of, and will not tolerate, unlawful discrimination against any applicant or employee because of race, color, national origin or ancestry, gender (including pregnancy, childbirth, or related medical conditions), gender identity, age, religion, disability, family care status, veteran status, marital status, sexual orientation, or any other basis protected by local, state, or federal laws.
Lansweeper Austin, Texas, USA Office
Our company is located close to the Arboretum and the Domain, and only 20 minutes from the airport.
What you need to know about the Austin Tech Scene
Austin has a diverse and thriving tech ecosystem thanks to home-grown companies like Dell and major campuses for IBM, AMD and Apple. The state’s flagship university, the University of Texas at Austin, is known for its engineering school, and the city is known for its annual South by Southwest tech and media conference. Austin’s tech scene spans many verticals, but it’s particularly known for hardware, including semiconductors, as well as AI, biotechnology and cloud computing. And its food and music scene, low taxes and favorable climate has made the city a destination for tech workers from across the country.
Key Facts About Austin Tech
- Number of Tech Workers: 180,500; 13.7% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Dell, IBM, AMD, Apple, Alphabet
- Key Industries: Artificial intelligence, hardware, cloud computing, software, healthtech
- Funding Landscape: $4.5 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Live Oak Ventures, Austin Ventures, Hinge Capital, Gigafund, KdT Ventures, Next Coast Ventures, Silverton Partners
- Research Centers and Universities: University of Texas, Southwestern University, Texas State University, Center for Complex Quantum Systems, Oden Institute for Computational Engineering and Sciences, Texas Advanced Computing Center

