Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (760)

Don't see your company?

Create a company profile
Information Technology • Cybersecurity
San Antonio, Texas, USA
52 Employees

SandTech Solutions is a Certified 8a member as well as a Service Disabled Veteran-Owned Small Business (SDVOSB). We provide Cyber Security, Vulnerability Assessments, Penetration Testing as well as a holistic IT approach for your business. Our goal; TO ENABLE SUCCESS! Although we are a young company, we are staffed with sharp individuals with an average experience level of 20 years each working on Information Technology (IT), Cyber, and Telecommunications systems. Our deep understanding of technology and our proven approach to any challenge has helped us develop our client's Defensive Cyber Systems. SandTech Solutions is a Small Disadvantaged Business (SDB) as well as a Texas Historically Underutilized Business (HUB) and has earned certifications from the South Central Texas Regional Certification Agency (SCTRCA) for DIBE, ESBE, HABE, MBE, SBE, VBE.


Information Technology • Security • Cybersecurity
Columbia, Maryland, USA
51 Employees

Vulnerability Research Labs has spent more than a decade becoming a respected source on cyber threat intelligence while maintaining the culture and feel of a start-up. We are among the best in the field because we believe in our mission – to deliver unparalleled capabilities that alleviate the risk posed by today’s cyber threats. We offer the opportunity to work with diverse technologies and outstanding people, while being a part of an exciting company with a flat organizational structure. VRL is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.


Security • Cybersecurity
Pittsburgh, Pennsylvania, USA
52 Employees

Echelon was born with a purpose; the belief that security and privacy are basic human rights. We founded our firm on the idea that cybersecurity isn’t something that a professional services firm can dabble in. The threats we face are constantly evolving and that calls for experts that place their full focus on the problem with full organizational support. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. We take this personally and see it as our calling to stem the tide. We are all in. We offer a suite of services such as: - Offensive Security & Testing - Audits, Assessments & Compliance - vCISO - Defensive Security Our Service Delivery Model: ASSESS: Understand the current state of your cybersecurity and technology risk posture through tailored assessments designed specifically for your organization, by our team of experts. COMPLY: Provide organizational stakeholders, business leaders and customers peace of mind by demonstrating an effective security and technology risk posture through unbiased and independent assessments. Our experts will help you and your organization cut through the complexity of cybersecurity standards, frameworks and regulations through efficient and effective risk management exercises. BUILD: Enhance or augment your current cybersecurity and technology risk capabilities by partnering with our experts to help you engineer solutions to your biggest risk areas, build processes that make improvements sustainable and provide overall enhanced organizational cybersecurity maturity


Information Technology • Database • Cybersecurity
Vienna, Virginia, USA
33 Employees

ApplyLogic is a certified Service-Disabled Veteran Owned Small Business (SDVOSB) and leading provider of integrated technology solutions to customers across the public and private sectors. Our business is about optimizing your business, through the full range of IT services that are critical to both daily operations and long-term strategic plans. We have been recognized at both the national and local levels as a fast-growing market leader, with a commitment to excellence and quality that is validated through ISO 9001:2015 Certification, and consistently reflected in the services we deliver. ApplyLogic is a Local Disadvantaged Business Enterprise (LDBE), certified in Virginia, and recognized as such in many other states across the country. We provide scalable, end-to-end solutions that safeguard your network and data, streamline processes, and create efficiencies that save time and money, helping your business prosper. ApplyLogic consultants bring best-in-class technical expertise in the areas of: ■ Digital Transformation ■ Migration & Modernization ■ Cybersecurity ■ Complex Program & Project Management Our goal is to exceed your expectations. Responsive, reliable and trusted to meet customers’ needs— and quality is a core value. Relationships matter—even in IT. For us, every new engagement is an opportunity to prove our excellence, deepen your trust and make ourselves the long-term solution to your organization’s ongoing IT needs. When will you Apply Logic?


Information Technology • Cybersecurity
Fort Myers, Florida, USA
21 Employees

Cigent protects your most valuable asset – your data – with Cigent Secure SSDs™ that prevent compromise by attackers who remotely or physically access a device and secure file sharing that protects data wherever it goes. Funded by In-Q-Tel™ and founded by experts in storage, data forensics, and cyber security to develop a new standard in data protection.


Hardware • Software • Cybersecurity
Fallbrook, California, USA
47 Employees

Industrial IoT Cybersecurity breaches and threats are alarmingly increasing in frequency and complexity. These cybersecurity challenges coupled with the no increase in the internet flow of information is creating a widening gap in the ability of internally skilled resources to respond. This gap is causing tremendous risks, losses and negatively impacting organizations. Palmchip Industrial IoT cybersecurity solutions and services focuses on filling the gap one organization at a time by simplifying cybersecurity complexity, and keeping organizations secure and more productive. VISION/MISSION:To improve and enhance quality of life by creating leading edge and wide reaching technologies and solutions. To create Happiness technologies and solutions for a connected and secure world. OVERVIEW: 1996, Palmchip is a pioneer in System on a Chip (SoC) hardware, firmware and software. 2000, Palmchip introduced Single Chip (SoC) Platform and Intellectual Properties (IP) with built-in security powered over 1.5 Billion Network Security, Storage, Telecom, Wireless, IoT, Powergrid and WiFi devices to-date. 2009, Palmchip extended vertically its offering, to include Custom Mobile and Desktop Application Development for Security, Business Productivity and IoT Applications. 2015, Palmchip expanded its Security offering to include Cyber Security Solutions and Services for Real-Time, data mirroring and data monitoring Cyber Security solutions addressing efficient and custom data protection requirements and challenges facing midsize and small Business to Business and Business. Our Clients are in various domains including Healthcare, Banking, Data Centers and Aerospace. Over 116 licensees and Customers. Palmchip provide Custom Software development for Cyber Security, Storage and Networking to Fortune 1000 companies such as Seagate, Fireye, Maxtor, LSI Logic, WiChorus (Tellabs) and Broadcom to name a few. Email: [email protected], Phone: +1 (951) 760-0300


Cybersecurity
5 Offices
896 Employees

VMware Carbon Black is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The VMware Carbon Black Cloud consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, VMware Carbon Black has key insights into attackers’ behaviors, enabling customers to detect, respond to and stop emerging attacks.


Cybersecurity
Nashville, Tennessee, USA
82 Employees

Conquest Cyber is an elite team of cyber special operators working shoulder to shoulder with critical sector technologists as they stand on the frontline of freedom. The ARMED ATK software and SCyOps elements deliver Integrated Cyber Resiliency Management capabilities. These capabilities negate risk and provide business leadership with context, transparency, and a map from risk to operations.


Cloud • eCommerce • Enterprise Web • Consulting • Cybersecurity • Defense • Conversational AI
United States
25 Employees

Hier klicken um Original Neo Tropfen mit 50%Rabatt beim Hersteller zu bestellen ➡️ https://cutt.ly/8w1EAQKy ⬅️ (Link im Browser kopieren) Gebrauchsanleitung für Neo Tropfen Um die besten Ergebnisse zu erzielen, ist es wichtig, Neo Tropfen korrekt einzunehmen. Hier ist eine Schritt-für-Schritt-Anleitung: Vor der ersten Verwendung Drücken Sie den Sicherheitsverschluss nach unten, um die Flasche zu öffnen. Einnahme der Tropfen Nehmen Sie eine (1) Pipette (1 ml) einmal täglich ein. Verwenden Sie die Messanleitung für eine einfache Dosierung. Tropfen Sie die Flüssigkeit direkt in den Mund. Die empfohlene Tagesdosis sollte nicht überschritten werden. Für eine optimale Aufnahme empfehlen wir die Einnahme vor der Hauptmahlzeit. Sicherheitsverschluss Öffnen: Eine Anleitung Die Flasche ist mit einer Kindersicherung ausgestattet. Hier sind die Anweisungen zum Öffnen: Halten Sie die Flasche mit einer Hand fest. Greifen Sie den Deckel mit der anderen Hand. Drücken Sie den Deckel nach unten und drehen Sie ihn gegen den Uhrzeigersinn, bis der Sicherheitsring bricht. Drehen Sie weiter, bis sich der Deckel löst und abgenommen werden kann. Diese Schritte sollen versehentliches Verschütten oder Missgeschicke verhindern. Die Bedeutung eines gesunden Lebensstils Während Neo Tropfen Ihnen helfen können, Ihre Gewichtsabnahmeziele zu erreichen, ist es wichtig, sie mit einem gesunden Lebensstil zu kombinieren. Hier sind einige Tipps, um Ihre Ergebnisse zu maximieren: Hier klicken um Original Neo Tropfen mit 50%Rabatt beim Hersteller zu bestellen ➡️ https://cutt.ly/8w1EAQKy ⬅️ (Link im Browser kopieren)


Cybersecurity
2 Offices
20 Employees

Bearer helps security and engineering teams proactively find and fix data security risks and vulnerabilities across their application environment so they can prevent data breaches before they happen.

BAE Systems, Inc. Thumbnail
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
17 Offices
40000 Employees
Caterpillar Thumbnail
Artificial Intelligence • Cloud • Internet of Things • Software • Cybersecurity • Industrial
6 Offices
100000 Employees
LogicManager Thumbnail
Cloud • eCommerce • Security • Software • Cybersecurity
Fully Remote, USA
86 Employees
Hiro Systems Thumbnail
Blockchain • Fintech • Security • Software • Cryptocurrency • Cybersecurity • Web3
Fully Remote, USA
40 Employees
ReversingLabs Thumbnail
Information Technology • Software • Cybersecurity
Fully Remote, USA
300 Employees
Brinqa Thumbnail
Cloud • Security • Software • Cybersecurity
Austin, Texas, USA
90 Employees
Capco Thumbnail
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
24 Offices
6000 Employees
Imprivata Thumbnail
Healthtech • Security • Software • Cybersecurity
6 Offices
957 Employees
CertifID Thumbnail
Real Estate • Security • Software • Cybersecurity • PropTech
Austin, Texas, USA
87 Employees

Information Technology • Consulting • Cybersecurity
Cedar City, Utah, USA
51 Employees

The GuardSight team of experienced cybersecurity warriors fight cyber adversaries for a living, utilizing a systematic approach to threat detection, threat hunting, and response. We provide comprehensive cybersecurity operations, assessments, and response services to protect the critical assets and operations of our customers. We serve a variety of industries including: aviation, banking, biopharma, data sciences, entertainment, education, finance, healthcare, internet, legal, real estate, retail, sports, and technology. If you’re searching for a force multiplier to combat cyber-aggressors for your business, let’s talk. Call us at 844-482-7374.


Cybersecurity
San Marcos, California, USA
14 Employees

For organizations handling Protected Health Information (PHI), VMRacks assures HIPAA compliance through managed security and HIPAA cloud services. Prevent PHI risks that can lead to costly data breaches, fines, and rising compliance costs. VMRacks provides peace of mind for government, enterprise, and non-profit health care & IT organizations by: • Managing your HIPAA Compliance. Unlike infrastructure-only IT solutions, VM Racks employs a full-time HIPAA Compliance Officer, freeing your team to focus on maximizing growth. We sign a Business Associate Agreement (BAA) for every client — a requirement for true compliance. • Reducing data security risk. We secure and encrypt PHI on our servers, our off-site backups, and in-transit, actively protecting data integrity and confidentiality • Delivering a level of responsive support far above other IT service providers, with U.S.-based Tier-2 engineers available 24/7 With HIPAA compliant managed security, secure FTP, secure RDP, encrypted email, secure WordPress, and two-factor drive storage services, VMRacks prevents PHI security risks before they can crop up and cause damage. We hold the following audited certifications: SSAE SOC 16 SOC 1 Type II (SSAE 16 and ISAE 3402) SOC 2 Type II SOC 3 Type II Eliminate the risk of a HIPAA violation or leak — host your application, website, or protected data in a HIPAA-secure, managed environment! Check out our website (below) to learn more.


Artificial Intelligence • Cybersecurity
San Francisco, California, USA
107 Employees

Horizon3.ai's mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces. Like APTs, ransomware, and other threat actors, our algorithms discover and fingerprint your attack surface, identifying the ways exploitable vulnerabilities, misconfigurations, harvested credentials, and dangerous product defaults can be chained together to facilitate a compromise. NodeZero is a true self-service SaaS offering that is safe to run in production and requires no persistent or credentialed agents. You will see your enterprise through the eyes of the attacker, identify your ineffective security controls, and ensure your limited resources are spent fixing problems that can actually be exploited. Founded in 2019 by industry, US Special Operations, and US National Security veterans, Horizon3.ai is headquartered in San Francisco, CA, and made in the USA.


Machine Learning • Other • Cybersecurity • Quantum Computing • Defense
Richland, Washington, USA
6,000 Employees

Pacific Northwest National Laboratory advances the frontiers of knowledge, taking on some of the world’s greatest science and technology challenges. PNNL is a U.S. Department of Energy national lab with distinctive strengths in chemistry, Earth sciences, biology, and data science that are central to our scientific discovery mission. PNNL’s research lays a foundation for innovations that advance sustainable energy through decarbonization and energy storage and enhance national security through nuclear materials and threat analyses. PNNL collaborates with academia in its fundamental research and with industry to transition technologies to market.


Cybersecurity
San Francisco, California, USA
16 Employees

Paladin is cyber protection simplified. Our mission is to make cybersecurity accessible and practical for all companies. Cyber risk is human risk. Paladin Shield, our all-in-one cybersecurity suite, makes it easy to defend employees, systems, and data against cybercriminals.


Professional Services • Software • Cybersecurity
Highland Heights, Ohio, USA
50 Employees

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer. With our team of certified experts, SOC Type-3 certified security, and full-sized ISO-5 cleanroom, SalvageData has the infrastructure and customer support system that makes us standout from any competition. We provide certified data recovery to restore data that has been lost, deleted, corrupted or made inaccessible due to hardware failure, human error, malware, or other types of damage.


Cybersecurity
Reston, Virginia, USA
89 Employees

Electrosoft delivers a diversified set of technology-based solutions and services differentiated by thought leadership and innovation. Fueling the success of our Government and commercial customers since 2001 through outstanding value and trust, we couple our domain knowledge and experience with proven, mature, management practices to deliver the right solutions on time and within budget. What distinguishes us from our peers is our deep culture of customer-service, professionalism, accountability, excellence and innovation delivered on the bedrock of uncompromising integrity.


Cybersecurity
Boston, Massachusetts, USA
31 Employees

OneLayer is a cyber security platform dedicated to private cellular networks, that enables organizations to unleash their full potential. Private cellular has all the ingredients to be more secure, yet most of the existing security solutions such as firewalls, NAC, IDS/NDR and Asset Management tools, are not applicable in the new cellular environment. Hence, they are unable to secure the network itself, exposing it to lurking threats. The multi-purpose promise of private networks, combining IT/OT use cases, endpoint mobility, roaming across networks and cloud edge services, further increases the attack surface. Accordingly, cybersecurity is considered to be the main adoption barrier by both customers and technology providers. OneLayer ensures that the best IoT security toolkit and approaches will be simply implemented in your private cellular environment. We extend and adopt existing security methodologies to this new type of network and provide full asset visibility, context-based segmentation, cellular anomalies detection & response and zero-trust device connectivity.


Cybersecurity
New York, New York, USA
35 Employees

Deduce uses a vast identity network to fight back against account takeover and new registration fraud.


Cybersecurity
Brookhaven, Mississippi, USA
28 Employees

We believe that all businesses deserve high-quality security which is why our service is designed to help companies of all sizes and industries effectively manage their networks, protect critical data and maintain regulatory compliance. With CYBERShark, you receive enterprise-class security and compliance on day one. Our affordable SOC-as-a-Service can be launched in minutes, doesn’t require any hardware installation and is easy to scale as your company grows so you can maintain complete protection for your business at all times.