- Robert Half Technology (Austin, TX)
- …actively partnering with an Austin-based client to identify a Data Security Analyst (Contract). This role is responsible for monitoring, analyzing, and responding to ... areas of exposure. + Investigate and respond to security incidents, including malware infections, data breaches, and unauthorized access. + Develop and enforce data… more
- SHI (Austin, TX)
- …to thrive - in our offices or yours.** **Job Summary** The Associate Security Analyst - SOC is responsible for supporting the Security Operations Center (SOC) team in ... + Assist in the investigation of security incidents, including data breaches, malware infections, and unauthorized access attempts. + Collaborate with other IT and… more
- Robert Half Technology (Houston, TX)
- Description We are looking for a detail-oriented and driven Cybersecurity Analyst to join our growing security team. In this role, you will monitor and defend our ... (Windows, Linux), and security principles. + Understanding of threat actors, malware types, and common attack vectors (phishing, ransomware, etc.). Technology… more
- Capgemini (TX)
- …in vulnerability scanning, SEIM, penetration testing, network admission control, advanced malware protection and/or mobile device management. + Experience in design, ... Applicant http://www.capgemini.com/resources/equal-employment-opportunity-is-the-law **Job:** _Technology Strategy_ **Organization:** _CIS US MS_ **Title:** _Vulnerability Analyst - Scanning_ **Location:** _Texas_ **Requisition ID:**… more
- Google (Austin, TX)
- …with teams across Google to deliver bold solutions in abuse areas such as malware , spam and account hijacking. A team of Analysts, Policy Specialists, Engineers, and ... Program Managers, we work to reduce risk and fight abuse across all of Google's products, protecting our users, advertisers, and publishers across the globe in over 40 languages. The US base salary range for this full-time position is $126,000-$181,000 + bonus… more
- 3M (Austin, TX)
- …M365). + Perform memory analysis, disk forensics, log correlation, and malware reverse engineering to support incident containment, eradication, and recovery. + ... (GCIH, E CEH, E CIH), or network forensics (GIAC Network Forensic Analyst (GNFA), NICCS Certified Network Forensics Examiner (CNFE) Additional qualifications that… more