Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (760)

Don't see your company?

Create a company profile
Aerospace • Information Technology • Cybersecurity
Herndon, Virginia, USA
87 Employees

Artel, LLC offers mission-critical communications services around the world, with a complete portfolio of satellite and terrestrial network communications and infrastructure, cyber security, risk management and IT solutions. Since 1986, Artel has partnered with government and industry leaders through a broad variety of contract vehicles, enabling customers to maintain privacy while operating effectively, affordably and without interruption. Artel delivers protection and customization that safeguards content access and delivery across multiple networks and IT infrastructures—in every domain and environment.


Cybersecurity
New York, New York, USA
12 Employees

Next Caller, a Pindrop® Company, is an enterprise-grade call verification service for contact centers. Next Caller’s primary service, VeriCall®, allows businesses to passively “green light” customers while flagging suspicious activity like call spoofing to protect against fraud before it starts. With VeriCall® technology, businesses can save time, money, and avoid treating customers like criminals. Next Caller was founded in 2012 and acquired by Pindrop® in 2021. Next Caller, a Pindrop® Company, is headquartered in New York City. For more information visit http://www.nextcaller.com


Security • Software • Cybersecurity
San Francisco, California, USA
2,598 Employees

HackerOne empowers the world to build a safer internet. As the world’s trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020 and made its Brands that Matter list for 2021. Headquartered in San Francisco, HackerOne has a presence in London, the Netherlands, France, Germany, and over 70 other locations across the globe.


Information Technology • Cybersecurity
Fairlawn, Ohio, USA
107 Employees

TrustedSec is an information security consulting team at the forefront of attack simulations with a focus on strategic risk-management. Our goal is to help organizations defend against threats of all kinds and change the security industry for the better. With a team handpicked not only for expertise and technical skill, but for ethical character and dedication, TrustedSec is committed to increasing the security posture of organizations around the world. TrustedSec is an ally to any organization working to develop and improve their security program.


Artificial Intelligence • HR Tech • Cybersecurity
San Antonio, Texas, USA
5 Employees

First Cyber Recruitment, Talent Management and Cyber Business Solution Platform that connect businesses with the best cleared cyber talent and cyber software solutions to combat evolving cyber threats. Connect cleared cyber-skilled transitioning military, veterans and cyber companies to cyber stakeholders, employers, academic institutions, and government agencies to fill the nation’s cyber security workforce vacancies and cyber security needs. Think of CWN as a LinkedIn for cleared cyber security professionals, interns and employers!


Consulting • Cybersecurity
Cedarburg, Wisconsin, USA
12 Employees

Protocol 46 provides cybersecurity solutions that are proven to protect our Clients from the risks of current and even emerging cyber threats. Our Clients trust Protocol 46 to provide cybersecurity consulting, vulnerability and risk assessments, and to provide a comprehensive cybersecurity support team with our Cybersecurity as a Service offering. Our Clients are businesses and organizations in your community and around the globe. They manufacture, insure, feed, distribute essential utilities, manage money, provide healthcare, and provide important products and services to law enforcement and defense agencies. They range in size from a few dozen employees to the enterprise, office out of a single location to a global footprint, and require cybersecurity for on-prem-based infrastructure to cloud-based solutions. We support our Clients with two core services: Cybersecurity as a Service (CaaS) Increase your defensive cybersecurity capabilities without breaking your budget. Cybersecurity as a Service (CaaS) is an easy and economical way to create or staff a cybersecurity program in your organization. Use our Security Operations Center (SOC) to partner with your organization to deliver key cybersecurity protection and managed services. And Cybersecurity Consulting Protocol 46 provides consulting on cybersecurity topics ranging from compliance programs to strategic planning and guidance. Our consultants also tackle cybersecurity challenges such as vulnerability and risk assessments, incident response, and short or long-term cybersecurity labor augmentation and projects.


Cybersecurity
Fully Remote, USA
5 Employees

https://www.clearvector.com


Software • Cybersecurity
Dallas, Texas, USA
24 Employees

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets. Utilizing its patented software technology, Cyber adAPT NTD allows customers to inspect, detect and respond to real-time network threats including: - Ransomware - Network Trojan - Unauthorized Privilege - Network Exploitation Activities - Command & Control Communications - Network Bot Communications The NTD platform further provides customers immediate contextual information that categorizes the risk and urgency of a threat thereby allowing security teams to respond immediately to effectively and efficiently remediate attacks. The NTD platform is updated automatically and continuously with the latest Cyber adAPT threat intelligence and passively watches network traffic, 24/7/365 -- without impacting latency, throughput or performance of the network(s) being secured. Cyber adAPT NTD is a powerful tool in the arsenal of its customers to proactively reduce network cyber risks in a thorough and cost-effective manner. Please contact us if you would like to learn more.


Security • Cybersecurity
Denver, Colorado, USA
8 Employees

At Epicenter Innovation, we are a one-of-a-kind team dedicated to empowering leaders to navigate crisis with confidence. Our diverse range of services, including emergency management, cybersecurity, marketing, professional development, and community engagement, are designed to provide a comprehensive solution to our clients. Our team of experts, including educators, trainers, professional development specialists, designers, translators, strategists, and communicators, work together to provide a unique and collaborative approach to problem-solving. We use a proprietary set of tools to unlock and unleash the full potential of our clients. Our mission is to support those who serve their communities. We understand that resilience and innovation are intertwined, and we strive to help our clients cultivate both. Join us on our mission to build a more resilient and innovative future


Information Technology • Security • Software • Cybersecurity
2 Offices
66 Employees

Stytch is the most powerful identity platform built for developers. By powerful, we mean: **Comprehensive:** Stytch has everything you need to identify, authenticate, and manage your users, including fraud prevention tools like device fingerprinting. **Adaptable:** Stytch is the only auth provider that enables you to build directly with our APIs or our suite of SDKs, so you can deliver the ideal experience to your users – whatever your architecture. **Ready to scale:** With a wide array of auth methods and sophisticated architecture underpinning our infrastructure, Stytch’s infrastructure is built to grow with you as your use cases expand and your needs become bigger and more complex. Whatever your tech stack, whatever your use case, we have the infrastructure and features you need to secure and scale your application. At Stytch, we believe our ultimate success will be determined by two factors: - Building a product that delights both customers and end users - Creating a work environment where everyone thrives These two cannot exist without the other — without a great culture, we won't be able to deliver a great product over the long run; similarly, having a great culture will be fleeting if we don't deliver a product that developers and users love.

BAE Systems, Inc. Thumbnail
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
17 Offices
40000 Employees
Caterpillar Thumbnail
Artificial Intelligence • Cloud • Internet of Things • Software • Cybersecurity • Industrial
6 Offices
100000 Employees
LogicManager Thumbnail
Cloud • eCommerce • Security • Software • Cybersecurity
Fully Remote, USA
86 Employees
Hiro Systems Thumbnail
Blockchain • Fintech • Security • Software • Cryptocurrency • Cybersecurity • Web3
Fully Remote, USA
40 Employees
ReversingLabs Thumbnail
Information Technology • Software • Cybersecurity
Fully Remote, USA
300 Employees
Brinqa Thumbnail
Cloud • Security • Software • Cybersecurity
Austin, Texas, USA
90 Employees
Capco Thumbnail
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
24 Offices
6000 Employees
Imprivata Thumbnail
Healthtech • Security • Software • Cybersecurity
6 Offices
957 Employees
CertifID Thumbnail
Real Estate • Security • Software • Cybersecurity • PropTech
Austin, Texas, USA
87 Employees

Information Technology • Professional Services • Security • Cybersecurity
Tucson, Arizona, USA

Protech Security Systems is a reliable provider of smart security camera systems for both homes and businesses. We offer an extensive range of home security systems, business security cameras, business intercom systems, and more. Our customers choose us because we are licensed and insured; we offer complete design and installation solutions; and we provide free estimates, and competitive pricing. As Tucson's most trusted home and business security company for over 20 years, our smart security solutions ensure that you can efficiently monitor all points of access and run your business smoothly.


Information Technology • Analytics • Cybersecurity
Columbia, Maryland, USA
56 Employees

We operate at the intersection of network engineering and cybersecurity, providing secure, scalable, and high-performing architectures for our customers. Our talented and driven network and security experts, called ANSers, have designed, engineered, and implemented the next generation of enterprise networks for customers with some of the most critical needs. Together, we’ve created security solutions that protect our national assets and secure our way of life.


Information Technology • Logistics • Professional Services • Cybersecurity • App development • Defense • Manufacturing
Lisle, Illinois, USA
45 Employees

Corterra Solutions designs, develops, and manages enterprise solutions and transformative business applications so you can focus on meaningful work that drives success. In other words, we give you the freedom and clarity of knowing that your technology works the way it should.


Analytics • Cybersecurity
Sunnyvale, California, USA
24 Employees

Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. And because Narus solutions are scalable and deployable to any network configuration or business process, Narus boosts the ROI from existing IT investments. Narus is a U.S.-based company, incorporated in Delaware and headquartered in Sunnyvale, Calif. (U.S.A.), with regional offices around the world.


Big Data • Information Technology • Cybersecurity
Chantilly, Virginia, USA
49 Employees

As an Alaskan Tribal 8(a) Entity, Copper River Enterprise Services empowers federal clients by improving mission effectiveness, reducing operational costs, and increasing efficiency. Our differentiated approach ensures customer success through the delivery of marketplace guidance, solution education, technical expertise, workforce capability as well as streamlined procurement processes to facilitate all agency requirements. Learn more at www.CopperRiverES.com.


Information Technology • Software • Cybersecurity
Columbia, Maryland, USA
29 Employees

For over two decades, Advantage Industries has worked collaboratively with our clients in understanding complex business processes, identifying needs, and providing recommendations tied with sound technology solutions custom-tailored for efficient business operations. Information Technology is an ever-changing and evolving industry. Advantage Industries as a Managed Security Service Provider (MSSP) has expertise in helping your business leverage new hardware, security, and software technologies. Our team consists of network engineers, software programmers, remote support technicians, project managers, business analysts, and onsite solutions experts.


Security • Cybersecurity
2 Offices
252 Employees

Cynet is a pioneer and leader in advanced threat detection and response. Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives, shortening the time from detection to resolution and limiting damage to an organization. Cynet’s unique visibility of files, users, network traffic, and endpoints, and continuous monitoring of an environment uncovers behavioral and interaction indicators across the attack chain, giving a complete picture of an attack operation over time. Cynet is enhanced by Cynet CyOps, which delivers additional value to the platform with 24/7 threat expert assistance, insight and intelligence. Staffed by an elite group of cyber threat analysts and investigators, Cynet’s CyOps is an extra set of expert eyes dedicated to monitor, prioritize and respond to threats in a customer’s environment. By combining high fidelity detection, decoy interactions, network analytics, and expert analyst assistance, Cynet provides accurate findings with associated risks without a lot of complexity and noise, so security teams can prioritize and respond to what matters.


Cybersecurity
San Mateo, California, USA
13 Employees

Lastline, Inc. provides innovative AI-powered network security products that detect and defeat advanced cyberattacks attempting to enter and operating within your network. We protect network, email, cloud, and web infrastructures, minimizing the risk of damaging and costly data breaches with fewer resources and at lower cost. We uniquely apply AI to the combination of network traffic and malware behaviors – what we call “AI Done Right” – delivering a single, comprehensive incident that identifies all malicious activity and affected systems across the compromised network, with minimal false positives. The result is improved efficiency and productivity of scarce security resources. Lastline solutions are cost effective and can be deployed as on-premises software or cloud service. For more information, please visit www.lastline.com and follow us on Twitter and Instagram


Cybersecurity
Redwood, California, USA
52 Employees

Enea’s embedded traffic intelligence products classify traffic in real-time and provide granular information about network activities. The portfolio includes the Enea Qosmos ixEngine and the Enea Qosmos Probe. The products support a wide range of protocols and are delivered as software development kits or standalone network sensors to network equipment manufacturers, telecom suppliers, and vendors of cybersecurity software.


Cloud • Information Technology • Consulting • Cybersecurity
Atlanta, Georgia, USA
69 Employees

ImagineX Consulting is a cybersecurity-focused boutique technology consulting firm whose mission is to help our clients and consultant to #BeBetter. We specialize in Cybersecurity, Agile Software Engineering, DevOps and Cloud, Data Insights, and Technology Platform integration. Delivering technical solutions with pragmatic and iterative methods, our seasoned technology consultants deliver tangible value on our clients’ mission critical risk reduction initiatives. ImagineX Consulting is headquartered in Atlanta GA with offices in Washington DC, Raleigh, Denver, and New York. Our unique culture has received consecutive yearly recognition from Consulting Magazine and Atlanta Business Chronicle as being a best small firm to work for. We are a 2020 Atlanta Business Chronicle Top 50 Fastest Growing Private Company and a 2020 Inc5000 Award winner.