Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Dayton, OH Cybersecurity Companies (2)

Don't see your company?

Create a company profile
Information Technology • Professional Services • Cybersecurity
Dayton, Ohio, USA
527 Employees

Clark Schaefer Hackett is a results-driven business advisory and accounting firm. We are forward-thinking. We are innovators and problem solvers and we optimize business results in financial, technology, workforce and operational areas. We are passionate about helping clients succeed—and strive to be a catalyst for growth and innovation. We’re passionate about client service, so we regularly share articles, resource guides and webinars that help you boost profits, manage risk, and improve performance. Take a look at cshco.com/guidance. Founded in 1938, we’re one of the region's largest professional services firms, operating eight offices in Cincinnati, Cleveland, Columbus, Miami Valley, Springfield, Northern Kentucky, Toledo and East Lansing, MI. From these locations, we serve clients throughout the United States. INTERESTED IN JOINING CSH? Imagine a place where you don’t just work, you thrive. It’s a place where you’re guided through the challenges and choices on your professional path; you’re engaged in meaningful, energizing work; and you have the tools you need to succeed. Don’t settle – arrive where you’ll succeed – at Clark Schaefer Hackett. Click on the Careers tab above to learn more about the opportunities that await you!


Cybersecurity
Dayton, Ohio, USA
44 Employees

Tenet3 was established in 2013 with a passion to make cyber resilience easy. We automate digital engineering model building for cyber risk assessment and mitigation. We specialize in cyber security economics. Specifically, we employ authoritative models to identify the strategies and tactics that lead to optimal security investments for our clients. Our automated metrics assess threat mitigation strategies, cyber security costs, residual risks, and resiliency in complex systems. We believe that the best way to achieve cost effective cyber security is through strategic analysis of a system "as designed", "as built", and "as operating".