Remote - Senior Cloud Security Engineer
Green Dot Corporation
Remote
$78,800 - $120,200 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$78,800 - $120,200 a year
Job Type
Full-time
We’re looking for talented professionals, anywhere in the United States, to join us in bringing smart money management and payment solutions to everyone’s fingertips.
At Green Dot, we are evolving to a new and permanent “Work from Anywhere” model designed to maximize the benefits of remote work, promote and enable a strong culture of performance and connectedness, and attract the best and brightest talent who align with our entrepreneurial spirit and mission.
<<>><<>><<>><<>><<>><<>><<>><<>><<>><<>>
JOB DESCRIPTION
As a Senior Cloud Security Engineer, you will be responsible for conducting comprehensive assessments of our organization's Azure cloud infrastructure to identify security gaps, vulnerabilities, and areas for improvement. Your role will involve evaluating the effectiveness of existing security controls, policies, and processes, comparing them against industry best practices and regulatory requirements. You will work closely with cross-functional teams to provide recommendations and develop strategies to enhance the security posture of our Azure environment. This position requires a deep understanding of Azure cloud security, strong analytical skills, and the ability to communicate findings and recommendations to stakeholders. This is a senior-level role that requires in-depth knowledge of cloud security technologies, industry standards, and the ability to lead security initiatives.
Key Responsibilities:
Conduct security gap analysis: Perform thorough assessments of our Azure cloud infrastructure, evaluating the effectiveness of security controls, configurations, and practices. Identify security gaps and vulnerabilities by comparing the existing security measures against industry standards, best practices, and regulatory requirements.
Azure security controls evaluation: Assess the implementation and effectiveness of Azure security controls, including network, Azure Security Center, Azure Active Directory (AAD) configurations, encryption, logging, and monitoring. Identify weaknesses, misconfigurations, or non-compliance issues and provide recommendations for remediation.
Compliance and regulatory assessment: Ensure that our Azure cloud environment adheres to relevant security compliance standards, regulations, and frameworks. Identify areas of non-compliance and work with relevant teams to implement necessary controls and measures.
Risk assessment and mitigation: Evaluate security risks associated with the Azure environment and its components. Conduct risk assessments to identify potential threats and vulnerabilities, and recommend risk mitigation strategies and controls to minimize exposure.
Collaboration and communication: Work closely with cross-functional teams, including cloud architects, engineers, developers, and operations, to understand their requirements and assess security implications. Communicate findings, recommendations, and risks to stakeholders and provide guidance on security best practices.
Security documentation and policies: Document security gaps, assessment findings, and recommendations in detailed reports. Develop security policies, procedures, and guidelines specific to the Azure cloud environment. Collaborate with the security team to ensure consistency across all security-related documentation.
Security awareness and training: Collaborate with the security awareness team to develop training programs and materials to educate users and stakeholders on Azure cloud security best practices. Conduct training sessions to promote a culture of security awareness and compliance.
Stay up-to-date with industry trends: Stay abreast of emerging threats, vulnerabilities, and best practices in Azure cloud security. Continuously monitor Azure security-related announcements, updates, and new features to stay current with the latest advancements.
Qualifications and Skills:
7+ years of experience in Information Technology with 5+ years in Information Security.
2+ years of experience in Azure Security
Bachelor's degree in computer science, information security, or a related field.
Proven experience in conducting security assessments and gap analyses, preferably in Azure cloud environments.
In-depth knowledge of Azure cloud security services, tools, and best practices.
Familiarity with security compliance frameworks and regulations (e.g., PCI DSS) and their application in Azure environments.
Experience with security assessment methodologies, risk management, and vulnerability analysis in cloud environments.
Strong analytical and problem-solving skills, with the ability to assess complex security issues and provide practical recommendations.
Excellent written and verbal communication skills, with the ability to clearly articulate technical concepts to non-technical stakeholders.
Relevant certifications in cloud security and Azure (e.g., Microsoft Certified: Azure Security Engineer Associate, Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP)) is a plus.
Ability to work independently, prioritize tasks, and manage multiple assessments simultaneously.
Strong attention to detail and commitment to delivering high-quality results.
Team player with excellent interpersonal skills and the ability.
POSITION TYPE
Regular
PAY RANGE
The targeted base salary for this position is $78,800 to $120,200 per year. The final compensation will be determined by a number of factors such as qualifications, expertise, and the candidate’s geographical location.
<<>><<>><<>><<>><<>><<>><<>><<>><<>><<>>
Green Dot promotes diversity and provides equal opportunity for all applicants and employees. We are dedicated to building a company that represents a variety of backgrounds, perspectives, and skills. We believe that the more inclusive we are, the better our work (and work environment) will be for everyone. Additionally, Green Dot provides reasonable accommodations for candidates on request and respects applicants' privacy rights.
Report job
Senior Cloud Systems Engineer
Southern New Hampshire University
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Shift and Schedule
On call
We are one growing team with one powerful goal ” and as a global leader in education, we strive for a workforce that reflects the individual differences of our learning community. We believe that our employees can be their best selves when they can be their true selves. That is why we're committed to cultivating and preserving a culture of inclusion in which all our employees feel welcomed, valued and empowered. Together, we will shape the future of education by transforming lives beginning with yours.
The Opportunity
The Senior Cloud Engineer reporting to the Director, Systems and Cloud Operations, will play a role in the collaborative research, strategy, consulting, design and implementation of technology solutions to support SNHU's our goals. You will be responsible for technology roadmap development, technical support, skills-transfer, and problem resolution for a variety of cloud and on-premise infrastructure platforms. You will focus on important technology areas including Data Centers, Directory Services, Security Services, and Enterprise Systems, Storage and Virtualization. The Senior Cloud Engineer collaborates with peers and partners to develop and implement roadmaps for technology investments, supports projects across products, and ensures a stable, scalable and secure primary infrastructure. You will provide expert guidance to several other teams within SNHU to ensure continuous delivery of the infrastructure, systems and solutions that SNHU relies upon to achieve our mission.
In this role you will get to:
Lead the design, deployment, configuration, migration and maintenance of scalable infrastructure with an intense focus on resiliency and flexibility.
Define and communicate the strategy and progress against delivery goals.
Develop supplier management relations to promote business and engineering solutions.
Perform hands-on activities involved in creating cloud infrastructure components, migrating from or integrating with on-premise services and developing self-service tooling and metrics to empower delivery teams' autonomy.
Build documentation on the processes, platforms, and workflow details including high-level and low-level designs of technical requirements. Contribute to technical documentation to guide on-call engineers and on-board team members.
Play a role in the SNHUCloud initiative to develop strategy, improve cloud operations and upskill in evolving cloud technologies.
Contribute to Engineering and Security Roadmap activities by participating in important project and technology priorities.
Provide consultative and hands-on support for important our goals as defined by executive staff.
Ensure vigilance and adherence to security best practices.
Provide T3/escalation level support.
Evaluate service and infrastructure usage to manage performance, capacity and cost.
Drive system-wide quality improvements.
Contribute to SNHU Technology Infrastructure Governance and best practices:
Collaborate to research, select, and implement best practices and governance methods for an evolving cloud-based infrastructure including virtualized environments, computer networking, internet communication standards, web services and multiple operating systems.
Lead by example with an automation-first mindset; use cloud tools and architecture practices to promote infrastructure operations.
Maintain technology proficiency; stay current on latest technology trends to provide research, insight and recommendations.
Support project management methods (predictive, agile) by assisting with planning, providing estimates and work breakdown structures for your work, progress reporting to ensure predictable and successful achievement of desired outcomes.
Provide Proactive Guidance, Mentoring and Relationship Management:
Be an SME and trusted advisor to SNHU partners to support roadmaps and projects across products. Collaborate to solve business and technical problems in partnership with important partners such as Enterprise Architecture, Information Security, DevOps, Digital Platforms and other teams.
Guide and train agile engineering teams to improve service quality and ensure adoption of container microservices and operational best practices. Provide ongoing direction and mentoring for engineering and other team member(s).
Ensure clarity and coordination of cloud engineering priorities; monitor progress, take remedial action to successfully achieve goals.
Work with Cloud Foundations Director, Information Security, Academic Technology and other teams to support current and planned projects; provide technical expertise, design recommendations through guidance, mentorship and direct training as needed.
Manage cloud partner/vendor relationships.
Other responsibilities or activities may be assigned.
We would like to see:
Typically requires bachelor's in Computer Science, Computer Engineering or similar technical field and 10+ years relevant experience. Relevant experience should include at least 8 years in progressively responsible infrastructure administration, operations and engineering roles. Experience working in a high-availability Azure cloud platform environment is necessary.
Equivalent of experience in lieu of degree acceptable: X Yes
Experience in an engineering role using service and hosting solutions such as private/public cloud IaaS, PaaS and SaaS platforms.
Demonstrable expert-level experience deploying enterprise workloads to Azure.
Extensive knowledge of Microsoft Enterprise software products and services.
Experience designing and supporting enterprise core services as well as cloud deployments.
Deep knowledge of Azure security and other common cloud security best practices.
Strong working knowledge of ITIL.
Demonstrated range of technology skills with depth in Azure Core Platform (Compute, Storage, Networking), Azure Services, Azure AD, Azure Automation, Azure CLI.
Proficient in PowerShell, Python or other scripting and automation languages.
Proficient in configuring, administering, and monitoring cloud compute resources (network, compute, load balancing, monitoring, etc.) for SaaS deployments.
Proficient in container, orchestration and deployment systems such as Docker, Kubernetes, and Terraform.
Proficient in standing up CI/CD pipelines for cloud or hybrid cloud/on-premise deployments.
Preferred Qualifications:
Master's degree in Applied Computer Science or similar field.
Experience/certifications in Google Cloud Platform, Amazon Web Services or other cloud platforms.
Experience with Higher Education industry software applications and systems.
Experience with test frameworks, deployment pipelines, container technologies, web-based stack, back-end development tools, role-based access controls, authentication methods and protocols.
Professional Certification(s) preferred: ITIL v4 Foundation, TOGAF and other relevant Enterprise Architecture and cloud certifications, and Microsoft Azure Architect/Engineering level certifications.
Thinking about the job, but not sure you should apply? We still want to hear from you.
We recognize that not everyone enters the world of work with the same advantage, opportunity, and privilege. This is why your skills and experiences are important to us. Take the leap and apply, you just might be the person we are looking for!
Who Are We?
SNHU employees are a team in every sense. Separately, we understand that each individual brings unique experiences, perspectives and ideas to create a vibrant work environment. Together we share common values of honesty, acceptance and accountability working as a unified force toward a common goal: to transform the lives of learners. By joining our team, you join us in our vision. Together, we'll shape the future of education by transforming lives”beginning with yours.
We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender, gender identity or expression, or veteran status. We are proud to be an equal opportunity workplace.
Please note that a background check is required for employment.
Senior Information Security Engineer
LifeWay Christian Resources
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· Adoption assistance
· Health insurance
· Parental leave
Overview:
The Senior Information Security Engineer plans and carries out security measures to monitor and protect sensitive data, networks and systems from infiltration and cyber-attacks. This role is responsible for the design, implementation, and support of a variety of complex projects supporting the SOC (Security Operations Center) and security engineering functions. This role is a critical escalation point for Security operations and has technical responsibility for SOC and security engineering including the documentation of processes, procedures, and technical solutions.
Why Lifeway?
Lifeway is a place where you can bring your faith and work experience to join in the most important mission in the world: making disciples of Jesus Christ. Whether you’re a creator or storyteller, data guru or problem-solver, or anywhere in between, if you’re passionate about serving the church, we have a place for you. Lifeway has a strong Work from Anywhere (WFA) culture that is deeply focused on our mission and values. While Lifeway is headquartered in Nashville, TN, this position is remote and will have autonomy and flexibility with work hours. We provide equipment and resources to ensure team members have access to a productive and ergonomic workspace. Lifeway hosts an all-team meeting two times per year and provides travel for key team gatherings for remote-based team members. Full-time employees are eligible for enrollment in our comprehensive benefits plans including healthcare, vacation and sick time, holiday pay, care days, 401(k) plan, maternity and paternity leave, adoption assistance, mission trip time, and more.
This is a remote position in the U.S. with occasional travel to Nashville for in-person team gatherings typically held two times per year. #LI-Remote
Responsibilities:
Designs, builds, implement, and administers security systems, processes, and programs within the infrastructure
Manages relationships with 3rd parties (partners, vendors, suppliers), customers, and other associated entities
Obtains and analyzes appropriate product, vendor, and security architecture information
Collaborates with other departments to accomplish various tasks and projects
Ensures information security practices are compliant with PCI and other standards and regulations
Create and leverage metrics to help identify needs and drive maturity
Troubleshoots and resolves technical problems
Qualifications:
Strong knowledge of cloud security solutions, anti-malware solutions, intrusion prevention, and web content filtering
Strong knowledge of risk assessment tools, technologies, and methods
Knowledge of computer forensic tools, technologies, and methods
Ability to develop and execute incident response plans, identify root cause, and drive mitigations to prevent future occurrences
Ability to enumerate and address security control gaps, abnormal behavior patterns and attack techniques in cloud and on-prem environments
Knowledge of cloud architecture and security (AWS, GCP, Azure)
Knowledge of applicable regulations and frameworks including PCI, NIST and MITRE
Education required: Bachelor's degree in computer science, cybersecurity, information technology, or related degree
May a combination of education and work experience fulfill the education requirement? Yes
Other Qualifications: One or more desired certifications (CISSP, GIAC, CCSK, CCSP)
Cloud Security Engineer
EMC Insurance
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
At EMC, you'll put your skills to good use as an important member of our team. You can count on gaining valuable experience while contributing to the company's success. EMC strives to hire and retain the best people by engaging, developing and rewarding employees.
Essential Functions:
Creates, designs, and implements new security controls within the EMC AWS cloud environment in partnership with Information Technology, Compliance, and Legal teams. Monitors IAM processes, procedures, and controls.
Tracks network security controls and configuration, securing computer resources, cloud data, and general security controls. Continuously reviews best practices and recommends actions to meet EMC standards.
Designs and implements security controls and standards to meet corporate security policies using native services (e.g., Security Hub, Guard Duty) and third-party tools.
Performs regular scans and assessments for our current state environment and prioritizes findings.
Works with the appropriate teams for remediation or plans for remediation. Provides requirements and priorities to the EMC cloud infrastructure and development teams and collaborates with stakeholders for execution.
Assesses security objectives and processes across the organization to identify gaps within current cloud environment, reduce risks, respond to incidents, and limit exposure to liability in order to reduce financial loss.
Uses AWS Config, AWS CloudTrail, and other tools to monitor for security and compliance within the EMC cloud environment.
Applies relevant risk controls to the design and implementation of EMC cloud solutions.
Education & Experience:
Bachelor’s degree in a technology related field, risk management or related or equivalent relevant experience.
Five years of experience in information security or related experience including three years of experience with AWS and exposure to Azure and AzureAD
AWS Solutions Architect Certification required, AWS Security Certification preferred
CISSP, CRISC, CISA or other information security designations preferred
Knowledge, Skills & Abilities:
Excellent ability to identify, analyze, monitor, and report risk information
Strong knowledge of risk management frameworks such as Committee of Sponsoring Organizations of the Treadway Commission (COSO) and National Institute of Standards and Technology Risk Management Framework (NIST RMF)
Strong understanding of risk management, information security, and business continuity principles
Strong ability to assess inherent risk, controls, residual risk, and risk tolerance
Excellent knowledge of information security risk analysis practices, regulations, and laws
Knowledge of property and casualty insurance industry preferred
Excellent verbal and written communication skills
Strong analytical and problem-solving abilities to help identify problems and implement effective solutions
Strong organizational and decision-making skills
Strong teamwork and conflict management abilities
Our employment practices are in accord with the laws which prohibit discrimination due to race, color, creed, sex, sexual orientation, gender identity, genetic information, religion, age, national origin or ancestry, physical or mental disability, medical condition, veteran status, active military status, citizenship status, marital status or any other consideration made unlawful by federal, state, or local laws.
All of our locations are tobacco free including in company vehicles.
To learn more about why you’re gonna love it here, watch the video below.
Tala
Remote
$145,000 - $215,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$145,000 - $215,000 a year
Job Type
Full-time
Shift and Schedule
On call
· 401(k)
· AD&D insurance
· Disability insurance
· Employee assistance program
· Flexible spending account
· Health insurance
· Health savings account
Show more
About Tala
Tala is a global technology company building the world’s most accessible financial services. With more than $350 million raised from visionary investors, we are serving millions of customers around the world who have been overlooked by traditional financial institutions – and our plan is to serve millions more, and have been named by the Fortune Impact 20 list, CNBC’s Disruptor 50, and Forbes’ Fintech 50 list for five years running. We are expanding across product offerings, countries and crypto and are looking for people who have an entrepreneurial spirit and are passionate about the mission.
By creating a unique platform that enables lending and other financial services around the globe, people in emerging markets are able to start and expand small businesses, manage day-to-day needs, and pursue their financial goals with confidence. Currently, more than 7 million people across Kenya, the Philippines, Mexico, and India have used Tala products. Due to our global team, we have a remote-first approach, and also have offices in Santa Monica, CA (HQ); Nairobi, Kenya; Mexico City, Mexico; Manila, the Philippines; and Bangalore, India.
Most Talazens join us because they connect with our mission of enabling financial agency for underbanked people around the world. If you are energized by the impact you can make at Tala, we’d love to hear from you!
We are currently seeking a Senior Cloud Infrastructure Engineer to design, implement and maintain suitable infrastructure and applications on AWS and GCP public cloud environments using DevOps mindset. You will bring world class cloud-native infrastructure & automation expertise to implement solutions for deployment, monitoring & remediation in an automated fashion.
Provide technical leadership to the team in driving automation of infrastructure & platform services in Public Clouds (AWS, GCP, and Azure) using Terraform and Ansible
Architect new solutions with development for infra & platform
Design and manage Continuous deployment using Kubernetes, ArgoCD, and Jenkins
Monitor applications and services within the environments & be part of the on-call rotation to resolve issues and implement strategies to prevent future occurrences
Set up intelligent application performance alerts in Datadog and ElasticSearch to find and fix issues before they impact business services and end-users
Learn about technologies outside of your realm of expertise that help drive
Understanding of how cloud-based web applications work and interest in measuring, analyzing, and improving distributed systems
B.S. Degree in Computer Science or related field or equivalent combination of professional development training and experience
7-10 years of previous experience deploying and automating infrastructure in public cloud environments, using Infrastructure as Code such as Terraform or Ansible
In-depth hands-on experience with at least one public Cloud platform (AWS or GCP)
Prior experience as a technical lead working closely with Product, Engineering, and SecOps on shift-left strategies, CI/CD tools and solutions needed
Experience with Docker and Kubernetes in production
Experience with Continuous Deployment tools such as Jenkins or ArgoCD
Experience with Logging and Monitoring tools for SaaS such as Sumo, Splunk, Datadog etc
Excellent verbal and written communication skills and ability to document and explain technical details and concepts clearly and concisely
Flexibility to pitch in where needed across program and team
Strong influence and teamwork skills; sound problem-resolution, judgment, negotiating, and decision-making skills
Experience working effectively with global teams in multiple time zones
Competitive compensation programs with stock/equity program
Flexible work environments and Hybrid/Remote-first work model
Medical (HMO, PPO, HSA), Dental PPO, Vision, FSA, DC FSA
Employer paid Life w AD&D, Short Term and Long Term Disability
401k and Roth 401k
Voluntary benefits like critical illness, accident, life, and pet insurance
Employee Assistance Program
Paid Holidays, Unlimited PTO, Wellness/rest “sloth days”, Paid Parental leave, Birthday Holiday, Life Event Days off, paid sabbatical after 5 years of service, and more
Health and Wellness events and seminars
The above-noted benefits list is not an exhaustive list and is subject to change. To learn more about our benefits please visit https://tala.benefitseasy.com/ and reach out to your recruiter with any questions.
Salary Range: $145,000-$215,000
Our vision is to build a new financial ecosystem where everyone can participate on equal footing and access the tools they need to be financially healthy. We strongly believe that inclusion fosters innovation and we’re proud to have a diverse global team that represents a multitude of backgrounds, cultures, and experience. We hire talented people regardless of race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, or disability status.
Report job
Cloud Security Engineer
Cisco Systems
San Jose, CA
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· 401(k) matching
· Dental insurance
· Disability insurance
· Employee stock purchase plan
· Health insurance
· Life insurance
Show more
Cloud Security Engineer
As a Cloud Security Engineer within the Security and Trust Organization you will lead the implementation of automated tools and frameworks to help scale Cisco’s cloud security program. This is a key technical role that will support a multi-functional team delivering security solutions to business and IT teams within Cisco. The successful candidate is excited to embrace a culture of innovation, demonstrate ownership and engineering leadership and establish engineering discipline in how we develop security automation.
What you’ll do
Design and develop high quality, scalable and maintainable automated solutions to implement cloud security.
Write clean, well-tested and well-documented code, following coding standards and best practices.
Conduct code reviews and provide constructive feedback to ensure code quality and consistency across the team.
Take ownership of complex technical issues, troubleshoot and resolve bugs, and provide technical support as needed.
Contribute to documentation, knowledge sharing, and technical presentations to enhance team productivity and knowledge.
Work closely with the Cloud Security Architecture and Services & Operations functions to build and operationalize the security tool set.
Who You'll Work with
You will work with exceptional security professionals with technical expertise in various cloud security domains. The team comprises of Cloud security architects, engineers, operators and program managers that help design, implement and operate cloud security solutions for the company. You will also frequently partner with product architects and SRE engineers to provide security guidance and drive adoption of cloud security initiatives.
What you’ll need
5+ years of experience in a security engineering or security operations role
BS/MS in cybersecurity, engineering, or a related discipline
Expertise with multiple cloud platforms (AWS, GCP, Azure) with in-depth understanding of their service catalogs, security offerings and automation opportunities
Experience in implementing cloud security controls and auto-remediation architecture
Proficient with Python and/or Go, Rust, Java
Excellent communication and presentation skills with the ability to present to business and technical audience with brevity and clarity.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Why Cisco?
#WeAreCisco. We are all unique, but collectively we bring our talents to work as a team, to develop innovative technology and power a more inclusive, digital future for everyone. How do we do it? Well, for starters – with people like you!
Nearly every internet connection around the world touches Cisco. We’re the Internet’s optimists. Our technology makes sure the data traveling at light speed across connections does so securely, yet it’s not what we make but what we make happen which marks us out. We’re helping those who work in the health service to connect with patients and each other; schools, colleges, and universities to teach in even the most challenging of times. We’re helping businesses of all shapes and sizes to connect with their employees and customers in new ways, providing people with access to the digital skills they need and connecting the most remote parts of the world – whether through 5G, or otherwise.
We tackle whatever challenges come our way. We have each other’s backs, we recognize our accomplishments, and we grow together. We celebrate and support one another – from big and small things in life to big career moments. And giving back is in our DNA (we get 10 days off each year to do just that).
We know that powering an inclusive future starts with us. Because without diversity and a dedication to equality, there is no moving forward. Our 30 Inclusive Communities, that bring people together around commonalities or passions, are leading the way. Together we’re committed to learning, listening, caring for our communities, whilst supporting the most vulnerable with a collective effort to make this world a better place either with technology, or through our actions.
So, you have colorful hair? Don’t care. Tattoos? Show off your ink. Like polka dots? That’s cool. Pop culture geek? Many of us are. Passion for technology and world changing? Be you, with us! #WeAreCisco
#STO24
#LI-Remote
#LI-AS3
Message to applicants applying to work in the U.S.:
When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidate's hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings. Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday, plus a day off for their birthday. Employees accrue up to 20 days of Paid Time Off (PTO) each year and have access to paid time away to deal with critical or emergency issues without tapping into their PTO. We offer additional paid time to volunteer and give back to the community. Employees are also able to purchase company stock through our Employee Stock Purchase Program.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco pays at the standard rate of 1% of incentive target for each 1% revenue attainment against the quota up to 100%. Once performance exceeds 100% quota attainment, incentive rates may increase up to five times the standard rate with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
Lumen
Remote
$72,540 - $161,520 a year
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$72,540 - $161,520 a year
Shift and Schedule
Weekends as needed
Evenings as needed
Holidays
· Health insurance
About Lumen
Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure global platform for applications and data to help businesses, government and communities deliver amazing experiences. Learn more about Lumen’s network, edge cloud, security and communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com, LinkedIn: /lumentechnologies, Twitter: @lumentechco, Facebook: /lumentechnologies, Instagram: @lumentechnologies and YouTube: /lumentechnologies.
Senior Physical Security Professional administers, coordinates, and evaluates security programs that support the strategy, policies, and standards established for the physical safety of all visitors, employees, or customers to the organization's facilities and the security of property and assets. Compiles data and analyzes results of audits, inspections, daily logs, and incident reports to assess security vulnerabilities, measure program effectiveness, and identify the need for additional resources. May coordinate or assist with investigations and critical event responses in coordination with law enforcement and other officials. Understands law enforcement methods, tactics, and procedures.
Effectively interact with internal business units, private industry counterparts and federal, state, and local government agencies.
Investigate reports of theft and vandalism, identify trends, coordinate with law enforcement agencies as appropriate, and develop strategies for preventing future losses from theft and vandalism.
Access Control and Video Surveillance liaison for Human Resource requests.
Be flexible with workhours in order to respond to urgent issues and to the situational needs and requirements of the workload.
Work both independently and with others on initiatives for security and investigative enhancements and process improvements.
Conduct physical security risk assessments of corporate facilities and critical infrastructure to identify potential threats and vulnerabilities, assess the risks, and recommend countermeasures to detect, deter or mitigate identified risks.
Liaison for Human Resources, Legal and Law Enforcement on Access Control and Video Surveillance requests.
Assist with security system up-grades and system projects.
Support Internal Audit, External Audit and Compliance Requests.
Experience in fundamental business skills and proficiency in standard office software programs, such as word processing and spreadsheets.
The successful candidate must be able to effectively communicate at all levels of the organization; possess demonstrated experience in conducting investigations; have strong interviewing skills; and the ability to effectively liaise with federal, state and local law enforcement.
Must be available on some evenings, weekends, holidays to respond to security manager calls, periodically.
Success in this position requires the ability to manage multiple responsibilities efficiently, proficiency with a wide array of systems and applications, the ability to be analytical and decisive while understanding the impact decisions have to a customer, a victim and to the corporation. Must have excellent customer facing skills.
At least five years of successful experience in law enforcement investigating violent crime/property crime cases is preferred; experience managing investigative programs is preferred.
Requisition #: 330608
When applying for a position, you may be subject to a background screen (criminal records check, motor vehicle report, and/or drug screen), depending on the requirements for the position. More information on what’s included in these checks can be found in the Post Offer section of our FAQ page. Job-related concerns noted in the background screen may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
EEO Statement
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Disclaimer
The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Job duties and responsibilities are subject to change based on changing business needs and conditions.
Salary Range
Salary Min :
72540
Salary Max :
161520
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
This position is eligible for either short-term incentives or sales compensation. Director and VP positions also are eligible for long-term incentive. To learn more about our bonus structure, you can view additional information here. We're able to answer any additional questions you may have as you move through the selection process.
As part of our comprehensive benefits package, Lumen offers a broad range of Health, Life, Voluntary Lifestyle and other benefits and perks that enhance your physical, mental, emotional and financial wellbeing. You can learn more by clicking here.
Note: For union-represented postings, wage rates and ranges are governed by applicable collective bargaining agreement provisions.
Information Security Manager
Network Right
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· 401(k) 4% Match
· 401(k) matching
· Cell phone reimbursement
· Commuter assistance
· Dental insurance
· Health insurance
Show more
About the job
Job Title: Information Security Manager - Managed Security Services Provider (MSSP)
What We Do:
Network Right is on a mission to create a human-centric, innovative, next-generation world of IT. We are disrupting the IT service industry by offering custom solutions to each individual client. At Network Right, we’re bridging the gap between IT and People by offering unique support based on the needs of growing businesses, and making employee lives easier through technology. As we continue to grow, we are seeking a highly skilled and experienced Information Security Officer to join our team and provide strategic cybersecurity guidance to our clients.
Why Join Network Right:
You’ll get exposure to a multitude of IT systems, build networks and connections, and test and implement the latest and greatest technology. You’ll also be involved in strategic tech stack and project planning. In addition, you’ll be part of a passionate team supporting businesses with offices all around the world. And of course, you’ll be helping companies of all sizes work more efficiently by solving real world IT problems with flexible solutions.
We’re an organization that really cares about its clients and its people, and we demonstrate this every day! We’re a close-knit team working together to build something exceptional/extraordinary. And of course, we’re all technology nerds who love interacting with people!
About This Job:
As an Information Security Manager, you will play a critical role in shaping our clients' cybersecurity strategy and ensuring the effectiveness of their security programs. You will act as a trusted advisor, working closely with our clients to understand their unique business needs, identify potential risks, and develop robust security measures to mitigate those risks. This is a remote position, offering flexibility and the opportunity to work with a diverse range of clients.
Responsibilities:
Serve as the primary point of contact and subject matter expert for cybersecurity matters, providing services to multiple clients.
Collaborate with clients to assess their current security posture, identify vulnerabilities, and develop comprehensive cybersecurity strategies.
Conduct risk assessments, threat modeling, and gap analysis to identify potential security weaknesses and recommend appropriate remediation measures.
Develop and implement information security policies, procedures, and standards tailored to each client's specific requirements and regulatory compliance needs.
Advise clients on security best practices, industry standards, and emerging technologies to enhance their security posture.
Provide guidance and recommendations on the selection, deployment, and management of security technologies and solutions.
Conduct incident response planning and lead response efforts in the event of a security incident or breach.
Stay up to date with the latest cybersecurity trends, threats, and regulatory requirements to ensure proactive and effective risk management.
Qualifications:
Extensive experience (10+ years) in cybersecurity, including experience in a senior-level security role.
Degree in Information Technology or CS (Advanced Degree Preferred)
Relevant certifications such as CISSP, CISM, CRISC, or similar are highly desirable.
Strong knowledge of cybersecurity frameworks, such as NIST, ISO 27001, or CIS Controls, and their practical implementation.
In-depth understanding of security technologies, including firewalls, intrusion detection/prevention systems, SIEM, endpoint protection, etc.
Familiarity with cloud security concepts and technologies (AWS, Azure, etc.).
Proven track record of successfully developing and implementing cybersecurity strategies, policies, and procedures.
Experience conducting risk assessments, vulnerability assessments, and penetration testing.
Excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to both technical and non-technical stakeholders.
Experience implementing controls and mitigating risks related to GDPR, PCI, HIPAA and other information security and data privacy standards.
Benefits:
The opportunity to work with some of the fastest growing technology companies
Aggressive bonus and profit sharing program
Company 100% covered rich insurance plans (health, dental, vision)
401(k) + 4% company matching available from your first day
Flexible time off policy
Home internet and mobile phone reimbursement
Meal stipend
Commuter benefits
Annual Mid-Year and End of Year Events (in various locations such as Vegas, Lake Tahoe, etc.)
Senior Cloud Security Professional
Humana
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· Caregiver leave
· Dental insurance
· Disability insurance
· Health insurance
· Life insurance
· Paid parental leave
Show more
The Senior Cloud Security Professional audits the most complex new and existing information systems applications to ensure that appropriate controls exist, that processing is efficient and accurate, and that information systems procedures are in compliance with corporate standards. The SR Cloud Security Professional work assignments involve moderately complex to complex issues where the analysis of situations or data requires an in-depth evaluation of variable factors.
Responsibilities
The Senior Cloud Security Professional works with all parts of IT to ensure that the appropriate controls exist to meet specific Humana Government business needs. The SR Cloud Security Professional also ensures the appropriate controls operate effectively and that information systems procedures are in compliance with industry and corporate standards.
Responsibilities Include:
Begins to influence department’s strategy.
Understand Government Security Cloud issues.
Makes decisions on moderately complex to complex issues regarding technical approach for project components, and work is performed without direction.
Exercises considerable latitude in determining objectives and approaches to assignments.
Required Qualifications
Our Department of Defense contract requires U.S. Citizenship for this position
Bachelor's degree or equivalent work experience
5 or more years of technical experience
Proficiency in Cloud Security, Azure, AWS or GCP
IT management background, with demonstrated experience leading special projects and producing metrics, measurements and trend reports
Ability to work in a fast paced, dynamic and changing environment while managing multiple projects simultaneously
Excellent communication skills
Solid understanding of SDLC and Agile/Scrum methodologies
Must be passionate about contributing to an organization focused on continuously improving consumer experiences
Preferred Qualifications
Master's Degree of Business Administration, Information Technology or a related field
FedRAMP Cloud Security experience
PMP certification
Exemplary core project management skills including multiple aspects of the PMBOK
Ability to navigate a highly matrixed organization effectively.
Sound business and technical acumen.
Demonstrated experience with process documentation and re-engineering
Prior experience managing vendor relationships
Additional Information
Work-At-Home Requirements
To ensure Home or Hybrid Home/Office associates’ ability to work effectively, the self-provided internet service of Home or Hybrid Home/Office associates must meet the following criteria:
At minimum, a download speed of 25 Mbps and an upload speed of 10 Mbps is recommended; wireless, wired cable or DSL connection is suggested
Satellite, cellular and microwave connection can be used only if approved by leadership
Associates who live and work from Home in the state of California, Illinois, Montana, or South Dakota will be provided a bi-weekly payment for their internet expense.
Humana will provide Home or Hybrid Home/Office associates with telephone equipment appropriate to meet the business requirements for their position/job.
Work from a dedicated space lacking ongoing interruptions to protect member PHI / HIPAA information
#LI-Remote #LI-TA4
This is a remote position
Scheduled Weekly Hours
40
Pay Range
The compensation range below reflects a good faith estimate of starting base pay for full time (40 hours per week) employment at the time of posting. The pay range may be higher or lower based on geographic location and individual pay decisions will vary based on demonstrated job related skills, knowledge, experience, education, certifications, etc.
$86,600 - $119,200 per year
This job is eligible for a bonus incentive plan. This incentive opportunity is based upon company and/or individual performance.
Description of Benefits
Humana, Inc. and its affiliated subsidiaries (collectively, “Humana”) offers competitive benefits that support whole-person well-being. Associate benefits are designed to encourage personal wellness and smart healthcare decisions for you and your family while also knowing your life extends outside of work. Among our benefits, Humana provides medical, dental and vision benefits, 401(k) retirement savings plan, time off (including paid time off, company and personal holidays, volunteer time off, paid parental and caregiver leave), short-term and long-term disability, life insurance and many other opportunities.
Cloud Security Consultant
Novisync
New Jersey
Remote
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Location:
Remote NJ( Remote) USA
Duration:
3+ months
Work Authorization:
Open
Foundational Componenets
Cloud Controls Review and Mapping
Remediation Roadmap Planning
Asset Manangement Components
Creation of cloud inventory and procedures
Review of Contibuting Coponents( Security Hub, Guard Dity, AIM)
AWS services and Accounts Mapping to Business risk
ORCA CLOUD SECURITY
AWS Vulnerability management system and Procedures
AWS Development Procedures
review of contributing components( Cloudrails, SNOW, AIM)
Service Now Integration and Workflow Automation
Business Logic and team routing mapping
Ticket content customization and creation
Product Manager, Cloud Security (Remote)
CrowdStrike
Remote
$100,000 - $170,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$100,000 - $170,000 a year
Job Type
Full-time
Benefits
Pulled from the full job description
· Health insurance
· Paid parental leave
· Parental leave
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We work on large scale distributed systems, processing over 1 trillion events a day with a petabyte of RAM deployed in our Cassandra clusters - and this traffic is growing daily. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to developing and shaping our cybersecurity platform. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.
About the Role:
The Product Management team is seeking an experienced Senior Product Manager who is technical, collaborative, and truly excited about building great cloud security products. In this role, you will bring your in-depth knowledge of Cloud Security Posture Management market to help guide the evolution of CrowdStrike’s Cloud Security Product Offerings. You will work closely with engineering, researchers, product marketing, sales, support, and other product managers. You will bring existing knowledge about product management best practices and apply them in delivering significant new features and enhancements, addressing the needs of DevOps. The successful candidate will have the ability to interface and influence cross-functional teams throughout the company.
What You'll Do:
Act as the product leader for major initiatives around Cloud Security, including different personas such as Cloud Security Architects, DevOps, Incident Responders, Developers and Hunters
Understands the Cloud Posture Management markets and capabilities, as well as adjacent Cloud Security offerings
Utilize strategic insight and organizational skills to identify unmet customer needs, define use cases, and advance the functional capabilities of this offering
Collaborate closely with Engineering and Data Science to understand threat and attack trends and deliver new visibility and defenses
Partner with marketing to help define go-to-market strategy & messaging, assist with product positioning, benefits, and target personas
Engage with sales and support to champion recent releases and guide future product direction
Partner with UX Professionals to help deliver a world class user experience
Conduct competitive analyses and maintain current information regarding competitive activity
Work on a team of high-performing product professionals in a very collaborative environment
What You'll Need:
5+ years of enterprise product management experience, with direct experience in cloud security and an understanding of the cloud providers
Understanding of CI/CD and the DevOps / DevSecOps culture and needs.
Familiarity with continuous intelligent monitoring, secure application deployment in the cloud, remediate compliance monitoring, configuration drift prevention and SOC investigations, etc.
CWPP and/or CSPM knowledge a plus
Certifications on public cloud provider a plus
BA or BS degree in an applicable field or equivalent work experience, Master’s desirable
Adept at understanding and curious about new technologies, systems, and tools
Excellent communication skills, both verbal and written, with the ability to properly translate and articulate positioning and technology
Demonstrated ability to collaborate with peers in research, engineering, and product marketing
Strong quantitative and business analysis skills
Ability to prioritize numerous simultaneous tasks
Proven ability to work effectively with both local and remote teams
#LI-Remote
#LI-JF1
#HTF
Benefits of Working at CrowdStrike:
Remote-first culture
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive and inclusive health benefits
Physical and mental wellness programs
Paid parental leave, including adoption
A variety of professional development and mentorship opportunities
Offices with stocked kitchens when you need to fuel innovation and collaboration
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact
Recruiting@crowdstrike.com
for further assistance.
CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $100,000 - $170,000 per year + variable/incentive compensation + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
Manager, Information Security Operations
Avantax
Dallas, TX
$135,000 - $187,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$135,000 - $187,000 a year
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· 401(k) matching
· Dental insurance
· Health insurance
· Life insurance
· Paid time off
· Tuition reimbursement
Show more
We love finance, software, and (believe it or not), taxes – that’s why we love what we do! At Avantax, we celebrate our diverse experience and unique contributions and use our combined knowledge to blaze new trails in tax-focused investing. As individuals, we contribute valuable insight from our career history to achieve the Avantax mission. As a team, we work together to make a real impact and have a lot of fun along the way. Our collaborative work features decades of expertise in wealth management.
We bring our unique experiences together to form the heart of Avantax - working in unison toward the goal of creating services that make it easy for clients and professionals to pursue their financial and business goals. At Avantax, we are committed as a company and individuals to the diversity, equity and inclusion of our clients, team members and the communities in which we work.
Are you an innovative problem-solver who's eager to take on new challenges, collaborate with diverse team members and achieve excellence? If so, life at Avantax may be the opportunity for you.
Position Summary
Avantax is seeking a Manager, Information Security Operations, who will be responsible for leading a security operations team and reporting to the VP, Chief Information Security Officer. They will provide technical guidance, and manage activities such as hiring, training, and evaluating Security Operations Center (SOC) staff. They will also develop policies and procedures and keep the team informed about security operations issues and concerns. This role will detect and respond to cyber security threats to ensure the organization operates securely. They will also manage financial activities, assess incident reports, and develop and implement crisis communication plans.
Essential Duties & Responsibilities
The major responsibilities of the position are listed below. To perform the job successfully, the individual must be able to execute each essential duty satisfactorily. Reasonable accommodation may be made to enable individuals with disabilities to perform essential functions.
Understand the internal SOC technologies and security feeds (firewall, router, switch,) for device upgrades and patches for remediation and eradication procedures.
Analyze and evaluate network, system, and security alerts performing triage to include determining scope, urgency, and potential impact, and identifying the specific vulnerability.
Ensure adequate/skilled staffing.
Lead and develop a well-trained SOC Team with core competencies necessary to manage risk, stay ahead of security threats, or position the team to effectively mitigate risk.
Lead the response to significant Security incidents, ensuring the SOC team is effectively responding.
Provide oversight for and ensure completion of routine activities related to travel, events, and executive security.
Oversee all enterprise-wide incident reporting, including review for compliance with established standards and appropriate follow-up activities.
Responsible for administrative and other support duties, including scheduling, training, onboarding, and collection of metrics.
Monitor email inboxes, work order service requests, and all communications devices.
Monitor ServiceNow ticket age and total(s) daily.
Delegate unassigned newly submitted tickets to analysts keeping in mind current workloads and availability.
Develop policies and procedures and keep the direct manager informed about security operations.
Education & Experience
7 years of relevant experience with a combination of functional technical experience with aspects of major enterprise business systems and related technologies.
Familiarity with industry-standard frameworks (NIST, ISO, PCI). FINRA and SEC standards are a plus.
A results-driven individual who can manage multiple complex assignments, and manage assignments based on criticality, in a timely and professional manner.
Ability to manage expectations with multiple stakeholders on projects and programs in conjunction with the information security team.
Demonstrated personal integrity, the ability to professionally handle confidential matters, and exhibit the appropriate level of judgment and decision-making commensurate with the position and responsibilities.
Deep understanding of measurement and key performance indicators for successful operations center environments.
Outstanding communication capabilities, written and oral, with an emphasis on prompt, transparent, and appropriate targeting for incident-related notifications.
Experience in security tools (Example: Splunk, CrowdStrike, Qualys, ServiceNow, Google GCP, etc.)
Experience coordinating the delivery of projects.
Experience presenting project plans to senior leadership.
Experience communicating across a diversity of areas (e.g., legal, regulatory [FINRA, SEC], finance, PR, and external industry groups).
Bachelor’s degree in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, or Information Systems.
Experience with scripting languages: Python, JavaScript, and Perl.
Experience with Google cloud computing is a plus.
Physical Demands & Work Effort
Keying/typing, standing, and walking.
Sitting for an extended period.
Constant mental and/or visual attention; the work is either repetitive or diversified requiring constant alertness in an office environment.
The job is typically performed under comfortable working conditions; any disagreeable elements are generally absent during the normal performance of the job.
Comprehensive Benefits
We offer a competitive salary, and an outstanding benefits package that includes medical, dental, vision, life insurance, paid vacation and sick days, paid holidays, tuition reimbursement, and 401(k) with company match.
Base Salary Range:
$135,000 - $187,000; Variable incentive compensation eligible.
The salary range shown is representative of what Avantax expects to pay for this job. Actual salary may vary based on job-related knowledge, skills, experience, and geographic location.
#Avantax
At Avantax®, we believe our work benefits from the diverse perspectives of our employees. As such, Avantax welcomes and celebrates diversity and inclusion and is committed to equal opportunity employment. At Avantax, you can expect a supportive, open, and inclusive atmosphere and a team that values your contributions.
Avantax and its business lines, Avantax Wealth Management® and Avantax Planning Partners℠ are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants without regard to race, color, religion, sex, national origin, age, physical and mental disability, marital status, sexual orientation, gender identity, veteran status, and any other status protected under federal or state law.
Avantax considers information gathered in the hiring process, including information on this application, confidential, and only shares it on a need-to-know basis or as required by law.
If you need assistance or accommodation due to a disability, you may contact us at
HR@Avantax.com
, or by calling 972-870-6000 to speak with a member of the HR Talent Acquisition team.
Austin, TX
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Austin, TX, USA; Sunnyvale, CA, USA.
Bachelor's degree or equivalent practical experience.
2 years of experience with cloud security.
Experience coding/scripting in one or more general purpose languages including but not limited to: Java, C/C++, C#, Objective-C, Python, JavaScript, or Go.
Experience responding to security problems looking at security alerts, front-line analysis, and response.
Experience leading the analysis of large data sets and intrusion detection systems.
Experience with signals development, threat hunting, and threat modeling.
Our Security team works to create and maintain the safest operating environment for Google's users and developers. Security Engineers work with network equipment and actively monitor our systems for attacks and intrusions. In this role, you will also work with software engineers to proactively identify and fix security flaws and vulnerabilities.
We are dedicated to helping companies find and stop cyber attacks before they cause harm. We work with the entire security industry to give good the advantage in the fight against cybercrime. Joining experts in large-scale cloud computing, big data, machine learning, and cybersecurity, you'll help build out the next generation of security intelligence solutions.
In this role, you will be building advanced and novel detection mechanisms for attacker techniques tactics and procedures, developing systems to automate remediation, conducting threat hunting, and performing network and systems forensics, as well as malware and indicator analysis. You will be responsible for managing all malicious activity on Google's networks and performing deep analysis of threats on our corporate, production, and acquisition environments.
Google Cloud accelerates organizations’ ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology – all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
The US base salary range for this full-time position is $157,000-$235,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Perform investigations on a wide variety of events from various sources to determine whether they pose a threat to Google.
Participate in large-scale security incidents.
Work with teams from around Google to discover new detection capabilities and logging sources.
Write and improve YARA and YARA-L rules to cluster and track families of malware and potentially malicious behavior.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form.
US Securities and Exchange Commission
100 F St NE, Washington, DC 20549
$122,649 - $238,592 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$122,649 - $238,592 a year
Job Type
Full-time
At the Securities and Exchange Commission (SEC), we are committed to diversity, equity, inclusion and accessibility (DEIA) and value a workforce that reflects the diverse experiences and perspectives of the communities we serve. As such, we welcome applications from qualified individuals of all backgrounds who share our commitment to public service.
Typical duties may include:
Serves as a senior adviser providing direct support to the senior staff involved in information technology operations, architecture, and systems management in the Division.
Develops, deploys, and maintains containerized applications within the Amazon Cloud Environment at the SEC (ACES).
Develops and maintains cyber security elements in conjunction with SEC security policy, including access control and system logging components.
Maintains current policy and best practices knowledge for a rapidly evolving cloud computing environment, which requires monitoring, evaluating, and implementing changes based on Federal policy and industry standards.
Keeps up to date with the latest security threats and trends to proactively address potential vulnerabilities.
Develops guidance and implements plans based on that guidance for continuous integration/continuous development (CI/CD) for ACES hosted applications.
Develops and maintains code bases, deployment schedules, and change controls for DERA deployable applications.
Collaborates with internal and external stakeholders to develop and maintain systems that meet stakeholder requirements.
You must be a US Citizen.
Application procedures are specific to this vacancy announcement. Please read all the instructions carefully. Failure to follow the instructions may result in you not being considered for this position.
Supplementary vacancies may be filled in addition to the number stated in this announcement.
This position has promotion potential to the SK-14 level.
PROBATIONARY PERIOD: This appointment may require completion of a one-year probationary period.
SECURITY CLEARANCE: Entrance on duty is contingent upon completion of a pre-employment security investigation. Favorable results on a Background Investigation may be a condition of employment or selection to another position.
DRUG TESTING: This position may be subjected to drug testing requirements.
PERMANENT CHANGE OF STATION (PCS): Moving/Relocation expenses are not authorized.
DIRECT DEPOSIT: All Federal employees are required to have Federal salary payments made by direct deposit to a financial institution of their choosing.
This position is in the collective bargaining unit.
This position is eligible to request telework in accordance with the SEC 's telework policy.
Existing Participants in the SEC?s Remote Telework Program are eligible to apply for this position. If selected, management will evaluate and communicate whether the position will allow for continued participation in Remote Telework.
All qualification requirements must be met by the closing date of this announcement.
Qualifying experience may be obtained in the private or public sector. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience.
BASIC REQUIREMENT: Bachelor's degree in computer science or bachelor's degree with 30 semester hours in a combination of mathematics, statistics, and computer science. At least 15 of the 30 semester hours must have included any combination of statistics and mathematics that included differential and integral calculus. All academic degrees and course work must be from accredited or pre-accredited institutions.
MINIMUM QUALIFICATION REQUIREMENT: In addition to meeting the basic requirement, applicants must also meet the minimum qualification requirement.
SK-13: (1) Developing software systems, high-speed computing systems; real time data acquisitions systems, simulation modeling, and data analysis. (2) Providing technical guidance in planning, coordinating, and evaluating proposed research projects and programs of interest; (3) Developing computer systems and public cloud technologies, such as AWS, and (4) Developing and enforcing security policies and procedures to safeguard sensitive data or configuring and maintaining access controls and authentication methods.
SK-14: (1) Developing software systems, high-speed computing systems; real time data acquisitions systems, simulation modeling; (2) Developing and applying system evaluation methods and techniques to major portions of large projects of studies. (3) Serving as a staff specialist responsible for providing technical leadership and guidance in a major subject-matter, functional, or program area. (4) Providing technical guidance and management over large application portfolios in a hybrid cloud environment following ITSM/ITIL methodology. (5) Developing computer systems and public cloud technologies, such as AWS., and (6) Developing and enforcing security policies and procedures to safeguard sensitive data or configuring and maintaining access controls and authentication methods.
You MUST provide transcripts or other documentation to support your educational claims. Official or unofficial transcripts are acceptable. All materials must be submitted by the closing date of the announcement.
FOREIGN EDUCATION: If you are using education completed in foreign colleges or universities to meet the qualification requirements, you must show the education credentials have been evaluated by a private organization that specializes in interpretation of foreign education programs and such education has been deemed equivalent to that gained in an accredited U.S. education program; or full credit has been given for the courses at a U.S. accredited college or university. For further information, visit: http://www.ed.gov/about/offices/list/ous/international/usnei/us/edlite-visitus-forrecog.html
SEC COMPENSATION PROGRAM: The overall salary range listed above is provided for informational purposes as it represents the full range that is applicable to current employees in this occupation/grade; however, a selectee's initial pay is always set below the maximum rate of the range. Please click here for additional information.
IMPORTANT INFORMATION FOR SURPLUS OR DISPLACED FEDERAL EMPLOYEES: Career Transition Assistance Plan (CTAP) and Interagency Career Transition Assistance Plan (ICTAP) are available to individuals who have special priority selection rights under this plan. Individuals must be well-qualified for this position to receive consideration for special priority selection. CTAP or ICTAP eligibles will be considered well-qualified when receiving an adjudicated score of 80 or higher.
Reasonable Accommodation: If you are an applicant who needs a reasonable accommodation for disability to participate in the application process at the SEC, submit the form for Reasonable Accommodation for Participation in Job Application Process here. Please be sure to submit your request at least 5 business days in advance of the date you need the requested accommodation.
Equal Employment Opportunity (EEO) Information for SEC Job Applicants: Federal EEO laws protect all applicants from discrimination on the following bases: race, color, sex (not limited to conduct which is sexual in nature, includes pregnancy, gender identity, sexual orientation, transgender status), age (40 and over), religion, national origin, disability, genetic information, retaliation for participating in the EEO process or opposing discrimination. Applicants who believe they have been discriminated against on any EEO basis can seek recourse through the SEC's administrative complaints process. To be timely, an individual must enter the EEO process within 45 days from when they know (or should have known) of the alleged discrimination. Click here for additional information.
· Benefits
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
You will be evaluated for this job based on how well you meet the qualifications above.
This position is being advertised through the Office of Personnel Management's (OPM) Delegated Direct-Hire Authority and is open to All U.S. Citizens. Under this authority, competitive rating, ranking and veterans' preference procedures do not apply.
Once the position announcement has closed, you will receive a notification to update you on your referral status. All applicants that have a tentative eligible rating will be referred to the hiring office for review.
If referred, your application, including the online Assessment Questionnaire, will be sent to a resume review panel designated by the hiring office. Your resume must support your responses to the occupational questionnaire addressing experience and education relevant to this position. We cannot accept any application materials outside of the USAJOBs system or after the position is closed unless requested by the hiring office as a part of the interview process. The resume review panel will review application materials. If your resume does not clearly support your responses to all the questions addressing experience and education relevant to this position, you may be found ineligible.
Once the resume review panel has completed their review of all applicants, they will recommend the top candidates for interview. The hiring office will schedule the interview(s) directly with the recommended candidates.
When the selection is made, applicants will be sent a referral status notification and a final disposition notification.
Your qualifications will be evaluated on the following competencies (knowledge, skills, abilities and other characteristics):
Configuration Management, Stakeholder Engagement, and Technology Application
The Occupational Questionnaire will take you approximately 20 minutes to complete. To preview the Occupational Questionnaire, click the following link: https://apply.usastaffing.gov/ViewQuestionnaire/12094925
· Benefits
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
· Required Documents
As a new or existing federal employee, you and your family may have access to a range of benefits. Your benefits depend on the type of position you have - whether you're a permanent, part-time, temporary or an intermittent employee. You may be eligible for the following benefits, however, check with your agency to make sure you're eligible under their policies.
You must provide a complete Application Package, which includes:
Required: Your responses to the Occupational Questionnaire.
Required: Your complete and comprehensive resume that includes a complete history of your work experience and the applicable employment dates with months and years. To determine if you qualify for this position, OHR will review your work history that is relevant to the specific position for which you applied. If you are an external candidate selected for this position, OHR will review your complete work history to establish your starting salary.If you are a current SEC employee selected for this position, the standard percentage increases will be applied (i.e., 6% for non-supervisory positions) if your selection results in a promotion. If your selection results in lateral movement (i.e. no change in grade) you will maintain your current salary. If your selection results in a change in grade from an SK-15 to an SK-16 you will maintain your current salary. Note: Your resume must directly address the definition of specialized experience listed in the qualification section of this announcement and must NOT contain pictures. For external candidates: Information on how your resume will be used for pay setting purposes can be found here.
Required, if applicable: CTAP/ICTAP documentation (a copy of a separation notice or other proof of eligibility for priority selection; a copy of an SF-50, Notification of Personnel Action, showing current position, grade, promotion potential, and duty location; AND a copy of your most recent performance appraisal.)
Required, if applicable: Veteran's Preference Documentation (DD-214, Member Copy 4 or other documentation containing dates of service and character of discharge. Disabled veterans and other applicants eligible for 10-point Veteran's Preference please include: documentation to validate your claim - VA letter, SF-15, etc).
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
· How to Apply
To apply for this position, you must complete the online application and submit the documentation specified in the Required Documents section below.A complete application package must be submitted by 11:59 PM (EST) on the closing date of the announcement to receive consideration.
To begin, click Apply to access the online application. You will need to be logged into your USAJOBS account to apply. If you do not have a USAJOBS account, you will need to create one before beginning the application.
Follow the prompts to select your resume and/or other supporting documents to be included with your application package. You will have the opportunity to upload additional documents to include in your application before it is submitted. Your uploaded documents may take several hours to clear the virus scan process.
After acknowledging you have reviewed your application package, complete the Include Personal Information section as you deem appropriate and click to continue with the application process.
You will be taken to the online application which you must complete in order to apply for the position. Complete the online application, verify the required documentation is included with your application package, and submit the application.
To verify the status of your application, log into your USAJOBS account (https://my.usajobs.gov/Account/Login), all of your applications will appear on the Welcome screen. The Application Status will appear along with the date your application was last updated. For information on what each Application Status means, visit: https://www.usajobs.gov/Help/how-to/application/status/.
askHR@sec.gov
Address
Division of Economic and Risk Analysis
100 F Street NE
Washington, DC 20549
US
You will be notified of your application status through USAJOBS at four points during the hiring process, as applicable. You can check the status of your application by accessing the USAJOBS website at http://usajobs.gov/ and clicking on "Track Your Online Application."
By submitting your application, you are certifying the accuracy of the information contained in your application. If you make a false statement in any part of your application, you may not be hired, you may be terminated after you begin work, or you may be fined or jailed. After making a tentative job offer, we will conduct a suitability/security background investigation. You will be required to submit official documentation before appointment. The agency will then verify the information provided on your application (i.e., degree, Veterans' Preference, certification of disability, etc.).
· Fair and Transparent
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
Equal Employment Opportunity (EEO) Policy
Reasonable accommodation policy
Financial suitability
Selective Service
New employee probationary period
Signature and false statements
Privacy Act
Social security number request
You must provide a complete Application Package, which includes:
Required: Your responses to the Occupational Questionnaire.
Required: Your complete and comprehensive resume that includes a complete history of your work experience and the applicable employment dates with months and years. To determine if you qualify for this position, OHR will review your work history that is relevant to the specific position for which you applied. If you are an external candidate selected for this position, OHR will review your complete work history to establish your starting salary.If you are a current SEC employee selected for this position, the standard percentage increases will be applied (i.e., 6% for non-supervisory positions) if your selection results in a promotion. If your selection results in lateral movement (i.e. no change in grade) you will maintain your current salary. If your selection results in a change in grade from an SK-15 to an SK-16 you will maintain your current salary. Note: Your resume must directly address the definition of specialized experience listed in the qualification section of this announcement and must NOT contain pictures. For external candidates: Information on how your resume will be used for pay setting purposes can be found here.
Required, if applicable: CTAP/ICTAP documentation (a copy of a separation notice or other proof of eligibility for priority selection; a copy of an SF-50, Notification of Personnel Action, showing current position, grade, promotion potential, and duty location; AND a copy of your most recent performance appraisal.)
Required, if applicable: Veteran's Preference Documentation (DD-214, Member Copy 4 or other documentation containing dates of service and character of discharge. Disabled veterans and other applicants eligible for 10-point Veteran's Preference please include: documentation to validate your claim - VA letter, SF-15, etc).
Manager, Cybersecurity
Samsung Semiconductor
(part of Samsung Electronics)
Remote
$108,000 - $218,300 a year
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Benefits
Pulled from the full job description
· 401(k)
· Dental insurance
· Health insurance
· On-site gym
· Paid time off
· Vision insurance
Advancing the World's Technology Together
Our technology solutions power the tools you use every day-including smartphones, electric vehicles, hyperscale data centers, IoT devices, and so much more. Here, you'll have an opportunity to be part of a global leader whose innovative designs are pushing the boundaries of what's possible and powering the future.
We believe that innovation and growth are driven by an inclusive culture and a diverse workforce. We're dedicated to empowering people to be their true selves. Together, we're building a better tomorrow for our employees, customers, partners, and communities.
What You'll Do
We are seeking a highly qualified candidate to join our Federal Operations organization which is responsible for managing our AI/HPC business with the US Federal Government (USG) agencies, and contractors. We strive at being experts at doing business with the USG and we provide the systems, procedures, and controls needed to develop and manage contracts with this customer base. Using Samsung's world leading memory technology, we will be looking at how we can design systems with significantly improved byte to flop ratios allowing improved application performance and developer productivity. We will also be looking at innovative technology for improving communication bandwidth. Most importantly, we will be looking at both from a system perspective.
Location: Hybrid, working onsite at our San Jose office/headquarters 3 days per week with the flexibility to work remotely the remainder of your time OR Fully Remote, with the opportunity to work from anywhere in the United States with the ability to travel domestic or internationally when required
Reports to: Senior Director, Samsung Federal Operations
Direct Reports: N/A
Design, develop, implement, and maintain the processes to ensure compliance with Federal regulations and policies related to Cybersecurity. Promotes awareness and execution of the processes within the company.
Develop and deliver Cybersecurity compliance training and educational programs for employees who work on Federal contracts.
Subject matter expert on current Cybersecurity legislation and enforcement issues affecting the semiconductor industry, particularly as to the impact on the AI and HPC business and the supportive products the company provides, as well as compliance best practices.
Collaborate with cross-functional team to develop, implement, and maintain Cybersecurity compliance programs to support the contractual requirements and execution of USG contracts.
Collaborates with others in related departments, including Legal, HR, IT, Internal Audit, Regulatory, and Finance for effective investigation, resolution, reporting, and remediation of Cybersecurity compliance issues. Appropriately documents findings and consults with Legal on any actual or potential non-compliance identified; tracks/facilitates items to full resolution with Contracts Manager.
Develop and maintain Cybersecurity compliance reporting and dashboard to comply with government reporting requirements. Regularly communicate dashboard to Sr. management and internal stakeholders, as needed.
Partner with Legal, HR, IT, and program team on proposal activities and responses to RFP and RFQ's. Specifically, guide and advise with existing and/or required policy related to cybersecurity requirements for the applicable business.
Uses judgement within broadly defined policies and practices; carries out compliance risk assessment, analysis, and recommends solutions to mitigate potential risks.
Support internal cybersecurity operational and compliance programs. Coordinate audits, as needed; oversee preparation of required items.
Complete other responsibilities as assigned.
What You Bring
Bachelor degree in IT /IS Management, Computer Science, Computer Engineering with 10+ years of relevant experience within InfoSec/Cybersecurity Compliance, FAR/DFAR, DEAR, or Regulatory Affairs for USG contracts, or Masters of Science IT /IS Management, Computer Science, Computer Engineering with 8+ years of relevant experience within InfoSec/Cybersecurity Compliance, FAR/DFAR, DEAR, or Regulatory Affairs for USG contracts.
Extensive knowledge of and expertise with USG InfoSec/Cybersecurity regulations and statutes.
Experience in designing, implementing, and maintaining InfoSec/Cybersecurity compliance processes for USG contracts in the following types of contracts: Fixed Price, Cost Plus, and NRE.
High attention to detail and effective project management skills, PMI/PMP certification desired.
Current Information Security Certification(s): CISSP, CISM, CRISC
Relevant technology experience desired in the following areas: Next Generation Firewalls, EDR/XDR, SIEM, SOAR, DLP, Threat Intelligence, VPN, Web Proxies, Secure Email Gateways, Cloud Security, CASB, SASE, Vulnerability Management, IAM, GRC, NIST framework, FEDRAMP
Strong communication skills (verbal and written), with ability to communicate and influence at all levels of the organization.
Experience interacting with and managing government contracts for HPC systems.
You're inclusive, adapting your style to the situation and diverse global norms of our people.
An avid learner, you approach challenges with curiosity and resilience, seeking data to help build understanding.
You're collaborative, building relationships, humbly offering support and openly welcoming approaches.
Innovative and creative, you proactively explore new ideas and adapt quickly to change.
This position involves work on US Government contracts and/or proposals for US Government contracts. Any offer by Samsung for this position is conditioned upon satisfying government eligibility requirements.
#LI-SF1
What We Offer
The pay range below is for all roles at this level across all US locations and functions. Individual pay rates depend on a number of factors—including the role’s function and location, as well as the individual’s knowledge, skills, experience, education, and training. We also offer incentive opportunities that reward employees based on individual and company performance.
This is in addition to our diverse package of benefits centered around the wellbeing of our employees and their loved ones. In addition to the usual Medical/Dental/Vision/401k, our inclusive rewards plan empowers our people to care for their whole selves. An investment in your future is an investment in ours.
Base Pay Range
$108,000—$218,300 USD
Give Back With a charitable giving match and frequent opportunities to get involved, we take an active role in supporting the community.
Enjoy Time Away You'll start with 4+ weeks of paid time off a year, plus holidays and sick leave, to rest and recharge.
Care for Family Whatever family means to you, we want to support you along the way—including a stipend for fertility care or adoption, medical travel support, and an errand service.
Prioritize Emotional Wellness With on-demand apps and paid therapy sessions, you'll have support no matter where you are.
Stay Fit Eating well and being active are important parts of a healthy life. Our onsite Café and gym, plus virtual classes, make it easier.
Embrace Flexibility Benefits are best when you have the space to use them. That's why we facilitate a flexible environment so you can find the right balance for you.
Cybersecurity Consultant/vCISO
Strata Information Group
Remote
$132,000 - $150,000 a year
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Benefits
Pulled from the full job description
· 401(k)
· 401(k) matching
· Dental insurance
· Health insurance
· Life insurance
· Vision insurance
About SIG
Strata Information Group (SIG) helps colleges and universities realize the full potential of their technology to improve services for students, faculty, and staff. We specialize in project-based IT consulting, staff augmentation, cybersecurity, managed services, business processes, technical support, and technology procurement services. We believe in integrity, teamwork, and providing our clients with the highest quality of support and service. SIG offers competitive salaries and benefits. SIG is an Equal Employment Opportunity/Affirmative Action Employer
Responsibilities of the Cybersecurity Consultant/vCISO:
You will provide expert guidance and support to clients in developing and implementing their cybersecurity strategies as part of the development of the SIG Cyber practice. This includes assessing clients' current security posture, identifying vulnerabilities and potential threats, and recommending and implementing solutions to mitigate risks. You will also be responsible for staying current on industry best practices and regulations and providing training and education to clients. This role supports Account Executives and Project Managers across the entire firm by delivering quality Cybersecurity services directly to existing and new clients.
Conducting security and vulnerability assessments to identify vulnerabilities and potential threats
Developing and implementing security policies, procedures, and best practices
Providing guidance and support to clients in the development and implementation of their cybersecurity strategies
Required Qualifications of the Cybersecurity Consultant:
The candidate must have a solid understanding of cyber offensive and defensive architectures and technologies required to identify and evaluate vulnerabilities. Cloud security knowledge, experience within the Higher Education Industry, and certifications are a plus.
Bachelor's degree in Computer Science, Computer Engineering, or a related field
5 or more years of experience in cybersecurity
Strong knowledge of security best practices, frameworks, and industry regulations
Experience with security assessment tools and techniques
Understanding of security risks associated with cloud infrastructure and applications
The ability to work on multiple projects concurrently and be committed to providing exemplary customer service
Strong analytical and problem-solving skills
Excellent communication, technical writing, and presentation skills
Ability to work independently as well as part of a team and having your work be subject to a peer review process
The ability to work after hours as requested by client engagements
Patience, flexibility, and a sense of humor are a must!
Pay and Benefits:
The salary range is $132,000 – $150,000
Health, Vision, Dental & Life Insurance
3 Weeks’ Vacation & 10 Paid Holidays
401(K) with a 5% Employer Contribution
Travel
Travel up to 10% of the time may be required.
Cybersecurity Manager - Remote
Magellan Health
(part of Centene)
United States
Remote
From $105,230 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
From $105,230 a year
Job Type
Full-time
Benefits
Pulled from the full job description
· Health insurance
This fully remote position for an Cybersecurity Manager is contingent on Magellan Federal being awarded the Military One Source contract.
Ideal candidate will have several years of experience managing IT and Cybersecurity program. The Cybersecurity Manager should possess one or more of the follow active certifications:
a. CompTIA Advanced Security Practitioner (CASP+ CE)
b. Cisco Certified Network Professional (Security-focus) (CCNP Security)
c. Certified Information Systems Auditor (CISA)
d. Certified Information Systems Manager (CISM)
e. Certified Information Systems Security Professional (CISSP)
f. GIAC Certified Enterprise Defender (GCED)
g. GIAC Certified Incident Handler (GCIH)
h. GIAC Security Leadership Certification (GSLC)
i. Certified Cloud Security Professional (CCSP)
j. Certified Chief Information Security Officer (CCISO)
Will be responsible for the implementation, management, security, and availability of information systems, applications, networks, security controls, and end-users devices. As an Information Security Manager, will be responsible for all IT/Cyber compliance requirements, operations procedures, and business processes.
Promotes a positive security culture for the organization by protecting the confidentiality, integrity, and availability of data and assets while assisting the company to successfully meet its strategic goals. Manages a team of Information Security Engineers and/or Analysts and is accountable for this team’s performance in engineering, implementation, and maintenance of security processes and solutions throughout the enterprise according to policy and risk. Accountable for the team’s ability to design, develop, and maintain the security environment and architecture to ensure assets are protected. Serves as a leader and mentor for their team, and others, providing master level expertise from various IT disciplines with focus in information security. Be a champion to their team and other business units to promote a secure organization through positive knowledge sharing, training, influences, and conduct.
Manages a team responsible for ensuring adequate security processes and solutions to mitigate or remediate identified risks sufficiently to meet business objectives, contractual and/or regulatory requirements.
Delivers Key Performance indicators to drive success to leadership.
Accountable for the development of security policies, standards and plans to ensure the protection of corporate data against unauthorized use, access, modification and destruction.
Accountable for the oversight and management of a functional area within the Office of Information Security, including supervision and mentorship.
Oversees the monitoring and compliance of information security policies and procedures.
Leads incident response activities, ensuring security incidents are properly contained, eradicated, and recovered.
Ensures proper security logs are generated and sent to the organization’s SIEM.
Researches and implements emerging technologies to enhance the security portfolio.
Persistently evaluates adherence with defined policies and standards.
Leads team efforts with identifying, remediating, and/or mitigating vulnerabilities in the environment, ensuring appropriate response to high risk and aged findings.
Leads the development, design, implementation, and maintenance of a secure environment for Magellan Health.
Ensures Magellan information security processes and solutions are protected against a failure or attack that reduces the organizations ability to respond to security incidents.
Ensures Magellan processes and solutions are maintained securely and highly available to protect the confidentiality, integrity and availability of assets.
Accountable for the monitoring, systems revisions and patches are up to date.
Manages the teams changes to the solutions and remove unnecessary services.
Understands risks and impact to all downstream systems in the corporate environment and their interconnectivity
Helps build and drive a security aware culture that understand security risks and impact to all corporate solutions
Manages teams that perform forensic analysis and risk assessments for the entire environment.
Oversees and manages teams that support enterprise high-availability solutions running a complex arrangement of operating systems, including system updates, log analysis, access controls and backup.
Monitors, remediates and mitigates security violations for network, devices, servers and other assets.
Designs, implements and maintains security guidelines and a security infrastructure for Magellan Health.
Develops technical solutions to autonomously verify compliance with required technical controls.
Other Job Requirements
Responsibilities
5+ years of IT experience with 2+ years of information security experience.
May substitute 2 or more relevant certifications for a year of experience.
Proven in-depth knowledge of network protocols and packet analysis tools such as tcpdump and Wireshark.
Detailed knowledge on network and host- based firewalls and intrusion prevention systems.
Detailed knowledge on proxy servers, SSL inspection techniques, load- balancers, reverse proxy servers, and web application firewalls.
Proven ability to develop custom threat signatures in response to zero-day and emerging security threats.
Detailed knowledge with security-related systems and applications, firewalls, packet analysis tools, intrusion detection/prevention, and web content filtering.
Detailed digital forensics and eDiscovery skills and experience.
Detailed knowledge of network infrastructure, including routers, switches, firewalls.
Knowledge of information security publications (e.g., NIST 800-53, 53A, 37).
Detailed knowledge of incident response, problem resolution, and vulnerability remediation.
Detailed knowledge of automated security testing. Ability to work with multi-discipline teams, cross- functional management.
Self-starter with the ability to lead tasks with demonstrated ability to work independently.
Strong verbal and written communication skills with the ability to collaborate effectively with other groups.
Able to effectively manage evolving and competing objectives and possess a mastery of information security tools and techniques.
Has strong leadership, communication, and negotiation skills.
Results driven with a bias for action.
General Job Information
Title
Cybersecurity Manager - Remote
Grade
30
Work Experience - Required
Information Security, IT
Work Experience - Preferred
Education - Required
A Combination of Education and Work Experience May Be Considered., Bachelors - Information Security
Education - Preferred
License and Certifications - Required
License and Certifications - Preferred
CISSP - Certified Information Systems Security Professional - Enterprise
Salary Range
Salary Minimum:
$105,230
Salary Maximum:
$178,890
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law.
This position may be eligible for short-term incentives as well as a comprehensive benefits package. Magellan offers a broad range of health, life, voluntary and other benefits and perks that enhance your physical, mental, emotional and financial wellbeing.
Magellan Health, Inc. is proud to be an Equal Opportunity Employer and a Tobacco-free workplace. EOE/M/F/Vet/Disabled.
Every employee must understand, comply with and attest to the security responsibilities and security controls unique to their position; and comply with all applicable legal, regulatory, and contractual requirements and internal policies and procedures.
Sr Cloud Security Engineer
Aflac, Incorporated
Remote
$70,000 - $160,000 a year
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Benefits
Pulled from the full job description
· 401(k)
· Dental insurance
· Flexible spending account
· Health insurance
· Paid time off
· Parental leave
· Prescription drug insurance
Show more
Salary Range: $70,000 - $160,000
We’ve Got You Under Our Wing
We are the duck. We develop and empower our people, cultivate relationships, give back to our community, and celebrate every success along the way. We do it all…The Aflac Way.
Aflac, a Fortune 500 company, is an industry leader in voluntary insurance products that pay cash directly to policyholders and one of America's best-known brands. Aflac has been recognized as Fortune’s 50 Best Workplaces for Diversity and as one of World’s Most Ethical Companies by Ethisphere.com.
Our business is about being there for people in need. So, ask yourself, are you the duck? If so, there’s a home, and a flourishing career for you at Aflac.
Work Designation. Depending on your location within the continental US, this role may be hybrid or remote.
If you live within 50 miles of the Aflac offices located in Columbus, GA or Columbia, SC, this role will be hybrid. This means you will be expected to work in the office for at least 60% of the work week. You will work from your home (within the continental US) for the remaining portion of the work week. Details of this schedule will be discussed with your leadership.
If you live more than 50 miles from the Aflac offices located in Columbus, GA or Columbia, SC, this role will be remote. This means you will be expected to work from your home, within the continental US. If the role is remote, there may be occasions that you are requested to come to the office based on business need. Any requests to come to the office would be communicated with you in advance.
What does it take to be successful in this role?
Networks (TCP/IP)
Schematic Architecture Design
Data Access and User Administration
Data Security
Development Requirements Definition
Network Security
Security Risk Management
Server Hardware + O/S Management
Systems Security and User Administration
Systems Security Maintenance
Systems Security Policies and Procedures
Systems Security Testing and Auditing
Information Security Technology
AWS Experience – required
Education & Experience Required
Bachelor's Degree In Computer Science, Information Security, Information Systems or related field
Certification CISSP or other information security related certifications within a given field are preferred (i.e., Microsoft Windows, Cisco, TCP/IP, etc.)
Eight or more years experience in information security, engineering or professional related work experience
Advanced knowledge of multiple security technologies (firewalls, IPS, DLP, antimalware, proxies, WAF, etc.)
Or an equivalent combination of education and experience
Preferred Education & Experience
Certification CISSP or other information security related certifications within a given field are preferred (i.e., Microsoft Windows, Cisco, TCP/IP, etc.)
Cloudformation
Teraform
Python
AWS
Scripting
DevSecOps
DevOps
Azure
Lambda
API
Postman
GIT
YAML
JSON
Principal Duties & Responsibilities
Takes a lead role in mapping security standards to technical solutions in support of business needs.
Works with project teams, architects, and constituents to design and implement security solutions in support of corporate information security policy, regulatory requirements, and security best practices.
Works as part of the development team to maintain the security and regulatory compliance of systems architected, built, installed and used by the company.
Researches, analyzes, and recommends the implementation of software or hardware changes to rectify any infrastructure security deficiencies or to enhance security performance.
Conducts research on emerging products, services, protocols, and standards in support of security enhancement and development efforts; tests new security software and/or technologies.
Provides ongoing engineering support for security systems including firewalls, virus protection systems, Web filters, computer forensic systems and network, and host-based intrusion detection and prevention systems
Creates audits, and reports the enforcement of policies, procedures and associated plans for system security administration, and user-system access as defined by company standards.
Contributes to the design and implementation of the disaster recovery plans for security of the company’s computer systems, databases, networks, servers, and software applications
Develops technical security standards in support of information security policies and principles
Ensures that planned testing activities are performed and technical criteria are met
Plans and monitors the installation of distributed infrastructure systems
Performs other related duties as required.
Total Rewards
This compensation range is specific to the job level and takes into account the wide range of factors that are considered in making compensation decisions including, but not limited to: education, experience, licensure, certifications, geographic location, and internal equity. The range has been created in good faith based on information known to Aflac at the time of the posting. Compensation decisions are dependent on the circumstances of each case. This salary range does not include any potential incentive pay or benefits, however, such information will be provided separately when appropriate. The salary range for this position is $70,000 to $160,000.
In addition to the base salary, we offer an array of benefits to meet your needs including medical, dental, and vision coverage, prescription drug coverage, health care flexible spending, dependent care flexible spending, Aflac supplemental policies (Accident, Cancer, Critical Illness and Hospital Indemnity offered at no costs to employee), 401(k) plans, annual bonuses, and an opportunity to purchase company stock. On an annual basis, you’ll also be offered 11 paid holidays, up to 20 days PTO to be used for any reason, and, if eligible, state mandated sick leave (Washington employees accrue 1 hour sick leave for every 40 hours worked) and other leaves of absence, if eligible, when needed to support your physical, financial, and emotional well-being. Aflac complies with all applicable leave laws, including, but not limited to sick and safe leave, and adoption and parental leave, in all states and localities.
Lead Cloud Security Engineer
TIAA
Charlotte, NC
$119,600 - $183,800 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$119,600 - $183,800 a year
Job Type
Full-time
Benefits
Pulled from the full job description
· Health insurance
· Retirement plan
TIAA has an opportunity for a Lead Cloud Security Engineer. This role will provide security for cloud-based digital platforms and will play an integral role in protecting our organization’s data. This may involve analyzing existing cloud structures and creating new and enhanced security methods. In addition, will serve as part of a larger team dedicated to cloud-based management and security.
The focus for this role will be to create cloud-based programs, perform threat simulations to detect possible risks, and provide security recommendations. Will investigate, create, and recommend innovative technologies or other methods that will enhance the security of cloud-based environments.
Key Responsibilities and Duties
Implement cloud security strategy, standards, procedures, best practices, and DevSecOps.
Implement processes and technical controls supporting cloud security standards including integration of cloud services and workloads into corporate cybersecurity services.
Collaborate with operations and engineering teams to implement and tune cloud-native security monitoring, tooling, and reporting.
Implement CSPM tools such as wiz.io across multiple cloud platforms.
Define cloud security policies, standards, and best practices in a multi-cloud environment.
Promote awareness of corporate cybersecurity policy, standards, and guidelines
Design cloud-based network traffic flows to drive anomaly detection capability.
Mentor engineering and operations staff on unique cloud-based security controls
Develop tools to improve cloud specific anomaly detection requirements.
Foster a culture of security by partnering with solutions architects & other business teams to balance key performance and security.
Perform regular reviews of cloud infrastructure for security, and cloud best practices.
Develop threat models to identify risks and prioritize improvements to our architecture.
Drive the adoption of Authentication and Authorization reference architectures for managing cloud infrastructure.
Educational Requirements
University (Degree) Preferred
Work Experience
5+ Years Required; 7+ Years Preferred
Physical Requirements
Physical Requirements: Sedentary Work
Career Level
8IC
Qualifications:
Required:
Five years of Information Technology experience
At least three (3) to (5) years of experience implementing or supporting cloud-based cyber security.
At least two (2) years’ experience supporting two (2) cloud-provider platforms (such as AWS, Azure, Google)
At least two (2) years’ experience with user Authentication and Authorization
At least two (2) years’ experience with Kubernetes
Preferred:
Familiarity with CSPM tools such as wiz.io across multiple cloud platforms
Knowledge of common cyber security technical controls and their application to cloud systems, such as access control, audit and accountability, configuration management, identification and authentication, system and communication protection, and system and information integrity.
Knowledge of other common industry cyber security standards and organizational best practices
Knowledge of current cyber security threats and vulnerabilities
Understanding of basic information technology concepts, systems, and network architecture
Proven success in contribution to a collaborative environment
Possess a CCSP (Certified Cloud Security Professional) or other cloud certification.
Related Skills
Application Programming Interface (API) Development/Integration, Automation, Communication, Consultative Communication, Containerization, DevOps, Enterprise Application Integration, Influence, Organizational Savviness, Problem Solving, Prototyping, Relationship Management, Scalability/Reliability, Software Development Life Cycle, Systems Design/Analysis
Base Pay Range: $119,600/yr. - $183,800/yr.
Actual base salary may vary based upon, but not limited to, relevant experience, time in role, base salary of internal peers, prior performance, business sector, and geographic location. In addition to base salary, the competitive compensation package may include, depending on the role, participation in an incentive program linked to performance (for example, annual discretionary incentive programs, non-annual sales incentive plans, or other non-annual incentive plans).
_____________________________________________________________________________________________________
Company Overview
TIAA is the leading provider of financial services in the academic, research, medical, cultural and government fields. We offer a wide range of financial solutions, including investing, banking, advice and education, and retirement services.
Benefits and Total Rewards
The organization is committed to making financial well-being possible for its clients, and is equally committed to the well-being of our associates. That’s why we offer a comprehensive Total Rewards package designed to make a positive difference in the lives of our associates and their loved ones. Our benefits include a superior retirement program and highly competitive health, wellness and work life offerings that can help you achieve and maintain your best possible physical, emotional and financial well-being. To learn more about your benefits, please review our
Benefits Summary
.
Equal Opportunity
We are an Equal Opportunity/Affirmative Action Employer. We consider all qualified applicants for employment regardless of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other protected status.
Read more about the Equal Opportunity Law
here
.
Accessibility Support
TIAA offers support for those who need assistance with our online application process to provide an equal employment opportunity to all job seekers, including individuals with disabilities.
If you are a U.S. applicant and desire a reasonable accommodation to complete a job application please use one of the below options to contact our accessibility support team:
Phone: (800) 842-2755
Email:
accessibility.support@tiaa.org
Privacy Notices
For Applicants of TIAA, Nuveen and Affiliates residing in US (other than California), click
here
.
For Applicants of TIAA, Nuveen and Affiliates residing in California, please click
here
.
For Applicants of Nuveen residing in Europe and APAC, please click
here
.
For Applicants of Greenwood residing in Brazil (English), click
here
.
For Applicants of Greenwood residing in Brazil (Portuguese), click
here
.
For Applicants of Westchester residing in Brazil (English), click
here
.
For Applicants of Westchester residing in Brazil (Portuguese), click
here
Chief Information Security Officer
Logicalis
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Job Description
Summary
Develops, implements and monitors strategic, comprehensive enterprise information security and risk management program. Ensures all information assets are adequately protected and in line with company goals.
Essential Duties and Responsibilities
Provides strategic and tactical vision, along with execution focused on incident prevention, detection, and response.
Identifies, tracks, and communicates detailed metrics indicating overall security risk factors.
Ensures organization's capability to analyze and mitigate security threats.
Ensures newly acquired technology complies with security guidelines.
Provides input and guidance to IT, ensuring optimum security levels are maintained.
Implements incident response program to identify and respond if any breaches (internal or external) or misuse of data takes place.
Implements information security management framework aligned with business priorities; measures and ensures enforcement.
Provides leadership to enterprise's information security organization.
Partners with business stakeholders across company to raise awareness of risk management concerns.
Maintains a working knowledge of applicable Federal, State, and Local laws and regulations as well as policies and procedures of Logicalis in order to ensure adherence in a manner that reflects honest, ethical and professional behaviors.
Oversees and/or participates in incident response planning as well as investigation of security breaches, and assists with disciplinary and legal matters associated with such breaches.
Responds to and supports Legal Department with information security, compliance and data privacy inquiries and contracts including RFP responses and BAA, DPR, CCPA and similar documentation and addendums. Participates in document review as needed for the organization to assess policy compliance and corporate risk.
Demonstrates expert knowledge of data privacy regulations and cybersecurity frameworks and standards including but not limited to:
ISO, PCI-DSS, HIPAA, SOC, HITRUST, NIST, GDPR
Supervisory Responsibilities
Directly supervises team in accordance with the organization’s policies and applicable laws. Carries out supervisory responsibilities in accordance with the organization’s policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance, rewarding and disciplining employees; addressing complaints and resolving problems.
Qualifications
To perform this job successfully, an individual should be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education/Experience/Technical Requirements/Certification
Equivalent combination accepted.
Education
Bachelor’s degree in Business Administration, Information Technology or a related area.
Experience / Technical Requirements
15 years’ in security leadership position with proven experience in the following:
Driving strategic and operational cybersecurity vision, strategy, policy, and compliance in a manner that is measurable for the board and other stakeholders.
Building security organization including identity and access management and information protection with classification relative to highly matrixed organization.
Building enterprise risk strategy and program that defines acceptable levels of risk reflecting leader’s intent.
Hybrid cloud security with multiple data centers and public clouds (SaaS/IaaS) with depth in Microsoft Azure and O365, including advanced security controls around information protection.
Speaking at major security conferences and publishing blogs, white papers, and other security related pieces; comfortable conducting media interviews on variety of security topics.
Helping organizations implement Common Security Framework (ISO27001, NIST CSF, CIS Controls, etc.).
Proficient use of Microsoft Office applications.
Certifications
ISC2 CISSP
ISACA CRISC
Cloud Security; such as ISC2 CCSP, CSA CCSK
ITIL, beyond Foundation
Other Skills and Abilities
Self-starter with excellent organizational, administrative and interpersonal skills.
Passion for business; leader with integrity and desire to work in dynamic, fast-paced environment.
Mastered sophisticated oral and written communication skills in order to build trust among an expanding universe of stakeholders.
Collaborative and flexible style, with strong service mentality.
Demonstrated ability to work effectively across functional groups and levels within organization, as well as externally.
Physical Demands
The physical demands described here are representative of those that should be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this Job, the employee is constantly required to sit, talk, see, hear, and use hands and arms. The employee is frequently required to stand; move about, climb steps or balance and stoop, kneel, crouch, or crawl. The employee may occasionally lift and/or move up to 10 pounds.
The above statements describe the general nature and level of work being performed by individuals assigned to this classification. This is not intended to be an exhaustive list of all responsibilities and duties required of personnel so classified.
Logicalis is an Equal Opportunity Employer. It is our policy to employ people who are qualified by reason of education, training, experience, and demonstrated performance. We value diversity and inclusion at our company. We do not discriminate on the basis of race, color, religion, national origin, sexual orientation, gender identity and gender expression, marital status, age, height, weight, disability, veteran status, or any other reason prohibited by applicable federal or state laws.
Share With:
Job Snapshot
Employee Type:
Full-Time
Location:
Work From Home
Job Type:
Information Technology
Experience:
Not Specified
Date Posted:
8/17/2023
Senior Cloud Security Professional
Humana
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· Caregiver leave
· Dental insurance
· Disability insurance
· Health insurance
· Life insurance
· Paid parental leave
Show more
The Senior Cloud Security Professional audits the most complex new and existing information systems applications to ensure that appropriate controls exist, that processing is efficient and accurate, and that information systems procedures are in compliance with corporate standards. The SR Cloud Security Professional work assignments involve moderately complex to complex issues where the analysis of situations or data requires an in-depth evaluation of variable factors.
Responsibilities
The Senior Cloud Security Professional works with all parts of IT to ensure that the appropriate controls exist to meet specific Humana Government business needs. The SR Cloud Security Professional also ensures the appropriate controls operate effectively and that information systems procedures are in compliance with industry and corporate standards.
Responsibilities Include:
Begins to influence department’s strategy.
Understand Government Security Cloud issues.
Makes decisions on moderately complex to complex issues regarding technical approach for project components, and work is performed without direction.
Exercises considerable latitude in determining objectives and approaches to assignments.
Required Qualifications
Our Department of Defense contract requires U.S. Citizenship for this position
Bachelor's degree or equivalent work experience
5 or more years of technical experience
Proficiency in Cloud Security, Azure, AWS or GCP
IT management background, with demonstrated experience leading special projects and producing metrics, measurements and trend reports
Ability to work in a fast paced, dynamic and changing environment while managing multiple projects simultaneously
Excellent communication skills
Solid understanding of SDLC and Agile/Scrum methodologies
Must be passionate about contributing to an organization focused on continuously improving consumer experiences
Preferred Qualifications
Master's Degree of Business Administration, Information Technology or a related field
FedRAMP Cloud Security experience
PMP certification
Exemplary core project management skills including multiple aspects of the PMBOK
Ability to navigate a highly matrixed organization effectively.
Sound business and technical acumen.
Demonstrated experience with process documentation and re-engineering
Prior experience managing vendor relationships
Additional Information
Work-At-Home Requirements
To ensure Home or Hybrid Home/Office associates’ ability to work effectively, the self-provided internet service of Home or Hybrid Home/Office associates must meet the following criteria:
At minimum, a download speed of 25 Mbps and an upload speed of 10 Mbps is recommended; wireless, wired cable or DSL connection is suggested
Satellite, cellular and microwave connection can be used only if approved by leadership
Associates who live and work from Home in the state of California, Illinois, Montana, or South Dakota will be provided a bi-weekly payment for their internet expense.
Humana will provide Home or Hybrid Home/Office associates with telephone equipment appropriate to meet the business requirements for their position/job.
Work from a dedicated space lacking ongoing interruptions to protect member PHI / HIPAA information
#LI-Remote #LI-TA4
This is a remote position
Scheduled Weekly Hours
40
Pay Range
The compensation range below reflects a good faith estimate of starting base pay for full time (40 hours per week) employment at the time of posting. The pay range may be higher or lower based on geographic location and individual pay decisions will vary based on demonstrated job related skills, knowledge, experience, education, certifications, etc.
$86,600 - $119,200 per year
This job is eligible for a bonus incentive plan. This incentive opportunity is based upon company and/or individual performance.
Description of Benefits
Humana, Inc. and its affiliated subsidiaries (collectively, “Humana”) offers competitive benefits that support whole-person well-being. Associate benefits are designed to encourage personal wellness and smart healthcare decisions for you and your family while also knowing your life extends outside of work. Among our benefits, Humana provides medical, dental and vision benefits, 401(k) retirement savings plan, time off (including paid time off, company and personal holidays, volunteer time off, paid parental and caregiver leave), short-term and long-term disability, life insurance and many other opportunities.
Senior Information Security Engineer
Mastercard
Arlington, VA
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Our Purpose
We work to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. We cultivate a
culture of inclusion
for all employees that respects their individual strengths, views, and experiences. We believe that our differences enable us to be a better team – one that makes better decisions, drives innovation and delivers better business results.
Title and Summary
Senior Information Security Engineer
Who is Mastercard?
Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential.
Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all.
Mission First, People Always
As Corporate Security, we are responsible for keeping Mastercard safe and secure from cyber and physical threats, and it is our people on the frontlines who make this happen every day.
By taking care of our people, their wellbeing, and career development, we provide them the necessary tools and environment to ensure the success of our mission.
Overview
The Enterprise Security Architecture and Innovation team is looking for a Senior Information Security Engineer to join our team to work closely with Network and Security Engineering, Cloud Security, and Enterprise Application teams to design, build and deliver technology solutions and drive alignment to Mastercard policies and standards. This person will evaluate system and application architectures, data flow requirements, and research areas of risk as it relates to software and infrastructure implementations. The role requires the ability to influence and collaborate across a diverse group of internal stakeholders, effectively managing multiple priorities, demands, and possess a deep understanding of networks and systems in both on-premises and cloud environments.
In this role, the Senior Security Architect will:
Manage security assessment engagements that include the analysis of solution designs, data flow diagrams, software business cases, implementation plans, and network changes.
Provide security engineering support for Mastercard's technology imperatives that include the build-out of new data centers.
Identify opportunities for automating assessment workflows and assist with the development of scripts.
Analyze new and existing technologies and provide recommendations for areas of security risk and alignment to Mastercard’s policies and technical standards.
Collaborate with other corporate security teams to evaluate new technologies and defining security requirements.
All About You
The ideal candidate for this position should:
Be a self-starter who is able to prioritize and work independently
Have a passion to learn about new technologies, and progressively takes initiative to develop that expertise
Be able to demonstrate technical competency in security engineering based on hands-on experience or relevant qualifications
Have a solid understanding of firewalls, networking, threat prevention and detection, and application security principles
Have hands-on experience evaluating data flows, firewall policies, and access control lists
Be able to support maintenance windows outside of regular business hours (once or twice per month)
Have hands-on experience developing scripts, working with structured data formats such as YAML and JSON, and code version control systems such as GIT or Bitbucket
Have working knowledge and application of industry standards for security controls, and hardening systems and software
Have effective communication and project management skills with the ability to manage multiple engagements with diverse technical teams
NICE Framework References
National Initiative for Cybersecurity Education (NICE) competency proficiency levels of limited in leadership, limited to developing in operational and professional, and developing to proficient in technical.
This Mastercard role shares KSAs with related NICE work roles ( https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center/workforce-framework-cybersecurity-nice)
SP-DEV-002, OPM622, Secure Software Assessor
SP-ARC-002, OPM652, Security Architect
SP-SRP-001, OPM641, Systems Requirements Planner
SP-SYS-001, OPM631, Information Systems Security Developer
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard’s security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines.
In the US, Mastercard is an inclusive Equal Employment Opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. If you require accommodations or assistance to complete the online application process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
Abide by Mastercard’s security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines.
Pay Ranges
Arlington, Virginia: $129,000 - $199,000 USD
New York City, New York: $134,000 - $208,000 USD
Security Consultant
Microsoft
United States
$94,400 - $184,200 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$94,400 - $184,200 a year
Job Type
Full-time
The Microsoft Security CyberOps Resilience Team is on a mission to make the world a safer place. With global security experts worldwide, over one billion invested annually in security research and development, and cutting-edge A.I based Security innovations, Microsoft is ideally placed to develop and deploy solutions to protect customers around the world.
We are looking for trusted IT Security professionals with a drive to help solve complex problems for our customers, enabling them to help modernize their security architecture and posture.
As a Security Consultant you will work with our enterprise customers to assess, envision, plan, design and implement security and compliance capabilities and controls leveraging Microsoft products and industry cybersecurity practices. In this role, you will work with enterprise customers in a strategic fashion to modernize and transform cybersecurity in their organizations.
Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees of Microsoft, we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
Responsibilities
As a Security Consultant, you will partner with our customers to help them develop and deploy solution offerings that secure their assets against determined human adversaries.
Responsibilities include:
Customer-facing delivery of security solution offerings built on the Microsoft Azure Platform.
Deliver results through teamwork while achieving individual billable attainment goals.
Articulate value propositions for the most strategic Microsoft security related products and services.
Knowledge in a specific security solution, or several products, feature functions, or services relevant to Microsoft’s cloud security platform.
Ensure customer solutions align with the intent of the design architecture.
Identify business and technical risks, analyze those risks, and propose mitigations and contingencies.
Provide stakeholder assistance throughout deployment to avoid or resolve technical issues.
Modify existing intellectual property (IP) or, where applicable, develop new content to add value.
Qualifications
Required/Minimum Qualifications
Bachelor's Degree in Computer Science, Engineering, Finance, Business, or related field AND 3+ years experience in project delivery and customer relationship management.
OR equivalent experience.
3+ years of experience in any of the following solution delivery areas:
Identity and Access Management (Azure Active Directory [AD] Security, Active Directory [AD] Security, Privileged Access Management [PAM], etc.)
Security Operations (Sentinel, Microsoft 365 Defender, etc.)
Securing the Cloud (Azure Network, Azure Infra, Azure Key Vault, Multi-Cloud)
Compromise Recovery (AD and Azure AD recovery scenarios)
Compliance (Office 365 Compliance, Purview, Compliance Manager, etc.)
Security DevOps (Security Development Lifecycle [SDL], Threat Modeling, etc.)
Additional or Preferred Qualifications
5+ years work experience in project delivery and customer relationship management.
Technical certifications based on domain/service line (e.g., Microsoft Azure Technologies Certifications like AZ-500 or AZ-104 or Microsoft Security Operations Analyst Certifications like SC-200).
Delivery Management certification (e.g., Scrum, Agile, Change Management, Project Management)
Experience with working towards a billable utilization goal.
Experience representing Microsoft products and solutions.
Experience with script development (PowerShell, Python, etc.)
Experience working across on-prem hybrid Active Directory and Azure Active Directory environments.
Knowledge of common attack vectors an adversary may use to compromise a system.
Knowledge of common exploitation tools, tactics, and procedures.
Enjoy travel and are comfortable with travel up 50%-75%.
Technology Consulting IC4 - The typical base pay range for this role across the U.S. is USD $94,400 - $184,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD $120,000 - $194,400 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: https://careers.microsoft.com/us/en/us-corporate-pay
#INDSOL
#INDSOLDel
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Security Consultant
IBM
Austin, TX 73301
$95,000 - $178,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$95,000 - $178,000 a year
Job Type
Full-time
Encouraged to apply
Fair chance
Benefits
Pulled from the full job description
· 401(k)
· Disability insurance
· Employee stock purchase plan
· Health insurance
· Life insurance
· Paid time off
· Parental leave
Show more
Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Your Role and Responsibilities
Monitor a strategic, comprehensive corporate and federal information security monitoring and operation program to ensure the confidentiality, integrity and availability of information owned, controlled, or processed by the organization.
Ensure that IBM maintains compliance with all applicable federal directives and policies regarding securing and monitoring of information.
Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the IBM environment.
Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics as applicable.
Detect, analyze, respond to and mitigate security threats from Firewalls (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR), Security Information Event Management (SIEM), Security Orchestration Automation and Response (SOAR) and other security threat data sources to protect corporate and federal assets in accordance with defined SLA’s/SLO’s.
Assist in the improvement of all policies, processes, procedures.
Assist in the tuning and detection methods of all applicable security tooling.
Participate in security incidents and act as the technical Subject Matter Expert during significant security incidents.
Assist in risk assessment duties including reporting and oversight of remediation efforts and change control.
Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to rapid response.
Required Technical and Professional Expertise
Experience with risk management, vulnerability management, threat analysis, security auditing, security monitoring, incident response and other information security practices preferred.
Knowledge of cloud computing and network protocols.
Knowledge of generic information security standards/programs.
Knowledge of SIEM tools and log analysis.
Knowledge of EDR tools and high-level forensic analysis.
Excellent written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
Preferred Technical and Professional Expertise
4+ years of information security experience
CYSA+, GCIH, GCIA, OSCP, CISSP or similar certification
About Business Unit
IBM Systems helps IT leaders think differently about their infrastructure. IBM servers and storage are no longer inanimate - they can understand, reason, and learn so our clients can innovate while avoiding IT issues. Our systems power the world’s most important industries and our clients are the architects of the future. Join us to help build our leading-edge technology portfolio designed for cognitive business and optimized for cloud computing.
Your Life @ IBM
In a world where technology never stands still, we understand that, dedication to our clients success, innovation that matters, and trust and personal responsibility in all our relationships, lives in what we do as IBMers as we strive to be the catalyst that makes the world work better.
Being an IBMer means you’ll be able to learn and develop yourself and your career, you’ll be encouraged to be courageous and experiment everyday, all whilst having continuous trust and support in an environment where everyone can thrive whatever their personal or professional background.
Our IBMers are growth minded, always staying curious, open to feedback and learning new information and skills to constantly transform themselves and our company. They are trusted to provide on-going feedback to help other IBMers grow, as well as collaborate with colleagues keeping in mind a team focused approach to include different perspectives to drive exceptional outcomes for our customers. The courage our IBMers have to make critical decisions everyday is essential to IBM becoming the catalyst for progress, always embracing challenges with resources they have to hand, a can-do attitude and always striving for an outcome focused approach within everything that they do.
Are you ready to be an IBMer?
About IBM
IBM’s greatest invention is the IBMer. We believe that through the application of intelligence, reason and science, we can improve business, society and the human condition, bringing the power of an open hybrid cloud and AI strategy to life for our clients and partners around the world.
Restlessly reinventing since 1911, we are not only one of the largest corporate organizations in the world, we’re also one of the biggest technology and consulting employers, with many of the Fortune 50 companies relying on the IBM Cloud to run their business.
At IBM, we pride ourselves on being an early adopter of artificial intelligence, quantum computing and blockchain. Now it’s time for you to join us on our journey to being a responsible technology innovator and a force for good in the world.
Location Statement
IBM offers a competitive and comprehensive benefits program. Eligible employees may have access to:
Healthcare benefits including medical & prescription drug coverage, dental, vision, and mental health & well being
- Financial programs such as 401(k), the IBM Employee Stock Purchase Plan, financial counseling, life insurance, short & long- term disability coverage, and opportunities for performance based salary incentive programs
Generous paid time off including 12 holidays, minimum 56 hours sick time, 120 hours vacation, 12 weeks parental bonding leave in accordance with IBM Policy, and other Paid Care Leave programs. IBM also offers paid family leave benefits to eligible employees where required by applicable law
Training and educational resources on our personalized, AI-driven learning platform where IBMers can grow skills and obtain industry-recognized certifications to achieve their career goals
Diverse and inclusive employee resource groups, giving & volunteer opportunities, and discounts on retail products, services & experiences
The compensation range and benefits for this position are based on a full-time schedule for a full calendar year. The salary will vary depending on your job-related skills, experience and location. Pay increment and frequency of pay will be in accordance with employment classification and applicable laws. For part time roles, your compensation and benefits will be adjusted to reflect your hours. Benefits may be pro-rated for those who start working during the calendar year.
We consider qualified applicants with criminal histories, consistent with applicable law.
Sr Manager Product Security
Palo Alto Networks
Santa Clara, CA
Hybrid remote
$175,600 - $284,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$175,600 - $284,000 a year
Job Type
Full-time
Benefits
Pulled from the full job description
· RSU
Company Description
Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.
FLEXWORK is an employee-centric reimagining of how we work. We built FLEXWORK based on employee feedback – it is about flexibility, trust, and choice whenever possible. It’s been a journey of disruption that has yielded the best of our values. We offer as much flexibility as possible, and choices that enable you to be most productive, including benefits that meet your needs and learning opportunities that you feel passionate about.
Our Approach to Work
At Palo Alto Networks, we believe in the power of collaboration and value in-person interactions. This is why our employees generally work from the office three days per week, leaving two days for choice and flexibility to work where you feel most effective. This setup fosters casual conversations, problem-solving, and trusted relationships. While details may evolve, our goal is to create an environment where innovation thrives, with office-based teams coming together three days a week to collaborate and thrive, together!
Job Description
Your Career
Developing industry-leading security tools is tough, and ensuring they are built securely is just as tough, especially when operating at scale. It takes a lot of effort, coordination, and often custom tooling on top of the already industry-leading tools that are used to secure some of the largest companies in the world.
With this position, you will be leading the team for the company's Product Security AI Security team for the Information Security (InfoSec) team itself. The Product Security Team is looking for driven individuals who know how to collaborate within our team, and with all of the other amazing teams in Palo Alto Networks. As the manager you will work closely with other leaders to coordinate priorities and efforts between requests from other teams, needs for the Product Security AI Security teams, and general improvements for all InfoSec teams.
Your Impact
Lead and build AI Security practice
Take ownership of the AI Security initiative
Ability to understand and implement security use cases using Generative AI or AI technologies
Implement security measures for AI and ML systems, models, and methodologies across the entire AI lifecycle
Understanding of Generative AI technologies, LLMs, Embeddings, Data pipelines, Natural Language Processing (NLP), Deep learning (DL)
Evangelize and lead the adoption of AI security best practices - You’re someone that possesses strong knowledge of AI security and wants to help people apply it
Secure AI models’ deployments
Products/Tools Design & Development
Build vs Buy Research and Evaluation
Take ownership and lead the AI Security programs
Partner with product teams to design a secure AI and data pipeline architecture
Solve Unique Problems!
Design solutions for real AI Security problems that are only seen at our scale
Provide real time feedback to product teams to identify feature gaps and influence the development of Palo Alto’s products themselves
Qualifications
Your Experience
5+ years of experience in leading security engineering roles at large organizations or innovative startups
Experience in AI offerings of GCP, AWS and Azure
Experience with one of the LLM providers such as OpenAI, Anthropic, Stability, Llama, etc.
Knowledge of security best practices and secure architectures related to AI/ML services
Knowledge of software and cloud security lifecycle deployment and security automation frameworks in GCP, AWS and/or Azure
Demonstrated track record of success
Effective written and oral communication with multiple levels of leadership involving both the business and technical sides of the business
Education
Bachelor's degree from four-year college or university or equivalent training, education, and experience in information / cyber security, computer systems, IT, etc. or equivalent military experience required
Additional Information
The Team
Serious mission, fun culture; We’re not your ordinary Information Security team. We’re a diverse group of security professionals that embraces challenging the status quo in order to protect Palo Alto Networks and our customers. They say it’s the people you work with that make you want to go to work and it’s true here; we love our work.
Think about it: Driving innovation on the Information Security team of the fastest-growing high-tech cybersecurity company is a once in a lifetime opportunity. You’ll be joined by the brightest minds in technology, and our global teams are on the front line of defense against cyberattacks.
We’re joined by one mission – but driven by the impact of that mission and what it means to protect our way of life in the digital age. Join a dynamic and fast-paced team that feels excitement at the prospect of a challenge and feels a thrill every time we beat the bad guys.
We hope to meet you soon!
Our Commitment
We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $175,600/yr to $284,000/yr. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here
US Federal Deposit Insurance Corporation
Washington, DC
$170,779 - $250,000 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$170,779 - $250,000 a year
Job Type
Full-time
Exercises discretion and independent judgment as an IT program manager and a technical expert that provides guidance regarding the facilitation, development, and technical evaluation of the Continuous Diagnostics & Mitigation (CDM) program, including policies, procedures, or supporting documentation for identifying new or emerging information technology and the ever evolving threat landscape.
Independently identifies and develops comprehensive Corporate IT and cybersecurity policies and procedures to execute the effective management of current and/or emerging technologies of CDM program covering on-premise, cloud computing and hybrid environments.
Serves as a subject-matter and technical expert regarding the development, direction, and ongoing update of the FDIC technology and information security design and delivery and compliance with Cybersecurity strategies, programs, and plans that lay the foundation for building the future IT environment, and ensures efforts are coordinated with FDIC's business plans.
Develops strategies, utilizing various analytical techniques, to achieve Corporate and FDIC business goals.
Communicates complex functional and technical requirements, issues, and problems to both technical and non-technical personnel; manages briefings to senior executive management on assigned functional areas and issues that are complex or controversial.
Registration with the Selective Service.
U.S. Citizenship is required.
Employment Conditions.
Completion of Financial Disclosure may be required.
Background Investigation (BI) required.
Qualifying experience may be obtained in the private or public sector. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g. Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic, religious spiritual; community; student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience. Additional qualifications information can be found here.
To qualify, applicants must have completed at least one year of specialized experience equivalent to at least the grade 14 level or above in the Federal service. Specialized experience is defined as:
Specialized experience is defined as experience (1) managing information security initiatives or programs; (2) defining roadmaps, strategies, and maturity and governance models based on the interpretation of cybersecurity mandates, policies and requirements; and (3) testing and evaluating IT internal controls for compliance with regulatory and statutory requirements for an IT organization.
You must have Information Technology (IT)-related experience which demonstrates proficiency in each of the following competencies:
Attention to Detail - Is thorough when performing work and conscientious about attending to detail.
Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.
Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.
Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
There is no substitution of education for the experience for this position.
Selectee(s) for this position will be required to report to their duty station office 3 days per week beginning January 1, 2024.
Salary reflects a pay cap for this position of $250,000.
If selected, you may be required to serve a probationary period.
To read about your rights and responsibilities as an applicant for Federal employment, click here.
Additional selections may be made from this vacancy announcement to fill identical vacancies that occur subsequent to this announcement.
· Benefits
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
In addition to the regular benefits offered by Federal agencies, the FDIC offers additional benefits to its employees. These benefits, some at minimal cost, are some of the best and most competitive in both the private and public sectors.
To find out more, click here.
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
You will be evaluated for this job based on how well you meet the qualifications above.
This is a Direct-Hire Public Notice. Applications will be accepted for the location identified in the public notice. Veteran’s preference and traditional rating and ranking of applicants DO NOT apply to positions filled under this public notice.
All complete applications (transcripts must be included, if applicable) will be verified for eligibility requirements and will be submitted to the hiring official upon request.
https://www.opm.gov/policy-data-oversight/hiring-information/direct-hire-authority/#url=Governmentwide-Authority
Upon the submission of your application package to USAJobs.gov, you will receive an automatic reply informing you that your application has been submitted, received and is being processed. If you provided an email address, you will receive an email message acknowledging the receipt of your application. Your application will remain active through the open period of this Public Notice. You will not receive any additional notifications, and your resume may not be reviewed for qualifications unless a position is requested to be filled by the hiring official. After you submit your application, you will be contacted only if further evaluation or interviews are required or upon your selection.”
If requested by Management, your application will be reviewed to determine whether you meet the qualification requirements outlined in this announcement. Therefore, it is imperative that your resume contain sufficiently detailed information upon which to make the qualification determination. Please ensure that your resume contains specific information such as position titles, beginning and ending dates of employment for each position, average number of hours worked per week, and if the position is/was in the Federal government, you should provide the position series and grade level.
You do not need to respond separately to these KSAs, information contained in your resume will serve as responses to the KSAs.
Knowledge of laws and regulations that are relevant to cybersecurity and privacy disciplines.
Skill in applying the principles, concepts, methods, standards and practices in IT, cybersecurity and privacy policy, planning to develop and interpret policies, procedures, and strategies governing the planning and delivery of services.
Ability to apply principles, concepts, techniques, methods, and requirements of organizational performance analysis and evaluation to information technology and security programs and initiatives.
Ability to communicate orally to present technical advice, guidance, and recommendations on critical IT issues.
Ability to collaborate, establish, and maintain relationships and partnerships with stakeholders within and outside the organization.
You may preview questions for this vacancy.
· Benefits
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new windowLearn more about federal benefits.
In addition to the regular benefits offered by Federal agencies, the FDIC offers additional benefits to its employees. These benefits, some at minimal cost, are some of the best and most competitive in both the private and public sectors.
To find out more, click here.
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
· Required Documents
As a new or existing federal employee, you and your family may have access to a range of benefits. Your benefits depend on the type of position you have - whether you're a permanent, part-time, temporary or an intermittent employee. You may be eligible for the following benefits, however, check with your agency to make sure you're eligible under their policies.
Failure to provide all of the required documentation as stated in this vacancy announcement, may result in an ineligible determination or may affect your consideration status. Please review the following to determine your eligibility and which document(s) is required to complete your application.
INTERAGENCY TRANSITION ASSISTANCE PROGRAM (ICTAP): If you are a displaced Federal employee eligible for consideration under ICTAP, you must submit proof of eligibility. For more information, click here
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
· How to Apply
To begin, click the “Apply” button and follow the prompts. If you haven’t already, register and establish a USAJOBS account. After you register online, click the “Apply” button to complete the online assessment questionnaire, and submit all required documents. Please be sure to click “Submit Application” to complete the application process. You must apply online.
Applicants requesting an exception from the online process must contact the Human Resources Specialist or point of contact listed in this announcement prior to 12:00 noon local time on the closing date.
To return to your saved application, log in to your USAJOBS account and click on “Applications” tab. Click on the “Position Title,” and then select “Update Application” or “Additional Application Information” to continue.
You have until 11:59 p.m. ET (Eastern Time) on the closing date of this announcement to complete the application process.
Please ensure you have completed the application process by verifying the status of your application on-line to reflect: “Received”. Failure to complete the application process will result in an incomplete application and you will not be considered for the position.
Phone
678-916-2320
TDD
1-800-925-4816
Fax
000-000-0000
shasanders@fdic.gov
Address
Federal Deposit Insurance Corporation
FDIC Human Resources Branch
3501 Fairfax Drive
HRB (PA-1730-5007)
Arlington, Virginia 22226
United States
You may check the status of your application on-line 24 hours a day, 7 days a week through USAJOBS by signing in and selecting "Application Status." Thank you for your interest in working for the Federal Deposit Insurance Corporation.
· Fair and Transparent
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
Equal Employment Opportunity (EEO) Policy
Reasonable accommodation policy
Financial suitability
Selective Service
New employee probationary period
Signature and false statements
Privacy Act
Social security number request
Failure to provide all of the required documentation as stated in this vacancy announcement, may result in an ineligible determination or may affect your consideration status. Please review the following to determine your eligibility and which document(s) is required to complete your application.
INTERAGENCY TRANSITION ASSISTANCE PROGRAM (ICTAP): If you are a displaced Federal employee eligible for consideration under ICTAP, you must submit proof of eligibility. For more information, click here
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
Help
· The public
U.S. Citizens, Nationals or those who owe allegiance to the U.S.
Clarification from the agency
All United States Citizens. This is a Direct-Hire Public Notice.
Chief Information Security Officer
Chemonics
Remote
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Benefits
Pulled from the full job description
· 401(k)
· Dental insurance
· Employee stock ownership plan
· Health insurance
· Paid time off
· Vision insurance
The protection of your personal data is important to Chemonics. Please review the Chemonics Data Privacy Policy. And, if you are located in the UK, please read our EU Recruiting Data Privacy Notice to learn how we process your personal data.
Chemonics International is seeking a Chief Information Security Officer within the Global Technology Infrastructure Division. The Chief Information Security Officer (CISO) is responsible for implementing and running the enterprise information security and service management programs. The CISO is responsible for establishing and maintaining the information security program to ensure that information assets and associated technology, applications, systems, infrastructure and processes are adequately protected. They are also responsible for establishing and running the information security service management program, working on business proposals and hiring contractors as needed to support the business projects. The CISO will work with executive management to determine acceptable levels of risk for the organization and proactively work with others to implement practices that meet agreed-on policies and standards for information security. They will be knowledgeable about both internal and external business environments and ensure that information systems are maintained in a fully functional and secure mode and are compliant with legal, regulatory and contractual obligations. The CISO will serve as a thought leader, a builder of consensus and of bridges between business and technology. They will coordinate disparate drivers, constraints and personalities, while maintaining objectivity and a strong understanding that cybersecurity is foundational for Chemonics to deliver on its business goals and objectives. Additionally, the CISO will report directly to the CIO.
Principal Duties and Responsibilities (Essential Functions):
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Creates, manages, and leads the company’s information security structure (Hiring staff as needed in missing areas
Implements Chemonics information security vision, strategy, and three year roadmap that is aligned to Chemonics Business and IT strategies, enables Chemonics' business objectives, and ensures senior stakeholder buy-in and mandate
Delivers and monitors Chemonics strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy and recovery of information assets owned, controlled or/and processed by Chemonics
Ensures that the cybersecurity requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture
Provides as needed information security directions, guidance and support in the realization of business contracts
Works to ensure that information security requirements are included in contracts by liaising with compliance and procurement departments
Provides regular reporting on the current status of the information security program to enterprise risk teams senior business leaders, and the board
Facilitates an enterprise information security governance structure including enterprise rules and standards for interoperability between Corporate and the local business offices
Develops, socializes and coordinates approval and implementation of security policies
Directs the creation of a targeted information security awareness training program and establishes metrics to measure the effectiveness of this security training program for the different audiences
Provides clear risk mitigating directives for projects with components in IT, including the mandatory application of controls
Leads the information security function across the company to ensure consistent and high-quality information security management in support of the business goals
Determines the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas
Manages the budget for the information security function, monitoring and reporting discrepancies
Manages cost efficiently the information security team
Works effectively with business units to facilitate information security risk assessment and risk management processes, and empowers them to own and accept the level of risk they deem appropriate for their specific risk appetite
Develops and enhances an up-to-date information security management framework
Creates and manages a unified and flexible, risk-based control framework to integrate and normalize the wide variety and ever-changing requirements resulting from global laws, standards and regulations
Develops and maintains a document framework of continuously up-to-date information security policies, standards and guidelines. Oversees the approval and publication of these information security policies and practices
Creates a framework for roles and responsibilities about information ownership, classification, accountability and protection of information assets
Facilitates a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitates appropriate resource allocation, and increases the maturity of the information security, and reviews it with stakeholders at the executive and board levels
Provides input for the IT section of the company's code of conduct
Creates the necessary internal networks among the information security team and line-of-business executives, corporate compliance, audit, physical security, legal and HR management teams to ensure alignment as required
Builds and nurtures external networks consisting of industry peers, ecosystem partners, vendors and other relevant parties to address common trends, findings, incidents and cybersecurity risks
Liaises with external agencies, such as law enforcement and other advisory bodies, as necessary, to ensure that the organization maintains a strong security posture and is kept well-abreast of the relevant threats identified by these agencies
Creates a risk-based process for the assessment and mitigation of any information security risk in the ecosystem consisting of supply chain partners, vendors, consumers and any other third parties
Works with other compliance staff to ensure that all information owned, collected or controlled by or on behalf of the company is processed and stored in accordance with applicable laws and other global regulatory requirements, such as data privacy
Collaborates and liaises with the data privacy officer to ensure that data privacy requirements are included where applicable
Defines and facilitates the processes for information security risk and for legal and regulatory assessments, including the reporting and oversight of treatment efforts to address negative findings
Ensures that security is embedded in the project delivery process by providing the appropriate information security policies, practices and guidelines
Manages and contains information security incidents and events to protect corporate IT assets, intellectual property, regulated data and the company's reputation
Monitors the external threat environment for emerging threats, and advises relevant stakeholders on the appropriate courses of action
Develops and oversees effective disaster recovery policies and standards to align with the enterprise business continuity management
Coordinates the development of implementation of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event; provides direction, support and in-house consulting in these areas
Facilitates and supports the development of asset inventories, including information assets in cloud services and in other parties in the organization's ecosystem
Qualifications:
To perform this job successfully, an individual must be able to perform each essential duty and responsibility satisfactorily. The qualifications listed below are representative of the required knowledge, skills, and/or abilities needed to perform the principal duties.
Past experience implementing cyber security in Network, End Point protection, Cloud security, AD/ Access Management highly required
Expert level understanding of the Microsoft security solution
Prior experience working for a US government contractor is a plus
Expert at Data Security including string knowledge of encryption, data labeled and marked ( right controls), sensitivity of the data.
More than 15 years of relevant experience, including five years in a leadership role
Demonstrated leadership, versatility and integrity
Managed multiple direct reports and team teams, multiple projects and/or portfolio of projects
Established key elements of tactical and operational plans, with a focus on short-to mid-term operational plans (1-3 years)
Demonstrated broad management knowledge to lead project teams in one department
Demonstrates Master knowledge and skills in Information Security
Developed budgets, schedules and performance requirements
Demonstrated experience and success in leadership roles in risk management, information security, and information technology security
Degree in a technology-related field
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or other similar credentials preferred
Knowledge and understanding of relevant cybersecurity legal and regulatory requirements, such as GDPR and Health Insurance Portability and Accountability Act (HIPAA)
Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework
Sound knowledge of business management and a working knowledge of information security risk management and cybersecurity technologies
Experience with contract and vendor negotiations
Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate information security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists
Strategic leader and builder of both vision and bridges, and able to energize the appropriate teams
Excellent stakeholder management skills
Excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
Project management skills including financial/budget management, scheduling and resource management
A master of influencing entities and decisions in situations where no formal reporting structures exist, but achieving the desirable outcome is vital
Poise and ability to act calmly and competently in high-pressure, high-stress situations
High degree of initiative, dependability and ability to work with little supervision while being resilient to change
High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
A critical thinker, with strong problem-solving skills
Excellent writing skills and strong experience writing information security documents and reports
Strong problem-solving and trouble-shooting skills
Self-motivated and possessing of a high sense of urgency and personal integrity
Excellent communication skills and strong experience facilitating events or training
Physical Requirements:
Regular attendance and availability during normal Chemonics Washington business hours are required
Ability to work in a normal office environment
Occasionally lift and/or move up to 25 pounds
Work Conditions:
Normal office environment; usually moderate noise level
Occasional exposure to environmental conditions include exposure to hot, cold, wet, humid, or windy conditions caused by the weather
Ability to travel and work abroad in less developed countries for at least 4 to 8 weeks a year
Equal Employment Opportunity
Chemonics is an equal opportunity/Affirmative Action employer and does not discriminate in its selection and employment practices. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, political affiliation, sexual orientation, gender identity, marital status, disability, protected veteran status, genetic information, age, or other legally protected characteristics. Military veterans, AmeriCorps, Peace Corps, and other national service alumni are encouraged to apply.
Pay Transparency Nondiscrimination Provision
Chemonics will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by Chemonics, or (c) consistent with Chemonics legal duty to furnish information. 41 CFR 60-1.35(c)
The Salary Range for this position is expected to be: $155,850 - $194,810.
An employee’s pay position will be based on several factors including, but not limited to, relevant education, qualifications, certifications, experience, skills, seniority, performance, shift, travel requirements, and business or organizational needs.
We offer comprehensive package of benefits including paid time off, medical/dental/vision insurance, ESOP, 401(k), and other benefits to eligible to US based employees. Please visit https://chemonics.com/life-at-chemonics/our-benefits/ to find out more about the benefits this position is eligible for.
Cloud Security Engineer
Connecting Experts
Washington, DC
You must create an Indeed account before continuing to the company website to apply
Apply on company site
RESPONSIBILITIES:
Provide technical support for responding to and implementing recommendations of the Office of Inspector General and Internal Controls/Internal Audit
Work with architects and developers to design optimal security practices when developing new systems, networks, and application functionality
Provide technical guidance in the development and revision of House solutions that incorporate Cloud technologies. Also provide risk management guidance and advisement to CAO teams for emerging technologies to include new cloud, mobile and desktop application work products
Assess technology architecture, implementation, and fit for the House to identify risk. In order to gather product security features, analyse vulnerabilities and weaknesses, and make implementation recommendations to Senior Management, this may necessitate interaction with vendors
Offer analysis and reporting on the cloud services currently being used by the House, covering high-risk services, data utilisation, and threats
Document existing systems architecture and technology portfolio, with a focus on the continuous improvement
QUALIFICATIONS:
Bachelor’s degree in a related field with (5) years of experience in Information Technology, Cybersecurity, or a related field
Knowledge of other common industry cyber security standards and organizational best practices
Knowledge of common cyber security technical controls and their application to cloud systems, such as access control, audit and accountability, configuration management, identification and authentication, system and communication protection, and system and information integrity
Understanding of basic information technology concepts, systems, and network architecture
Experience with cloud architectures (e.g., SaaS, PaaS), common commercial cloud systems (e.g., Google Workspace, Microsoft 365, AWS, Oracle) and cloud security solutions (e.g., Cloud Access Security Broker, Multi-factor Authentication, Zero Trust Architecture)
3-5 years of experience implementing or supporting cloud-based cyber security
Awareness of current cyber security threats and vulnerabilities
Sr. Manager, Information Security
Super Micro Computer
San Jose, CA 95131
$177,600 - $224,400 a year
You must create an Indeed account before continuing to the company website to apply
Apply on company site
JobCompany
Job Req ID: 22659
About Supermicro:
Supermicro® is a Top Tier provider of advanced server, storage, and networking solutions for Data Center, Cloud Computing, Enterprise IT, Hadoop/ Big Data, Hyperscale, HPC and IoT/Embedded customers worldwide. We are the #5 fastest growing company among the Silicon Valley Top 50 technology firms. Our unprecedented global expansion has provided us with the opportunity to offer many new positions to the technology community. We seek talented, passionate, and committed engineers, technologists, and business leaders to join us.
Job Summary:
The Senior Manager of Information Security in IT is responsible for leading and overseeing an organization's information security program. This includes developing and implementing strategies, policies, and procedures to protect the company's information assets, systems, and networks from potential threats and cyber-attacks. The role involves conducting security risk assessments, enforcing security controls, and coordinating incident response efforts. The ideal candidate should have a strong background in information security, risk management, and leadership skills. They will work closely with cross-functional teams and senior management to ensure compliance with security standards and promote a security-conscious culture. Advanced certifications and relevant experience in information security management will be good for this position.
Essential Duties and Responsibilities:
Includes the following essential duties and responsibilities (other duties may also be assigned):
Overseeing and managing an organization's security initiatives to protect its assets, employees, and stakeholders
Security Strategy: Develop and implement a comprehensive security strategy aligned with the IT organization's goals and risk profile
Policy and Procedure Development: Establish and enforce security policies, procedures, and guidelines to ensure compliance with industry standards and regulations
Risk Assessment: Conduct regular risk assessments to identify potential security vulnerabilities and develop mitigation plans
Incident Management: Lead the response to security incidents, coordinating efforts to minimize the impact and recover from any breaches
Physical Security: Implement measures to safeguard the organization's physical assets and facilities, including access controls and surveillance systems
Cybersecurity: Oversee the deployment of cybersecurity measures to protect information systems, networks, and data from cyber threats
Personnel Security: Ensure the organization follows appropriate practices for security training, and awareness programs
Resource Management: Manage the staffing, and resource allocation efficiently
Compliance: Ensure adherence to relevant security laws, regulations, and industry standards
Vendor Management: Oversee security-related vendors and service providers to ensure they meet security requirements
Security Awareness: Promote a security-aware culture throughout the organization through training and education initiatives
Business Continuity Planning: Develop and test business continuity and disaster recovery plans to ensure the organization's ability to respond to disruptions effectively
Reporting: Provide regular reports to senior management on security incidents, risks, and the overall effectiveness of security measures
Security Audits: Collaborate with internal and external auditors to conduct security assessments and address any findings
Emerging Threats and Technologies: Stay informed about the latest security trends, technologies, and threats to continuously improve the organization's security posture
Qualifications:
Bachelor's or Master's degree in engineering discipline or relevant field preferred
Minimum of 12 years’ experience in IT industry, with 6 years in management is highly desired
Strong leadership and communication skills to lead a security team and collaborate effectively with cross-functional teams and senior management
Strong analytical and problem-solving abilities to address complex security challenges
Extensive experience in security management, with a proven track record of implementing and overseeing security programs
Advanced certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA) is a plus
In-depth knowledge of information security standards, frameworks, and best practices (e.g., ISO 27001, NIST, CIS Controls)
Solid understanding of networking, systems, and information security principles
Solid project management skills to manage multiple initiatives simultaneously
Salary Range
$177,600 - $224,400
The salary offered will depend on several factors, including your location, level, education, training, specific skills, years of experience, and comparison to other employees already in this role. In addition to a comprehensive benefits package, candidates may be eligible for other forms of compensation, such as participation in bonus and equity award programs.
The Swift Group
Reston, VA
Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Job Type
Full-time
Manage multiple projects throughout Authorization and Accreditation (A&A) process from concept to Authority to Operate (ATO) and Coordinate with system stakeholders on mitigating system vulnerabilities outlined in POA&Ms
Experience maintaining security posture of sponsor compute environments, including cloud environments
Experience managing the full lifecycle of, and workflows for, security accreditation products under the ICD503 Rev 4 Framework
Extensive knowledge of Sponsor’s information system security policies, and risk management framework
Experience creating and maintaining security system plans and other security relevant documentation for computer systems and applications
Maintain operational security posture for system(s) through customized Risk Management Framework (RMF) to ensure established security processes and procedures are followed
Strong knowledge of AWS infrastructure, Commercial cloud and cloud security
Evaluate security solutions to ensure security requirements are met for processing classified information
Provide configuration management and documentation for system software, hardware, networks, enclaves, etc.
Prepare and review system documentation to include Systems Security Plans (SSPs), Certification and Accreditation (C&A) packages, architecture diagrams, contingency plan, incident response plan, and other documentation
Support programmatic and organization project and risk management review boards• Perform vulnerability scanning, risk assessment analysis using NIST 800-53 and prepare responses to Plan of Action and Milestones (POA&Ms)
Understanding of NIST 800-53, NIST 800-37, RMF, ICD 503
Strong written and oral communication skills to write technical analysis reports and security plans
Demonstrated ability to effectively engage with Sponsor ISSMs to ensure security compliance of systems
Experience obtaining IC reciprocity for at least one security accreditation project
iC-1 Solutions LLC. is a wholly owned subsidiary of The Swift Group. The Swift Group is a privately held, mission-driven and employee-focused services and solutions company headquartered in Reston, Virginia. Founded in 2019, The Swift Group supports Civilian, Defense, and Intelligence Community customers, across the country and around the globe.
The Swift Groups is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Senior Cloud Security Engineer
Arvest Bank
United States
$139,560 - $165,718 a year - Full-time
You must create an Indeed account before continuing to the company website to apply
Apply on company site
Job details
Here’s how the job details align with your job preferences.Manage job preferences anytime in your profile.
Pay
$139,560 - $165,718 a year
Job Type
Full-time
Shift and Schedule
Monday to Friday
Benefits
Pulled from the full job description
· Health insurance
Position is Monday through Friday from 8 am to 5 pm with the ability to work additional hours as project needs demand.
Incumbent can be located anywhere within the Arvest 4 State Footprint (AR, KS, MO, OK). Remote work options may be available outside of the 4-state footprint upon further review during the interview process.
Pay is based on a number of factors including the successful candidate’s job-related knowledge and skills, qualifications, and prior experience. Arvest offers a comprehensive suite of benefits, including a full range of health and life, financial, and wellness benefits. For more information about benefits, please visit www.arvest.com/careers/benefits .
Summary:
The story of Arvest is one of commitment started by our founders in 1961, with an intense dedication to focusing on our customers. We will always be active and involved members of the communities we serve, and we will always work to put the needs of our customers first as we continue to fulfill our mission – People helping people find financial solutions for life.
Job Title: Senior Cloud Security Engineer
The Senior Cloud Security Engineer at Arvest is a senior-level role in Information Security that helps secure enterprise information and systems by determining security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures; and mentoring team members. They facilitate and drive architectural planning and execution in all aspects of cloud security and related technology in the environment and is considered as a key resource for driving change through technical solutions. A Senior Cloud Security Engineer will help transform the organization from an on-premises banking model into the cloud and engages directly with engineers and software developers to understand their needs.
We are seeking candidates who embrace diversity, equity, and inclusion in a workplace where everyone feels valued and inspired.
What You’ll Do at Arvest: (Other duties may be assigned.)
• Design, create, and execute security controls to identify, protect, detect, and respond to risks against the Arvest cloud.
• Configure and maintain tooling to assess vulnerabilities/risks that could affect the integrity, availability, or confidentiality of data, systems, or services in the cloud.
• Develop and maintain cloud security architecture processes and artifacts that enable the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, and threat drivers.
• Oversee the development of baseline security configuration standards for cloud and related technologies.
• Provide standards and practices for data encryption and tokenization in the organization, based on the organization's data classification criteria; securely migrates those to a cloud environment.
• Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs, and anti-malware/endpoint protection systems.
• Ensure a complete, accurate, and valid inventory of all systems, infrastructure, and applications that should be logged by Security Information and Event Management (SIEM) or log management tool.
• Review network segmentation to ensure least privilege for network access.
• Collaborate with the business continuity management (BCM) team to validate security practices for BCM testing and operations when a failover occurs.
• Track developments and changes in the digital business and threat environments to ensure that they’re adequately addressed.
• Participate in application and infrastructure projects to provide security planning advice.
• Serve as the primary liaison between the Enterprise Architects and the Systems Security Engineers and coordinate with product family owners on the allocation of security controls.
• Work closely with business and IT to monitor and improve Arvest’s cloud privacy and security controls.
• Participate in cybersecurity and business-related councils or working groups, as needed.
• Identify security design gaps in existing and proposed architectures and recommends changes or enhancements.
• Understand and comply with bank policy, laws, regulations, and the bank's BSA/AML Program, as applicable to your job duties. This includes but is not limited to; complete compliance training and adhere to internal procedures and controls; report any known violations of compliance policy, laws, or regulations and report any suspicious customer and/or account activity.
Supervisory Responsibilities
Carries out supervisory responsibilities in accordance with the organization’s policies and applicable laws.
Responsibilities:
Toolbox for Success:
• Bachelor's Degree in Information Systems or a Technology related field of study, or equivalent work or military experience, required.
• 10 years of experience working in Cyber Security or a related field of work, required.
• Experience working with, and preferably leading, a cross functional team, required.
• Broad range of experience with:
Analyzing threats of cloud and application components.
Data security and governance.
Development, scripting languages, and IAC (Java, Javascript/Typescript, Python, PHP, Terraform).
SaaS, IaaS, and PaaS models
• Knowledge of current and emerging security technologies, threats, and techniques for exploiting security vulnerabilities in the code or application.
• Understanding of security by design principles, architecture level concepts, security frameworks (NIST and PCI), OWASP, etc.
• Relevant military experience is considered for veterans and transitioning service members
Preferred Experience:
Experience in OWASP Top 10, CVE/CVSS research and/or bug bounty recognition.
Security certifications such as CISSP, CASE, CASS, CSSLP, CEH or equivalent.
Knowledge of fuzzing, memory corruption and exploit development.
Ability to clearly communicate gaps and risks to leadership through verbal dialogue or written communication.
Demonstrable teamwork skills and ability to partner in difficult situations.
Ability to be proactive in a rapidly changing environment.
Sharp analytical abilities and proven design skills.
Physical Demands:
The associate must be able to travel occasionally by themselves within the US, possibly overnight. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform the essential functions.
We offer competitive compensation, benefits packages, and significant professional growth.
Along with an excellent benefits package, our associates are engaged, rewarded for performance, and encouraged to grow professionally and personally. Our future is driven by our associates. If you want to be recognized for your results and empowered to reach your potential, we urge you to apply.
Grade 19I
Pay Range: $139560 - $165718 per year