Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs in Austin, TX
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Build and operate scalable backend systems and automation for Falcon Complete, collaborate with security analysts, design and implement features, improve monitoring and reliability, write automation to reduce operational load, and participate in on-call rotations to ensure 24/7 operations.
Top Skills:
C++Cloud Native TechnologiesCloud Observability ToolsDistributed SystemsDockerGoGraph DatabasesJavaJavaScriptKafkaKinesisKubernetes (K8S)LinuxMicroservicesNosql DatabasesPythonRelational Databases
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Senior Partner/Alliances Business Operations Analyst drives strategic planning and execution for partner initiatives, optimizing processes and enhancing partner experiences through digital transformation and automation.
Top Skills:
Bi Tools (Tableau)ClariCrossbeamExcelGoogle WorkspaceMiroPowerPointSalesforceSlackTackle
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Research and develop techniques for detecting malicious activities on macOS systems, implementing detection logic in production solutions and troubleshooting product issues.
Top Skills:
C++Objective-CPythonSwift
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The AI Security Consultant will enhance security programs, secure AI systems, engage in technical analysis, and report findings. They will also contribute to thought leadership while ensuring high-quality service delivery.
Top Skills:
Ai SecurityCybersecurity
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Investigate and solve complex security issues, perform technical assessments, monitor threats, and implement security improvement projects.
Top Skills:
AICybersecurityMonitoring SystemsSecurity Assessments
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Join a Red Team R&D group to build and maintain product testing systems, develop offensive capabilities (including initial access and post-exploitation), support operator decision-making with telemetry and analytics, and provide development/infrastructure support for red team engagements across Windows, Linux, and macOS.
Top Skills:
AssemblyC#C++C2 FrameworksDockerEdrEvent StreamingFastapiJenkinsKafkaKernel-Mode ProgrammingLinuxLogscalemacOSNeo4JPythonTelemetryWindows
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Security Advisor I ensures customer security posture and health for Falcon Complete, providing recommendations and support to improve security, troubleshoot customer issues, and document interactions effectively.
Top Skills:
LinuxmacOSMdrSIEMUebaWindowsXdr
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves assessing and implementing security controls for software supply chains, managing security initiatives, and guiding engineers on security best practices.
Top Skills:
Argo CdArtifactoryBitbucketDatadogGitGoJavaScriptJenkinsLinuxLogscalePrometheusPythonS3ShellSplunkTlsUnix
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves tracking and analyzing cyber threats from Iran-nexus adversaries, producing intelligence reports, and collaborating with teams for mission success.
Top Skills:
Computer Network DefenseComputer Networking FundamentalsCybersecurityIntrusion AnalysisThreat Intelligence
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Lead CrowdStrike's global IAM program overseeing IGA, authentication, and PAM. Define governance for human and non-human identities, embed IAM into engineering and product lifecycles, ensure platform reliability and scalability, automate access workflows, align with risk/compliance, and recruit and develop distributed IAM teams.
Top Skills:
Ai Agent AuthorizationApi KeysCertificatesCloud IdentitiesConditional AccessCRMErpFederated AuthenticationHrisIgaIso 27001Llm IntegrationsMfaMl Pipeline Access ControlsMtlsNistOauth 2.0OidcPamPasswordless MfaSAMLSoc 2SpiffeSpireSsoZero Trust
Top Companies in Austin, TX Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results


