We use cookies to improve the user experience, analyze traffic and display relevant ads.
Details Accept
Enter position

Security Expert Salary in Austin, TX

Receive statistics information by mail
Unfortunately, there are no statistics for this request. Try changing your position or region.

Найдите подходящую статистику

Information Security Analyst

Смотреть статистику

Information Security Manager

Смотреть статистику

Information Security Officer

Смотреть статистику

Intelligence Analyst

Смотреть статистику

Lifeguard

Смотреть статистику

Network Security Engineer

Смотреть статистику

Safety Coordinator

Смотреть статистику

Safety Leader

Смотреть статистику

Safety Manager

Смотреть статистику

Safety Officer

Смотреть статистику

Safety Specialist

Смотреть статистику

Security Administrator

Смотреть статистику

Security Analyst

Смотреть статистику

Security Architect

Смотреть статистику

Security Assistant

Смотреть статистику

Security Developer

Смотреть статистику

Security Guard

Смотреть статистику

Security Installer

Смотреть статистику

Security Investigator

Смотреть статистику

Security Manager

Смотреть статистику

Security Officer

Смотреть статистику

Security Specialist

Смотреть статистику

Transportation Security Officer

Смотреть статистику

Unarmed Security Guard

Смотреть статистику

Unarmed Security Officer

Смотреть статистику

USAR Unit Administrator

Смотреть статистику
Show more

Recommended vacancies

Threat Detection Architect (US Remote)
Anomali, Austin
Company Description:Anomali, a world-renowned platform leader in Security Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threat detection and incident response (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection. Transforming CISOs into superheroes and analysts into SOC terminators. Anomali's Platform offers: "Match" Next-Gen SIEM, "Lens" AI Threat Hunter, "ThreatStream" TIP, Anomali Integrator, Anomali ISAC, Anomali Attack Surface Management, and Anomali Digital Risk Protection, infused with Anomali AI. Anomali bridges the gap between point solutions (EDR, NDR, SSE, RMM, CAASM, etc.) and replaces legacy SIEMs at 50% the cost, giving analysts easy-to-use tools that enable lightspeed detection & response. Anomali addresses the global shortage in cyber talent by empowering analysts to contain, eradicate, and block threats in seconds without complex SIEM queries, manual blocks, or long investigations. Anomali delivers as a proprietary platform and disruptor to the security analytics world. Anomali can search billions of logs in seconds, correlating tens of millions of IoCs and IoAs across years of telemetry and logs often deleted or moved to cold storage. At every point across the cyber kill chain, Anomali supercharges the SOC to detect, contain, and eradicate threats before organizational impact. Job Description: Anomali is looking for a skilled threat hunter, analyst, and detection engineer/architect to join our SOC. Previous experience as a T3 SOC analyst, threat hunter, and advanced SIEM detection engineer is preferred. This individual will be responsible for proactively detecting, isolating, and mitigating threats, while building new threat hunts and detections around system- and business-process-specific adversary threat models. This individual will work closely with our Advanced Threat Research (ATR) team, Cyber Fusion Content Development team, and Security Operations Team to leverage Anomali's core capabilities along with other industry-leading cybersecurity products to build and implement novel threat detection and hunting capabilities. You will also leverage Anomali's AI Copilot and provide direct input into Anomali Language Learning Models (LLMs) for building content related to threat hunting, incident response, adversary threat models, and detection methodology. Key Responsibilities:o Proactively build SOC detections to investigate, detect, isolate and mitigate endpoint-, identity-, network-, cloud-, email-, and data-based threats across enterprise systems and data stores o Develop a periodic, triggered, and continuous threat hunting strategy o Use a threat-model-based approach to develop detections and threat hunts o Develop templated and repeatable processes for automated and manual security incident triage, response, and mitigation using Anomali's market-leading Security Operations Platform o Build Anomali Query Language (AQL) SIEM detections using a combination of currently existing detections (e.g. Sigma rules), newly developed detections, and UEBA analytics algorithms to streamline detection and response o Properly orchestrate and configure existing tools and enterprise systems to generate detections for malicious behavior, insider threat, and LOL processes and procedures o Map detections and threat hunts to MITRE ATT&CK methodology as-needed o Utilize Attack Flow and IOAs to build incident detection blueprints and response playbooks o Build data dashboards to provide insights, analytics, and holistic understanding of SOC operations, including the reduction in mean time to respond (MTTR) o Build a security tools and data exploitation and optimization model and methodology that measures return on security investment and SOC operations effectiveness o Serve as an expert advisor on SOC analyst incident response, detection engineering, and threat hunting to internal product teams, content-development teams, and customers o Provide direct input into AI language learning models and capabilities o Manage and mentor SOC analysts and threat hunters in creating of automations, triage of detections, and execution of computer incident response processes QualificationsRequired Skills/Experience:o Minimum 5+ years of work experience as an advanced T3 SOC analyst, threat hunter, incident responder, or detection engineer o In-depth technical knowledge concerning processes, procedures, and methodologies regarding preparedness, resilience, incident response, detection engineering, and threat hunting o Technical knowledge on detection and alert orchestration across numerous security systems including but not limited to EDR, NDR, Firewalls, DNS, DHCP, IAM, IDaaS, ESG, SWG, SSE, DLP, VPN, CASB, Cloud Environments (e.g. AWS, GCP, Azure), and SaaS applications o Technical knowledge of techniques, standards, and state-of-the-art capabilities for authentication and authorization, applied cryptography, network architecture, security vulnerabilities, and remediation strategies. o Tactical knowledge of how to apply cyber threat intelligence (CTI) in SOC processes, procedures, and systems to prioritize and speed detection and response o In-depth technical knowledge of Attack Flow, IoA/TTP-based and IoC-based threat hunting, log sources, SIEM investigations, Windows/Linux operating system event logs, and threat actor tactics, techniques, and procedures o Experience using Sigma and YARA rules to perform threat hunts across live processes, databases, and systems o Understanding of SaaS development environments including cloud data centers, CI/CD pipelines, web application development, OWASP, vulnerability scanning (DAST, SAST, RASP), system development life cycle (SDLC), web application monitoring, web application security (e.g. WAFs, log monitoring), web services, service-oriented architectures, remote access technologies (ZTNA, VDI, JIT) Desired Skills/Experience:o Experience conducting purple teaming, pentesting, sandbox testing, or development of honeypots/tokens for threat and vulnerability detection o BS or MS in technical field, including but not limited to Computer Science, Engineering, Cybersecurity, Information Systems Equal Opportunities Monitoring It is our policy to ensure that all eligible persons have equal opportunity for employment and advancement on the basis of their ability, qualifications and aptitude. We select those suitable for appointment solely on the basis of merit without regard to an individual's disability, race, color, religion, sex, sexual orientation, gender identity, national origin, age, or status as a protected veteran. Monitoring is carried out to ensure that our equal opportunity policy is effectively implemented. If you are interested in applying for employment with Anomali and need special assistance or accommodation to apply for a posted position, contact our Recruiting team at [email protected] .
Sr. Physical Security Engineer, Data Center Design Engineering
Amazon, Austin, TX, US
DESCRIPTIONAmazon Web Services (AWS) is seeking a Sr. Physical Security Engineer to join its data center design team. Position is available for any of the following locations:• Seattle, Washington • Herndon, Virginia • Columbus, Ohio• Austin, Texas As a Sr. Physical Security Engineer at AWS, you will lead security designs for Amazon Data Centers (DC) throughout our Americas Region. Physical Security Engineers at AWS work to design safe, secure, resilient, cost effective Data Center (DC) facilities. As a Physical Security Engineer at AWS, you will lead security designs for DCs in our Americas Region and impact AWS global DC security standards. You will be part of a highly creative and efficient design team comprised of Architects, Engineers, and Designers tasked with solving problems and challenging the status quo. As a subject matter expert, you will provide technical guidance, have a direct impact on the design of DC facilities, solve large-scale implementation issues, and be responsible for developing and communicating security design requirements to internal and external project partners. As a Sr. Physical Security Engineer, you will work directly with other AWS Security Teams, AWS Management, and partners to collaborate in the real-world application of Physical Security throughout AWS. You will review and be very knowledgeable of new and cutting-edge technologies and security measures for possible application to the existing suite of security processes and measures in order to enhance the security posture across AWS. You should have a working knowledge of physical security principles and how that relates to practical application and real-world implementation of processes and measures, as well as working knowledge of Crime Prevention through Environmental Design (CPTED).Key job responsibilities• Lead designs (construction drawings and specifications) for physical security elements (cameras, access control, intrusion detection, fences, gates, etc.) for DC projects.• Collaborate with other security organizations within AWS to develop design standards, evaluate cost, risk and benefits of designs and facilitate design discussions.• Communicate conceptual designs to internal stakeholders and external consultants.• Participate in maintenance Basis of Design, prototype design, and template specifications for physical security elements.• Create security design scope of work for design RFPs.• Review and direct the work of physical security engineering design consultants. • Manage multiple fast-paced projects simultaneously.• Travel for site assessments, internal design meetings, construction review, and interfacing with design consultants. Anticipated travel not to exceed 25%.We are open to hiring candidates to work out of one of the following locations:Austin, TX, USA | Columbus, OH, USA | Herndon, VA, USA | Johnstown, OH, USA | Seattle, WA, USABASIC QUALIFICATIONS• Bachelor’s degree in relevant engineering field or equivalent additional experience • 10+ years of physical security design experience • 3+ years of physical security design experience in data center or similar mission critical projects PREFERRED QUALIFICATIONS• Professional engineering license • Physical Security Professional Certification (PSP) certification• Crime Prevention Through Environmental Design (CPTED) certification• Solid working proficiency with AutoCAD, Revit, Bluebeam, and MS Office Suite • Proficiency in building codes, regulations, and standards including IBC, IFC• Vendor and consultant management skills • Excellent communication skills and attention to detail • Ability to travel internationally • Meets/exceeds Amazon’s leadership principles requirements for this role • Meets/exceeds Amazon’s functional/technical depth and complexity for this role Why AWS?About AWSAmazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.Inclusive Team CultureHere at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to celebrate our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.Mentorship & Career GrowthWe’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Amazon is committed to a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. For individuals with disabilities who would like to request an accommodation, please visit https://www.amazon.jobs/en/disability/us.Our compensation reflects the cost of labor across several US geographic markets. The base pay for this position ranges from $114,300/year in our lowest geographic market up to $212,800/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Amazon is a total compensation company. Dependent on the position offered, equity, sign-on payments, and other forms of compensation may be provided as part of a total compensation package, in addition to a full range of medical, financial, and/or other benefits. For more information, please visit https://www.aboutamazon.com/workplace/employee-benefits. Applicants should apply via our internal or external career site.
Technician II - Security
Paladin Technologies, Austin
This position will provide efficient and high-quality installations related to integrated security systems. This position will require a high level of project involvement, including the physical installation, testing and closing-out process.ROLES AND RESPONSIBILTIES:Serve as the subject matter expert and mentor to assigned team of technicians.Install, test, troubleshoot, repair, and maintain all Security systems at customer sites.Installation will include, but not limited to: Video Surveillance systems, IP and Analog cameras, wireless, Access Control panels, Intrusion Panels, magnetic locks, card readers, motion sensors, door contacts, electric door strikes, etc.Perform assigned projects within scope, in a timely manner, and on budget.Provide customers with system operation and training.Excellent attention to detail including maintaining concise daily records and following of operational standards and practices.Coordinate with Project Management and Field Technicians for project scheduling.REQUIRED QUALIFICATIONS:Minimum of 5+ years of experience installing video surveillance/access control systems:Video Surveillance: Genetec, Milestone, Exaqc, Axis, Hanawa, etc.Access Control: RS2, S2, Lenel, Genetec, Feenics, etc.Intrusion: DMPExposure to several different security platforms and technologies with the goal of creating cohesive solutions for our customers.Must be able to work both independently and with a team.Ability to effectively communicate with customers, engineers, PM's, techs, etc., both written and verbal.Valid US drivers license with acceptable recordAbility to pass pre-employment screeningPREFERRED QUALIFICATIONS:Any additional security experience including intrusion detection, alarms, intercoms, etc.Related certifications.Proficiency with Microsoft Office.DEMONSTRATED QUALITIES:Professional written and verbal communicationAbility to troubleshooting skills and exceptional customer serviceAbility to solve practical problems and carry out responsibilities under minimal supervisionAbility to organize workload for effective implementationAbility to complete projects on time and on budgetAbility to adapt as the external environment and organization evolvesPHYSICAL DEMANDS:In general, the following physical demands are representative of those that must be met by an employee to successfully perform the essential functions of the job.While performing the duties of this job, the employee is regularly required to stand, climb, walk, sit, push, pull, squat, crawl, and stoop. The employee is regularly required to use hands to finger, handle, feel objects, and type on keyboard; reach with hands and arms; talk and hear. Specific vision abilities required by the job include close vision, distance vision, depth perception, and the ability to adjust focus. The use of power tools will be required to effectively perform this position. The employee must occasionally lift and/or move up to 50 pounds.WORKING CONDITIONS:In general, the following conditions of the work environment are representative of those that an employee encounters while performing the essential functions of this job.While performing the duties of this job, the employee will be exposed to outdoor weather conditions, work on job sites, may be required to travel to and from job site locations, may work in a typical office environment, and is occasionally exposed to construction equipment. The noise level in the work environment is usually moderate. Confined space entry may be required. High work may be required.Benefits:Colleagues and their families are covered by medical, dental, vision, company provided basic life insurance and AD&D and short-term disability, telemedicine & virtual counseling. Voluntary insurances offered include life insurance and AD&D, short-term disability (buy-up option), long-term disability, accident, critical illness, and hospital indemnity insurance, and HSA & FSA accounts. Colleagues may also enroll in the company's 401(k) plan. Colleagues will also receive PTO (paid time off), sick leave, and 7 paid holidays.PAY: $27- $35.99/hr DOE
Urgent :: iOS developer+SwiftUI+Full stack at Austin, TX-Ons
KANAND, Austin, TX, US
Role- iOS developer+SwiftUI+Full stackLocation- Austin, TX-Onsite Day 1Length :m Long TermClient is expecting back end expertise as well along with the SwiftUI.Job descriptionExpert Swift engineer, including Swift UI 2 for both macOS and iOS platforms• Develop user-friendly and intuitive native client-server applications• Experienced in interfacing with APIs from a variety of sources• Additional ability to write Go (golang) endpoints in the application backend to serve client code (preferred)• Skilled in writing SQL queries• Experience integrating applications with ML models, a plus• Write clean, modular, robust code to implement features with no supervision• Quickly prototype new ideas to collect user feedback• Solve complex problems in a fast paced, iterative, and multi-release environment• Ensure robust security and access control in software applications• Introduce automation into build processes• Distill fuzzy business needs into software features through in-depth conversation with non-technical users and leadership• Take lead on building strong relationships within Apple, structuring valuable discussions around user experience/challenges, and turning insights into solutions• Possess a strong customer focus and be eager to work with business partners• Expert with Xcode, including XCTest, debugging, code signing• Solid experience working with SwiftUI & UI Frameworks• Experience with macOS UI design and versed in macOS Human Interface Guidelines• Collaborative mindset; experience with Git and Github/Gitlab a plus• Experience with relational and NoSQL databases (experience with PostgreSQL), RESTful services, UNIX tools, basic scripting• Experience with Continuous Integration and Continuous Deployment solutions• Passion for new and emerging technologies• Able to communicate technical issues with a non-technical audience• Familiarity with the Lean Startup software development methodology• Maniacal attention to detail• Familiarity with web technologies a plusRegards,Shiv Chandra JhaKAnand CorporationPhone No. (512)535-4169 Email ID : CAUTION - Disclaimer This e-mail contains Privileged and Confidential Information intended solely for use of the recipient (s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message. Any unauthorized review, use, disclosure, dissemination, forwarding, printing or copying of this email or any action taken in reliance on this e-mail is strictly prohibited and may be unlawful. WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. KAnand reserves the right to monitor and review the content of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the KAnands e-mail system KANAND End of Disclaimer KANAND ###
508 Compliance Expert
9th Way Insignia, Austin
Company Introduction 9th Way Insignia is a service-disabled, veteran-owned small business bringing transformative technology to our government customers so they can achieve their missions. Our specialties include cybersecurity, cloud modernization, software development, data analytics, enterprise architecture, enterprise IT, analytics and artificial intelligence. Learn more about 9th Way Insignia at https://9thwayinsignia.com/ Team (Project) Introduction 9th Way Insignia Technology is looking for a 508 Compliance Expert to assist in providing Information Technology Program Management and technical support (i.e., development, operations and maintenance) to the Department of Veterans Affairs, Benefits and Memorial Services (BAM) Portfolio. BAM provides high quality, effective, and efficient Information Technology (IT) services to those responsible for providing care to the Veterans at the point-of-care as well as throughout all points of the Veterans' health care in an effective, timely and compassionate manner. VA depends on Information Management/Information Technology (IM/IT) systems to meet mission goals, and deliver world-class, innovative systems that ensure reliable, secure, and seamless delivery of benefits and services directly to Veterans and their families. The BAM serves the Veterans Benefits Administration, the Board of Veterans Appeals, and the National Cemetery Administration to develop and manage advanced technology solutions. Functional Job (LCAT) Information: A 508 Compliance Expert has a strong understanding of Section 508 accessibility standards and regulations and experience in evaluating and ensuring digital products and services comply with these standards. They will collaborate with cross-functional teams to identify accessibility issues, provide guidance on remediation strategies, and champion accessibility best practices throughout the organization. This role requires excellent communication skills, attention to detail, and a passion for promoting digital inclusivity. Professional Level Information The 508 Compliance Expert aligns within 9th Way Insignia as a Consultant (3). A Consultant 3 completes tasks and projects of moderate scope and complexity. A Consultant 3 exercises the best judgement and problem-solving skills within defined guidelines and practices to determine appropriate action to execute assignments. Sr. Consultant will also provide guidance and/or lead on tasks/projects. Responsibilities: Conduct thorough assessments and audits of digital products, websites, applications, documents, and multimedia content to ensure compliance with Section 508 accessibility standards and guidelines. Perform manual and automated accessibility testing using tools such as JAWS, NVDA, VoiceOver, Axe, and WAVE to identify and document accessibility barriers and issues. Collaborate with development teams, designers, content creators, and project managers to provide guidance and recommendations for resolving accessibility issues and implementing accessible design and development practices. Create detailed accessibility reports, findings, and remediation plans, and track progress towards achieving compliance goals. Develop and deliver training sessions, workshops, and resources to educate team members on accessibility standards, best practices, and tools. Stay current with accessibility laws, regulations, standards (e.g., WCAG), and best practices, and ensure organizational compliance with accessibility requirements. Coordinate and conduct usability testing with individuals with disabilities, gather feedback, and incorporate insights into accessibility improvements. Work collaboratively with stakeholders across departments including IT, design, content, legal, and compliance to integrate accessibility into project lifecycles and promote a culture of accessibility. Identify opportunities for enhancing accessibility processes, tools, and documentation, and contribute to ongoing improvement initiatives. Requirements: Bachelor's degree in Computer Science, Information Technology, Human-Computer Interaction, or related field (or equivalent work experience in lieu of degree). Four or more years of experience in accessibility compliance, with a strong understanding of Section 508, ADA, and WCAG accessibility standards and guidelines. Experience conducting accessibility assessments, audits, and testing using manual and automated tools. Proficiency in accessibility testing tools such as JAWS, NVDA, VoiceOver, Axe, WAVE, and browser developer tools. Knowledge of HTML, CSS, JavaScript, and other web technologies and their impact on accessibility. Familiarity with assistive technologies, accessibility APIs, and usability testing methodologies. Excellent communication skills, with the ability to effectively communicate technical concepts and accessibility requirements to diverse audiences. Preferred/Desired: Experience working in Agile or iterative development environments is a plus. Accessibility certifications (e.g., IAAP CPACC, WAS certification) are a plus. Salary Range: The salary range for this position is $60,069 - $104,0009th Way Insignia's range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. Location: Remote 9th Way Insignia reserves the right to adjust work location based upon mission requirements. Clearance, background investigation: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. Legal: We're an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change - no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law. PDN-9bc74b40-a510-4df1-b4c7-71e7b37b04ee
IT Security Architect
Beacon Hill Staffing Group, LLC, Austin
Location: Fully Remote EST hoursWe are seeking a highly skilled and experienced IT Security Architect to join our team. The ideal candidate will have a strong background in designing and implementing secure IT infrastructures, with expertise in VLAN, DNS, VPN, threat analysis, and incident response.The primary responsibilities of the IT Security Architect include:Designing and implementing secure network architectures utilizing VLANs to segment and isolate network traffic, ensuring data integrity and confidentiality.Managing and configuring DNS (Domain Name System) servers to ensure secure and efficient resolution of domain names, preventing DNS-related attacks such as cache poisoning and DNS hijacking.Implementing and maintaining VPN (Virtual Private Network) solutions to securely connect remote users and sites to the corporate network, safeguarding data transmission over public networks.Conducting thorough threat analysis and risk assessments to identify potential security vulnerabilities and developing strategies to mitigate risks effectively.Developing and implementing incident response plans and procedures to effectively detect, respond to, and recover from security incidents and breaches.Collaborating with cross-functional teams to integrate security best practices into the design and implementation of IT systems and applications.Staying abreast of the latest developments and trends in IT security technologies and methodologies, and recommending appropriate security solutions to enhance the overall security posture of the organization.Providing guidance and mentorship to junior members of the IT security team, fostering a culture of continuous learning and professional development.Requirements:Proven experience working as an IT Security Architect, with a minimum of 5 years of relevant experience.In-depth knowledge of VLANs, DNS, VPN technologies, and their implementation in enterprise environments.Strong understanding of network security principles and best practices, including firewall configuration, intrusion detection/prevention systems, and network access control.Experience conducting threat analysis, risk assessments, and developing incident response plans.Beacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs.Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com .We look forward to working with you.Beacon Hill. Employing the Future™
Security Engineer / Red Team Operator
TheCollegeBoard, Austin
Technology Division, Cyber Security Operations Team100% Remote (working EST)About the Team:The Cyber Security Operations team is critical to the strategic foundation of our products, most notably the secure delivery of our new Digital SAT and AP programs. We are a highly motivated group of cyber security experts who take a proactive approach to ensuring a strong security posture. We partner across the organization to mature our Threat Management and Incident Response procedures and are constantly seeking and experimenting with new technologies. We are currently using a variety of cutting-edge tools that provide comprehensive cyber security operations for the College Board's critical infrastructure in support of the College Board's mission to connect students to college success and opportunity. College Board is committed to creating an inclusive environment where all team members feel valued, respected, and supported in their work. We welcome individuals from diverse backgrounds and experiences to join our team and contribute to our ongoing success.About the RoleThe College Board is seeking a Red Team Operator who will play a critical role in strengthening our cybersecurity infrastructure. This individual will validate the effectiveness of our security controls and detection logic through offensive security operations and collaborative purple teaming exercises. Leveraging their deep understanding of threat actors, they will simulate potential cyber threats across our systems while documenting their findings and methodologies. This will provide invaluable insights into vulnerabilities and serve as a roadmap for improving our security measures. The operator will also need to communicate these results effectively to various stakeholders within the organization, ensuring leadership is aware of the potential threats and can take appropriate action to mitigate them. This work is crucial to protecting the College Board from potential cyber-attacks and ensuring the safety of our data.In this role, you will:Conduct Offensive Cyber Security Operations: Execute covert operations to assess the organization's security posture and readiness against cyber threats.Perform Penetration Testing: Conduct comprehensive assessments of the Digital Exam Player, web applications, and other systems using both manual and automated testing techniques.Engage in Purple Teaming: Facilitate collaborative exercises with internal Incident Response and Threat Hunt teams to enhance the organization's defensive capabilities.Execute Multi-stage Attack Simulation: Coordinate with Red Team members to simulate attacks, including initial access, privilege escalation, lateral movement, and data exfiltration.Create Threat Mimicry: Mimic adversary tactics, techniques, and procedures (TTPs) to assess defensive capabilities and identify weaknesses.Conduct Security Control Evaluation: Evaluate the detection and response capabilities of security controls, such as SIEM, EDR, and network monitoring solutions.Investigate C2 Techniques: Research and integrate new C2 techniques and tools to evade detection and enhance operational capabilities. Monitor and analyze C2 traffic for anomalies and indicators of compromise (IOCs).Provide Technical Guidance: Provide technical expertise and guidance to the VTM team on building custom scanning signatures and techniques. Also, guide threat hunters on adversary behaviors, attack techniques, and IOCs.Contribute to Culture Building: Foster a culture of collaboration and continuous learning within all Cyber Operations teams.Stay abreast of emerging threats and vulnerabilities affecting web applications or endpoints and incorporate them into assessment methodologies.About you, you have:A bachelor's in computer science or equivalent work experience7 years in IT, with 3 years in offensive securityExperience in Red/Purple team exercises and penetration testingProficiency in C2 frameworks (e.g., Cobalt Strike) Certifications like CEH, OSCP, GWAPT, Sec+, or GIAC preferredFamiliarity with open-source/commercial offensive security tools, and cloud-based attacker infrastructure deployment.Strong understanding of web application CWEs, OWASP Top 10, Threat Intelligence, and Threat ProfilingExperience with IDS/IPS, SIEM, network defense tools, DLP technologies, network security architecture, and enterprise anti-virus/malware solutionsProficiency with Burp Suite and testing Web Applications and API's. Familiarity/experience with Electron framework preferredAbility to maintain discretion and integrity at all timesAbility to work in the US without sponsorshipOur Benefits & Compensation:College Board offers a strong compensation and benefits package that attracts top talent looking to make a difference in education. Our robust benefits package includes health, dental, and vision insurance, tuition assistance, paid time off, paid parental leave, retirement benefits with a generous matching program, and more. We reward performance through annual bonuses and provide opportunities for salary growth over time through base compensation increases, merit raises and promotions. We believe in compensating staff members fairly in relation to each other, their qualifications, and their impact.The salary range for a new employee in this position is$120,000 to $143,000.The salary offer of an individual candidate within this range is specific to their location and qualifications. Each salary offer is determined carefully using internal and external benchmarking and adjusting for the candidate's location. You will have an opportunity to discuss salary in more detail after you begin the application process. As a self-sustaining non-profit organization with global impact, College Board offers a job that matters, a team that cares, and a place to learn, innovate and thrive!About Us:We are motivated to positively impact the educational and career trajectories of millions of students a year.We prioritize building a diverse and inclusive team where every employee can thrive, and every voice is heard.We value learning and growth; we offer formal and informal ways to lead through your superpowers, sharpen your strengths, and meet your development goals.Our high-performing engineers work with the latest technologies, so you will be constantly learning and sharpening your skills, enabling you to be industry-forward instead of left behind technologically.#LI-TheAcorn#LI-Remote
Senior Market Development Manager
ARM, Austin
Job DescriptionDo you have a passion for market & business development? Do you love to translate corporate and divisional goals into market strategies? If this sounds like you and you would like to join a highly motivated team, then we believe this is an excellent opportunity for you in Austin, TX!The Arm Architecture & Technology Group is at the very heart of Arm, building long-term direction for ARM and its ecosystem. We have an exciting opportunity for a Senior Market Development Manager, to join a growing team where you will be responsible for delivering both strategic market and business development activities.Arm has a well-established position as the world's leading supplier of IP in the Semiconductor industry. We are adding this strategic role to the Architecture and Technology group market development team which is targeted at growing awareness and driving adoption of Arm Architecture initiatives in the new parts of the value chain not traditionally served directly by Arm. It's an opportunity to drive the industry and work on a 2 to 5-year horizon, your aim is to craft wider market awareness and pull for these initiatives. You'll have a focus on (but not limited to) :Building out the value proposition of digital security in connected devices and driving the strategy.Evangelize and identify the key adoption opportunities for ARM ArchitectureTesting and refining the value proposition with industry-leading players in the digital transformation space.Engage and communicate with the value chain partners which includes Silicon partners, System software providers, ODMs, Cloud service providers, Systems Integrators and OEMs.Job Overview:ow ARM Architecture and various ecosystem initiatives (security & standardization) is valued at different points of the supply chain is your primary accountability. This includes activities such as:Building familiarity with Arm's existing products, architecture and technologies.Own and drive the landscaping, planning and ultimately the execution of the strategy along with a wider cross-functional team.Ensuring the widespread awareness and adoption of ARM technologies in the value chain across various verticals by working closely with ARM ATG (Architecture & Technology Group) and Lines of Business groups.Communicate and work with architecture & security experts along with product management teams in partner companies globally.Build the ecosystem with influencers in various industry verticals.Creating materials and presenting during various forums, webinars or industry events. Also developing blogs, white papers etc.Development & promotion of PSA (Platform Security Architecture) Certified value propositions to both internal & external stakeholders.We are growing an Industry leading team and are looking for how your contribution can in turn identify and create new opportunities & pull for Arm.HRequired Skills and Experience :Good market understanding of Embedded systems, digital transformation, cloud services, enterprise deployments and value chains around connected devices.Worked with Cloud service providers, platforms, RTOS and Linux distros.Strong communicator, able to work well in a multi-geography, cross-functional organization. Eye for business with strong analytical and problem-solving abilities.Familiarity with building and testing value propositions of new services into senior (VP and CxOs) decision-makers as well as technical partners. Also, should be able to confidently build links at all levels.Build networks and develop positive relationships across the supply chain.Experience working in market development or as a FAE."Nice To Have" Skills and Experience :Desirable to have an awareness of IoT Security requirements along with various global IoT Security standards, regulations and laws.Self-organised, focused, forward & critical thinking with an ability to bring new ideas into the business.A passion to inspire change and open new opportunities to Arm and its partners!In Return:At Arm, we want our people to Do Great Things. If you need support or an accommodation to Be Your Brilliant Self during the recruitment process, please email [email protected]. To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process.Arm is an equal opportunity employer, committed to providing an environment of mutual respect, where equal opportunities are available to all applicants and colleagues. Arm prohibits discrimination or harassment of any kind based on race/ethnicity, religion, national origin, age, sex, sexual orientation, gender, gender identity and expression, disability, neuro-diversity, pregnancy, medical condition, marital status, citizenship status, military/veteran status, as well as those characteristics protected by applicable laws, regulations and ordinances.Arm's hybrid approach to working is centred around flexibility, where we split our time between the office and other locations to get our work done. Within that framework, we empower groups and teams to determine their own particular hybrid working pattern, depending on the work and the team's needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you.#LI-MS1 Accommodations at ArmAt Arm, we want our people to Do Great Things. If you need support or an accommodation to Be Your Brilliant Self during the recruitment process, please email [email protected]. To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Hybrid Working at Arm Arm's hybrid approach to working is centred around flexibility, where we split our time between the office and other locations to get our work done. Within that framework, we empower groups and teams to determine their own particular hybrid working pattern, depending on the work and the team's needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you. Equal Opportunities at Arm Arm is an equal opportunity employer, committed to providing an environment of mutual respect where equal opportunities are available to all applicants and colleagues. We are a diverse organization of dedicated and innovative individuals, and don't discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Cyber Security Manager
Beacon Hill Staffing Group, LLC, Austin
This position is responsible for guaranteeing that the security needs of stakeholders, vital for safeguarding the organization's objectives and operational workflows, are sufficiently addressed across all dimensions of enterprise architecture. This includes reference models, segment and solution architectures, as well as the resulting systems that support these objectives and workflows.Responsibilities:Lead a team to successfully complete projects, overseeing progress and tracking the status of Authorization to Operate (ATO).Investigate, analyze, and respond to cyber incidents occurring within network environments.Utilize data from various cyber defense tools to analyze and mitigate threats.Interpret, analyze, and report all events and anomalies according to network directives, including initiating, responding to, and reporting discovered events.Evaluate, test, recommend, coordinate, monitor, and maintain cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software.Ensure alignment of cybersecurity plans, controls, processes, standards, policies, and procedures with established cybersecurity standards.Identify security risks and exposures, determine causes of security violations, and propose procedures to prevent future incidents and enhance security.Develop techniques and procedures for conducting cybersecurity risk assessments, compliance audits, and evaluation and testing of hardware, firmware, and software for potential impacts on system security.Investigate and resolve security incidents such as intrusions, frauds, attacks, or leaks.Provide coaching and guidance to less-experienced professionals and serve as a Value Stream Manager.Core Competencies:Business ContinuityClient Relationship ManagementRisk ManagementSystems IntegrationTechnology AwarenessStrong communication skillsBeacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs. Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com . We look forward to working with you.Beacon Hill. Employing the Future™
REMOTE Data Security/DLP Business Analyst
Beacon Hill Staffing Group, LLC, Austin
BA for Data Security / Data Loss preventioProjects: Data sensitivity labeling within Office365 , the labeling is optional right now and will at some point be mandatory to used the labels. Also a replacement for a tool that captures all the data loss information due to it being insufficient. Another project to look at additional capabilities in Service Now.Experience in data loss as a BA, some cyber security knowledge, some Power BI background would be useful. Any Service Now platforms would be great and gathering requirements for Service Now. Jira is heavily used by this team and moving to SAFe agile from a project methodology standpoint.3 month minimum contract2hire conversionThis role will be working with the program manager on the data security and data loss prevention work stream within Global Cyber Security in which people, processes, and technologies are significantly impacted. We require a strong BA that has demonstrated success. This is a great opportunity to work within a fast-paced environment, within a global team.Support the Global Cyber Security Program by:* Gathering requirements, providing expertise and guidance, and executing plans to enhance business capability, achieve results and support the global cyber security organization.* Understanding and clearly documenting complex process flows.* Identifying and implementing business processes as well as continuous improvement initiatives by assessing alignment of current process, programs, and systems to business requirements and recognize opportunities for standardization, increased efficiency, cost reduction, increased quality, and improved user experience to enhance performance of the program.* Providing recommendations for improvement and implementing procedural changes to ensure technical solutions align with organizational objectives, regulatory standards, and business needs.* Identifying and eliminating risks to complex change implementation by planning user acceptance testing, clarifying, and ensuring developers understand requirements, coordinating users, executing tests, monitoring test completion, escalating defects/issues, and soliciting feedback to support accurate testing and alignment with desired outcomes.* Facilitating meetings supporting all phases of assigned projects, using appropriate tools and technology according to meeting objectives and attendees.Primary Responsibilities* Foster a partnered approach, building and maintaining strong productive working relationships with internal stakeholders aligning service delivery with business needs.* Develop implementation and improvement plans by eliciting business requirements from stakeholders to identify business needs, evaluate requirements and desired outcomes, analyze gaps between current and future state, and recommend solutions.* Understand and clearly document complex process flows.* Develop a list of technical business requirements based on discussions with stakeholders, engineers, and end users and analyze them for accuracy, completeness, redundancy, ambiguity, and testability.* Discuss complex technical details at a high level with leadership/stakeholders and at a low level with engineers and architects.* Assess, document, and communicate impact of change to business and individuals by collaborating with internal and external key stakeholders to analyze information needs and functional requirements, accurately define costs, schedule timeline, and evaluate interdependencies to develop business requirements documentation for key stakeholder engagement.* Support end-users by thoroughly understanding user requirements and user experience.* Assist with the identification of training requirements for assigned projects and business units by providing input to the training plan, supporting the development of training materials and participating in the training for assigned projects as required.* Analyze business requirements for accuracy, completeness, redundancy, ambiguity, and testability.* Identify and eliminate risks to complex change implementation by planning user acceptance testing, clarifying, and ensuring developers understand requirements, coordinating users, executing tests, monitoring test completion, escalating defects/issues, and soliciting feedback to support accurate testing and alignment with desired outcomes.* Design and provision reporting solutions to enable project decision making, tracking and implementation.* Adhere to data policies & standards, while also enforcing correct management of sensitive data in compliance with global business rules, legal and governmental regulations.* Ensure data integrity, accuracy and reconciliation within reports and dashboards by reviewing, identifying, and resolving gaps and inconsistencies.Required Qualifications* Education: Bachelor's degree or equivalent combination of education and work experience.* Experience: 4 years relevant experience.* Ability to work global hours (US, UK, and Australia time zones).* Excellent communication, analytical and interpersonal skills.* Working knowledge of cyber security projects and programs and managing requirements and testing on the projects.* Experience collaborating with technical team members, business analysts, and project/program managers to ensure a quality solution is delivered.* Evidence of successful participation in the delivery of complex programs.* Effective collaboration, communication, and strong stakeholder management skills.* Impact analysis and strong problem-solving skills when gathering and assessing business needs to overcome potential obstacles and challenges.* Facilitate meetings supporting all phases of assigned projects, using appropriate tools and technology according to meeting objectives and attendees.* Self-motivated, assertive, detail oriented, high degree of organization skills and the ability to appropriately prioritize assigned tasks to ensure timely goal achievement.Preferred Qualifications* Experience with software including Jira, Confluence, Microsoft O365.* Experience using Data Security Technology/Solutions such as Data Loss Prevention and Data Classification.* Working knowledge and understanding of SharePoint, SQL, relational databases, and reporting tools such as Power BI, Tableau, MS Reporting Services and Excel.* Working knowledge of terminology, function and fundamental capabilities of common computer, software, information and communication technology devices, components, and concepts.* An understanding of IT networking and infrastructure.* Working knowledge of the ServiceNow platform and modules.Preferred Competencies/Skills* Understand the principles underlying the relationship among facts and apply this understanding when solving problems.* Observe and evaluate the outcome of a business need and interpret the results and their implications.* Foresee potential obstacles and challenges, identifying root cause and recommending plans to address.* Effectively present thoughts to influence and persuade organizational leaders and key stakeholders to adopt innovative recommendations.* Utilize advanced written and oral communication skills to inform key stakeholders.* Navigate organizational structure by networking and building relationships among multiple business units.* Share knowledge and educate others.* Exhibit leadership in everyday interactions.* Successfully engage in multiple initiatives simultaneously.* Work effectively under pressure; develop and adhere to deadlines.* Adapt and be flexible in a complex, changing environment.Beacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs.Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com .We look forward to working with you.Beacon Hill. Employing the Future (TM)