Information Security Engineer - Black Lotus Labs Threat Researcher (Crimeware)
Sacramento, CA jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Security Engineer on the Research & Analysis team to specialize in Threat Research with an emphasis on the Crimeware and Ransomware ecosystem, proactively identifying and disrupting adversary infrastructure. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**Location**
This is a remote position open to candidates based anywhere in the U.S.
**The Main Responsibilities**
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Fluency in the ransomware attack chain, adversary TTPs, and detection techniques with an emphasis on detections of adversary infrastructure using network telemetry.
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages) on distributed computing frameworks.
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience developing threat research thought leadership such as blogs and presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
Well-experienced candidates may also have the following skills:
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA
\#GSS
\#LI-MG1
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
Requisition #: 340001
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
SAP Architect
Memphis, TN jobs
Job Title: SAP Architect Type: Direct Hire Compensation: $120000 - $150000 annually Contractor Work Model: Remote Hours: M-F (8-5), some evening and weekend work may be required Successful candidates must be able to provide proof of ability to work in the U.S. without sponsorship. This position is not open to corp-to-corp, subcontractor or independent consulting arrangements.
System One has partnered with a nationwide manufacturing company with locations in Memphis, Tennessee. The company is seeking to add a valued SAP Architect to their technical team.
This organization is implementing SAP and seeking a qualified individual who has experience working with various modules of SAP pertaining to finance, production, quality management, and material management. This individual will provide technical functional expertise as they continue implementing the SAP system across all sites.
The opportunity is a permanent, full-time role allowing remote work. Some travel is necessary.
The organization offers extensive benefits and a retirement package that is very competitive in today's market.
System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.
System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.
#M-
#LI-
#DI-
Ref: #208-Rowland Tulsa
System One, and its subsidiaries including Joulé, ALTA IT Services, CM Access, TPGS, and MOUNTAIN, LTD., are leaders in delivering workforce solutions and integrated services across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible full-time employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.
System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.
SAP Application Security Configurator - Onsite in Aberdeen, MD
Aberdeen, MD jobs
At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations.
Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands-on experience, certifications, industry training and more.
Join us to drive positive, lasting change that moves missions and the government forward!
Job Description
The Application Security Analyst is responsible for the execution of security management practices including designing, developing, implementing, and managing solutions for enterprise SAP applications. The Application Security Analyst will perform security role development for an enterprise.
Role Qualifications:
2+ years SAP experience in Security strategy development and implementation
Experienced in SAP Security solutions to include ECC required with BW, BI/BOBJ, GRC, & PI
Experience in deploying new SAP Security solutions to include system startup, configuration, and upgrades
Ability to interpret ABAP code to identify authorization requirement
Experience managing users and authorization assignments across SAP and supporting systems
Extensive experience with and knowledge of SAP Security related tables and programs
SAP Security + Certification required
Must be local to Aberdeen, MD and willing to work onsite 5 days per week
U.S. Citizenship
Nice to have:
Experience in coordinating multiple SAP Security full life cycle implementations from preparation to go-live and operation
SAP Application Security certification highly preferred
Security Clearance:
Ability to obtain Top Secret clearance
#clearancejobs
(#LI-Platforms)
#LI-Defense
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:$93,400-$176,200 USD
What We Believe
As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on.
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement.
Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an Affirmative Action Employer for Veterans and Individuals with Disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women.
Requesting An Accommodation
Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information.
Auto-ApplyPersonnel Security Specialist, II
Santa Monica, CA jobs
Job Type:
Regular
The Personnel Security Specialist, II is a mid-level position with the Consolidated Personnel Security Center (CPSC). The Personnel Security Specialist, II processes security clearances with the DoD and with DHS, assesses pre-screen to determine if a candidate meets eligibility requirements for access.
Duties and Responsibilities
Conduct pre-screen assessments for Security clearance eligibility for Secret, DHS Fitness, and Top-Secret Security clearances.
Make independent assessments to determine eligibility.
Initiate the requests using eApp for new security clearances and Fitness and for initial clearances, DHS Fitness and periodic updates for DoD and DHS.
Review SF86's for accuracy and return to employees for corrective actions or submit to government for processing.
Verifying individual security clearances in the DISS, Scattered Castles and the DHS databases to ensureclearance investigation is complete and current with the correct information.
Assist with compiling and submitting monthly metrics by direction of Lead or manager.
Follow - up on DCSA and DHS requests for documentation
Assist candidates with completing SF 86 and SF 85 forms
Maintain the SIMS database, create status reports for the FSO's, CSSO's, and leadership as needed.
Communicate with DCSA and DHS representatives on clearance actions and make independent decisions to resolve clearance processing actions.
Ensure policies, procedures, and desk guides are updated and followed.
Produce RAND employee Badges and maintain accountability in SIMS
Grant and remove building accesses in the access control system
Working and closing JIRA tickets as assigned.
Other duties as assigned.
Remain current with emerging technologies, maintaining professional relationships with relevant colleagues and attending occasional technology conferences.
Other duties as assigned.
Education
High School Diploma or GED required.
Associate's degree preferred.
Required Experience, Knowledge and Skills
1+ years of experience required.
Proficiency with Microsoft Office applications.
Excellent written and verbal communication skills.
Familiarity with SIMS, DISS, NBIS (replacing DISS), Scattered Castles SWFT, eApp.
Excellent customer service skills.
Must be able to work independently and make decisions that affect timelines for clearance processing.
Security Clearance
Must meet eligibility requirements for access to U.S. government classified information.
Location
Santa Monica, CA
This position is 100% onsite.
Salary: $64,400-$96,100
RAND considers a variety of factors when formulating an offer, including but not limited to, the specific role and associated responsibilities; a candidate's work experience, education/training, skills, expertise; and internal equity. Successful candidates will be offered employment in a specific title, as determined by the candidate's education and experience. The salary range includes base pay plus RAND's sabbatical pay (which provides additional compensation above base pay when vacation is taken). In addition, RAND provides strong benefits including health insurance coverage, life and disability insurance, savings plan, paid time-off and more.
Equal Opportunity Employer
Auto-ApplyPlatform Architect
Dallas, TX jobs
Benefits:
Company parties
Competitive salary
Dental insurance
Flexible schedule
Hi , I hope you're doing well! My name is prabhu venkatesh , and I'm a recruiter currently seeking a ServiceNow Certified Architect for one of our clients. Based on your background, I believe you could be a great fit for this role.
Role :Platform Architect
Location: Initial 3 Months Remote and willing to relocate to Dallas as per requirement)
looking for the W2 position
Duration:Long term contract
Job Description
As a ServiceNow Certified Architect on our Governance Team, you will be responsible for designing and implementing solutions within the ServiceNow platform, specifically focusing on the Order Management module for the Telecom & Media industry. Your expertise will drive best practices, governance, and data stewardship related to Product Catalog and Product Inventory. This role requires a deep understanding of ServiceNow, excellent communication skills, and the ability to collaborate with cross-functional teams.
Responsibilities:
Solution Design and Governance:
Collaborate with business stakeholders, product managers, and technical teams to understand requirements and translate them into effective ServiceNow solutions.
Design end-to-end solutions that align with industry best practices, ensuring scalability, maintainability, and adherence to architectural standards.
Establish and enforce governance policies related to the Order Management module, emphasizing data quality, security, and compliance.
Product Catalog and Inventory Management:
Lead the design and maintenance of the Product Catalog within ServiceNow.
Define product hierarchies, attributes, and relationships to ensure accurate representation of offerings.
Implement data stewardship practices to maintain the integrity of product data.
Collaborate with stakeholders to enhance the catalog's usability and relevance.
Order Fulfillment Process Optimization:
Analyze existing order fulfillment processes and identify areas for improvement.
Optimize workflows, automation, and orchestration to streamline order processing.
Ensure seamless integration between the Product Catalog, Inventory, and order fulfillment workflows.
Technical Leadership:
Provide architectural guidance to development teams, ensuring alignment with industry standards and best practices.
Mentor junior architects and developers, fostering a culture of continuous learning and growth.
Stay updated on ServiceNow releases, features, and capabilities relevant to the Telecom & Media domain.
Collaboration and Communication:
Work closely with cross-functional teams, including business analysts, developers, testers, and project managers.
Communicate complex technical concepts to non-technical stakeholders effectively.
Participate in project planning, estimation, and execution.
Continuous Improvement:
Monitor ServiceNow Platform performance, identify bottlenecks, and propose enhancements.
Drive continuous improvement initiatives related to the Order Management module.
Participate in ServiceNow community forums and contribute to knowledge sharing.
Qualifications:
ServiceNow Certification:
Certified ServiceNow System Administrator (CSA) and Certified Implementation Specialist (CIS) in ServiceNow IT Service Management (ITSM) or related modules.
ServiceNow Certified Application Architect (CAA) or Certified System Architect (CSA) preferred.
Industry Experience:
Minimum 5 years of experience in ServiceNow architecture, design, and implementation.
Specific experience in Telecom & Media industry processes, especially related to order management.
Technical Skills:
Proficiency in ServiceNow platform capabilities, including workflows, catalog management, and integrations.
Knowledge of REST APIs, JavaScript, and ServiceNow scripting.
Familiarity with data modeling and relational databases.
Communication and Leadership:
Excellent communication skills, both written and verbal.
Ability to lead and influence technical decisions.
Strong problem-solving and analytical abilities.
Education:
Bachelor's degree in computer science, Information Systems, or a related field.
Thank you
*********************
Work remote temporarily due to COVID-19.
Compensation: $50.00 - $55.00 per hour
Who We Are CARE ITS is a certified Woman-owned and operated minority company (certified as WMBE). At CARE ITS, we are the World Class IT Professionals, helping clients achieve their goals. Care ITS was established in 2010. Since then we have successfully executed several projects with our expert team of professionals with more than 20 years of experience each. We are globally operated with our Head Quarters in Plainsboro, NJ, with focused specialization in Salesforce, Guidewire and AWS. We provide expert solutions to our customers in various business domains.
Auto-ApplyPrincipal Information Security Engineer - IS Mod
Rochester, MN jobs
Why Mayo Clinic Mayo Clinic is top-ranked in more specialties than any other care provider according to U.S. News & World Report. As we work together to put the needs of the patient first, we are also dedicated to our employees, investing in competitive compensation and comprehensive benefit plans - to take care of you and your family, now and in the future. And with continuing education and advancement opportunities at every turn, you can build a long, successful career with Mayo Clinic.
Benefits Highlights
* Medical: Multiple plan options.
* Dental: Delta Dental or reimbursement account for flexible coverage.
* Vision: Affordable plan with national network.
* Pre-Tax Savings: HSA and FSAs for eligible expenses.
* Retirement: Competitive retirement package to secure your future.
Responsibilities
The Principal Information Security Engineer on the Incident Response Team is a critical leadership role responsible for overseeing, coordinating, and enhancing the organization's response to cyber threats and security incidents. Leads the technical aspects of incident detection, analysis, containment, eradication, and recovery for information security incidents. Develops and maintains incident response plans, playbooks, and procedures, ensuring alignment with industry best practices and regulatory requirements. Coordinates and drive investigations into suspicious activities, malware attacks, and advanced persistent threats (APTs). Serves as the primary escalation point for complex incidents, providing expert guidance and decision-making during critical events. Collaborates with security operations, threat intelligence, and IT teams to improve detection capabilities and reduce response times. Conducts post-incident reviews, root cause analyses, and lessons-learned sessions to strengthen the organization's security posture. Mentors and trains incident response team members, fostering technical growth and knowledge sharing. Stays current with emerging threats, vulnerabilities, and attack techniques, recommending proactive measures to mitigate risks. Prepares and delivers detailed reports, metrics, and presentations to senior leadership and stakeholders. Technical expertise in incident response and digital forensics. Deep knowledge of cybersecurity frameworks, security technologies, and threat landscape. Proficiency in forensic analysis, malware reverse engineering, and network security monitoring tools. Strong analytical, problem-solving, and communication skills. Strong ethical standards and attention to detail.
The Information Security Principal Engineer acts as an information security liaison to various business units and the Information Technology Department to provide direction, training, and guidance for OIS staff. The Information Security Principal Engineer is considered an expert, leader and mentor; identifying and resolving technology related information security gaps based on the organization's risk posture. Specifically, the Information Security Principal Engineer is knowledgeable, proficient and experienced in:
* Working with business partners across the organization to achieve organizational and OIS goals
* Working collaboratively with team members and other leaders to develop and implement cybersecurity strategy based on industry best practice
* Developing secure network and systems architecture
* Analyzing technology security posture and appropriate use of security defenses
* Matching technical solutions with business requirements and then designing and implementing them;
* Software development, testing, support/problem solving, and overall technology administration;
* Organizational procedures such as the system development lifecycle;
* Use of defensive measures and information to identify, analyze and report security events;
* Researching and understanding pertinent information technology laws, policies and procedures
* Providing direct support for acquiring information security technology and applications
* Applying IT-related laws and policies, and providing IT-related guidance throughout the software acquisition lifecycle
* Collecting and analyzing information to identify vulnerabilities and potential for exploitation
* Managing and administering processes and tools that enable the organization to identify, document, and access intellectual capital and information content
* Executing duties governing hardware, software, and information system acquisition programs and other program management policies
This is a full time, remote position within the United States. Mayo Clinic will not sponsor or transfer visas for this position including F1 OPT STEM.
Qualifications
Master's degree with three (3) years' experience OR Bachelor's degree in Computer Science, Information Systems, Engineering or related major and a minimum five (5) years' experience in the information security field required.The Information Security Principal Engineer also requires the following skills/abilities.
* Understands the use and efficacy of information security tools, server configurations and controls with the ability to install, configure, test and operate them.
* Able to test, implement, deploy, maintain, review and administer the infrastructure hardware and software required to effectively secure the enterprise, protect data, identify and mitigate risks
* Ability to collect, process, preserve, analyze and present computer related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence or law enforcement investigations.
* Provides advanced technical opinions/conclusions re. security tools, trends, and controls which are supported by documented evidence, based on multiple perspectives and leverage of a variety of resources
* Demonstrates a deep and broad knowledge of standard operating procedures, workflows and supporting technology across numerous critical user areas and an in-depth knowledge of multiple computing technologies either being actively used or of significant interest to Mayo; understands how systems fit into larger picture of technology at Mayo.
* Capacity to work independently and willingness to seek advice/assistance.
Must have one of the following certifications (or equivalent) at time of hire.
* CISSP
* GSEC
* CISM
* HCISPP
* OSCP
Exemption Status
Exempt
Compensation Detail
$145,225.60 - $210,558.40 / year
Benefits Eligible
Yes
Schedule
Full Time
Hours/Pay Period
80
Schedule Details
Monday - Friday, 8am - 5pm Weekends and nights as needed with on call responsibilities.
Weekend Schedule
As needed
International Assignment
No
Site Description
Just as our reputation has spread beyond our Minnesota roots, so have our locations. Today, our employees are located at our three major campuses in Phoenix/Scottsdale, Arizona, Jacksonville, Florida, Rochester, Minnesota, and at Mayo Clinic Health System campuses throughout Midwestern communities, and at our international locations. Each Mayo Clinic location is a special place where our employees thrive in both their work and personal lives. Learn more about what each unique Mayo Clinic campus has to offer, and where your best fit is.
Equal Opportunity
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, protected veteran status or disability status. Learn more about the 'EOE is the Law'. Mayo Clinic participates in E-Verify and may provide the Social Security Administration and, if necessary, the Department of Homeland Security with information from each new employee's Form I-9 to confirm work authorization.
Recruiter
Ted Keefe
#LI-Remote
Shriners Children's is an organization that respects, supports, and values each other. Named as the 2025 best mid-sized employer by Forbes, we are engaged in providing excellence in patient care, embracing multi-disciplinary education, and research with global impact. We foster a learning environment that values evidenced based practice, experience, innovation, and critical thinking. Our compassion, integrity, accountability, and resilience define us as leaders in pediatric specialty care for our children and their families.
All employees are eligible for medical coverage on their first day! In addition, upon hire all employees are eligible for a 403(b) and Roth 403(b) Retirement Saving Plan with matching contributions of up to 6% after one year of service. Employees in a FT or PT status (40+ hours per pay period) will also be eligible for paid time off, life insurance, short term and long-term disability and the Flexible Spending Account (FSA) plans and a Health Savings Account (HSA) if a High Deductible Health Plan (HDHP) is elected. Additional benefits available to FT and PT employees include tuition reimbursement, home & auto, hospitalization, critical illness, pet insurance and much more! Coverage is available to employees and their qualified dependents in accordance with the plans. Benefits may vary based on state law.
Job Overview
The Workday Architect serves as the strategic planner and leader for Workday Human Capital Management (HCM), Workday Financials (FDM), Supply Chain, Security, Integration, and Core. This role is responsible for the strategic planning, design, configuration, maintenance, and support to ensure accuracy, compliance, and efficiency across all Workday modules and 3
rd
party applications. As the dedicated owner of configuration, the Architect bridges HR, Finance, Supply Chain Operations, and IS, translating business requirements into sustainable system solutions. This role is critical for ongoing support models, where stability, continuous improvement optimization, and adoption of Workday functionality drive organizational success.
Responsibilities Strategic Planning & Implementation
Develop and execute strategic plans for Workday upgrades and new functionality implementation.
Lead the design and configuration of Workday HCM across Core HCM, Payroll, Absence, Benefits, Compensation, Time Tracking, Learning, Talent, and Recruiting.
Lead the design and configuration of Workday Financials across General Ledger, Banking & Settlements, Procurement, Expenses, and Accounting Center.
Manage condition rules, validations, business processes, and security assignments for HR and Finance-related functionality.
Lead the design and configuration of Workday Supply Chain modules such as Procurement, Inventory, Supplier Accounts, and Strategic Sourcing.
Lead the design and configuration of Workday Security, Integration, and requests that are Core to Workday and shared across different modules and 3
rd
party applications as needed.
Maintain configuration documentation and version control through Change Control governance processes.
Support & Troubleshooting
Provide support for all Workday service requests and incidents from Operations teams.
Research, diagnose, and resolve Workday functional problems, escalating to Workday Community or AMS partners as needed.
Serve as SME on Workday updates/releases, testing new features, and advising leadership on adoption.
Collaboration & Governance
Partner with HR, Finance, and Supply Chain Operations to analyze process pain points and deliver Workday-enabled solutions.
Liaison with IS on integrations, security frameworks, and data governance.
Contribute to HRIS, Finance Systems, Supply Chain, and IS governance committees, ensuring system changes follow change control processes.
Continuous Improvement
Identify opportunities to streamline HR, Finance, and Supply Chain processes using Workday tools (e.g., configurable reports, dashboards, Talent/Performance, Learning, Accounting Center, Prism).
Participate in optimization projects and provide input on roadmap priorities.
Train HR, Finance, and Supply Chain users and managers on new or updated system functionality.
This is not an all-inclusive list of this job's responsibilities. The incumbent may be required to perform other related duties and participate in special projects as assigned.
Qualifications
Required:
Strong knowledge of at least two Workday modules (HCM, Payroll, FDM, or Supply Chain)
Strong analytical, problem solving, and communication skills
Bachelor's degree in Finance, Accounting, Information Systems, Computer Science, or related field
Preferred:
8-10 years of experience with Workday configuring and supporting at least two modules
Proficiency in Workday Studio, EIBs, Core Connectors, and integration frameworks
Auto-ApplySenior IT Security Analyst
San Francisco, CA jobs
About the California Academy of Sciences
The California Academy of Sciences is a globally renowned scientific and cultural institution located in the heart of San Francisco's Golden Gate Park. Home to a world-class planetarium, aquarium, research center, and natural history museum-all under one living roof-our mission is to regenerate the natural world through science, learning, and collaboration.
Our extensive collections span plants, animals, fossils, and cultural artifacts from across the globe and throughout history. We are a diverse team of leading biodiversity scientists, educators, storytellers, designers, and communicators who work collaboratively to advance knowledge and inspire action through science and storytelling.
When you join the California Academy of Sciences, you become part of a mission-driven community that values curiosity, collaboration, and innovation. Whether you're working behind the scenes in research or engaging the public on the museum floor, your work will help connect people to the natural world and empower them to protect it.
About the Opportunity
Reporting to the Director of Information Technology, the Senior Security Analyst is responsible for configuring, maintaining, and monitoring internal security controls to prevent, detect, and respond to cyber threats. The Analyst will focus on the needs of information security services, bringing information security expertise to integrate security tools into daily operations, contribute to the improvement of security architecture, and assess/improve security in departments across the Academy. Additionally, this position plays a critical role in maturing our IT and security programs at the Academy.
Organizational Culture
Join a team dedicated to the Academy's mission, vision,
and values!
Currently, the Academy has a new strategic plan including three initiatives -
Hope for Reefs
,
Thriving California
, and
Islands 2030
- that leverage biodiversity science, environmental learning, and collaborative engagement to regenerate fragile ecosystems around the world. Learn more at ******************************************************
We hope you are inspired by what we do and are excited to contribute to our mission. The mission of the California Academy of Sciences is to regenerate the natural world through science, learning, and collaboration. The Academy is seeking candidates who consistently deliver exceptional work, and they may come from a variety of backgrounds and experiences. We encourage you to apply even if you do not believe you meet every qualification for the position.
This position is based in San Francisco, California. The specific onsite/hybrid schedule for this position is listed below. [FOR CAWU ROLES] This position is part of a bargaining unit represented by Cal Academy Workers United, and will be subject to the terms and conditions of that contract.
Key Responsibilities
Manage, coordinate, and implement the latest security best practices on network devices, firewalls, servers, and workstations to ensure continuous alignment with security standards and requirements.
Partner with the IT Infrastructure Manager to establish and maintain a system for ensuring that security policies are met and all staff are trained and informed fully on their role in security
Evaluate the effectiveness of awareness and security training programs and make recommendations for improvement.
Analyze, research, and resolve security breaches and vulnerability issues for all implemented software and hardware platforms.
Evaluate, Prioritize, and coordinate patching.
Provide security expertise and consulting to the IT Team and CAS internal technology partners
Partner with external security advisors to evaluate security posture and review/remediate issues
Participate in team exercises to identify potential security risks and tabletop scenarios
Maintain awareness/knowledge of industry-standard security trends/benchmarks/frameworks (e.g., NIST/CISA/ISO 27001)
Perform off-hour/weekend work as required
Qualifications: A successful candidate will have the following:
EXPERIENCE and/or EDUCATION:
5+ years of experience in the Information Technology field
3+ years of enterprise IT security experience
Experience with the administration/use of security software (e.g., Trellix/FireEye, Tenable, Nessus, Sophos, Splunk)
Experience assessing IT infrastructure and software to identify vulnerabilities
BS/BA or equivalent training and experience
Information Security Certifications - CISSP, CISM, GIAC - strongly preferred
Hands-on experience with firewalls, network security, and VPNs - preferred
SIEM Experience - preferred
Automation Experience - Preferred
SKILLS AND ABILITIES:
Strong problem-solving and troubleshooting skills
Ability to interact with users of varying levels of technical knowledge
Ability to work as part of a team or collaborate well with team members and external collaborators to accomplish mutual goals.
Ability to work efficiently and communicate with staff, cross-functional teams, and external customers from different identities and experiences.
Advanced knowledge of the processes, tools, and techniques of information security management, ability to deploy and monitor information security systems, as well as detect, resolve, and prevent violations of IT security, to protect organizational data
Physical Environment:
To perform this job successfully, an individual must be able to perform each essential job duty satisfactorily. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform essential job functions. (
Cut and paste from the Job Description, adding other requirements relevant to the position's responsibilities.)
Compensation and Benefits:
The salary range for this position is $121,762. Actual compensation will be commensurate with the final candidate's qualifications and experience, including skills, knowledge, relevant education, certifications and aligned with the internal peer group. We believe in fair and equitable compensation practices and are committed to providing competitive salaries within the industry and market standards. The Academy offers a total compensation package that emphasizes both base salary and comprehensive benefits based on the hours per week worked. Further details regarding compensation and benefits will be discussed during the interview process.
Schedule: Full-time, 40 hours per week
How to Apply:
Interested candidates should submit a resume and application through our Careers Page portal.
The California Academy of Sciences will give full consideration for employment to all qualified applicants with criminal histories in a manner consistent with the requirements of the San Francisco Fair Chance Ordinance (SF Police Code, Article 49).
Auto-ApplyPrincipal Information Security Architect
Sacramento, CA jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Power Platform Architect
Dallas, TX jobs
Benefits:
401(k) matching
Competitive salary
Flexible schedule
Health insurance
Power Platform/.NET Architect. 12+ month contract &, can be extended, The interview process will be 1 technical video interview and then an offer will be made. Job Description:• Develop and customize applications using Power Apps, Power Automate, Power Fx, Power Query, Dataflows, and Power BI.• Design applications using software engineering principles.• Perform code reviews, especially for less experienced developers, to ensure code quality and adherence to software engineering best practices.• Provide training and technical support to development team members as needed.• Estimate work and provide accurate timelines.• Clearly communicate design ideas and clearly explain the root causes of production issues.• Document steps for DevOps teams to deploy applications.• Monitor deployments to higher environments.• Identify, design, and implement process improvements to streamline workflows and enhance productivity.• Create and maintain documentation for developed solutions and processes.
Qualifications:
• 8 years+ developing solutions using Power Platform tools (Power Apps, Power Automate, Dataflows Power BI) using software engineering principles.
• 8 years+ customizing out-of-the-box Microsoft Dynamics 365 applications/Power Platform solutions using JavaScript, plug-ins, and custom PCF controls.
• 8 years+ development with JavaScript/JavaScript Frameworks.
• 8 years+ development with JSON.
• 8 years+ development with RESTful services.
• 8 years+ development with C#.Net.
• 8 years+ development with data integration.
• 8 years+ implementing security and governance in the Power Platform.
• 8 years+ code branching, merging, and version control using Git.
• 8 years+ estimating work with accurate timelines and resource requirements.
• 8 years+ effectively communicating design ideas, verbally and written.
• Must hold Microsoft Certified: Power Platform Solution Architect Expert certification.
Kindly share your profiels as the earliest to
*******************
Thank you.
This is a remote position.
Compensation: $150,000.00 - $1,900,000.00 per year
Who We Are CARE ITS is a certified Woman-owned and operated minority company (certified as WMBE). At CARE ITS, we are the World Class IT Professionals, helping clients achieve their goals. Care ITS was established in 2010. Since then we have successfully executed several projects with our expert team of professionals with more than 20 years of experience each. We are globally operated with our Head Quarters in Plainsboro, NJ, with focused specialization in Salesforce, Guidewire and AWS. We provide expert solutions to our customers in various business domains.
Auto-ApplyInformation Security Engineer - Black Lotus Labs Threat Researcher (Crimeware)
Phoenix, AZ jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Security Engineer on the Research & Analysis team to specialize in Threat Research with an emphasis on the Crimeware and Ransomware ecosystem, proactively identifying and disrupting adversary infrastructure. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**Location**
This is a remote position open to candidates based anywhere in the U.S.
**The Main Responsibilities**
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Fluency in the ransomware attack chain, adversary TTPs, and detection techniques with an emphasis on detections of adversary infrastructure using network telemetry.
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages) on distributed computing frameworks.
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience developing threat research thought leadership such as blogs and presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
Well-experienced candidates may also have the following skills:
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA
\#GSS
\#LI-MG1
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
Requisition #: 340001
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Senior IT Security Analyst
San Francisco, CA jobs
About the California Academy of Sciences
The California Academy of Sciences is a globally renowned scientific and cultural institution located in the heart of San Francisco's Golden Gate Park. Home to a world-class planetarium, aquarium, research center, and natural history museum-all under one living roof-our mission is to regenerate the natural world through science, learning, and collaboration.
Our extensive collections span plants, animals, fossils, and cultural artifacts from across the globe and throughout history. We are a diverse team of leading biodiversity scientists, educators, storytellers, designers, and communicators who work collaboratively to advance knowledge and inspire action through science and storytelling.
When you join the California Academy of Sciences, you become part of a mission-driven community that values curiosity, collaboration, and innovation. Whether you're working behind the scenes in research or engaging the public on the museum floor, your work will help connect people to the natural world and empower them to protect it.
About the Opportunity
Reporting to the Director of Information Technology, the Senior Security Analyst is responsible for configuring, maintaining, and monitoring internal security controls to prevent, detect, and respond to cyber threats. The Analyst will focus on the needs of information security services, bringing information security expertise to integrate security tools into daily operations, contribute to the improvement of security architecture, and assess/improve security in departments across the Academy. Additionally, this position plays a critical role in maturing our IT and security programs at the Academy.
Organizational Culture
Join a team dedicated to the Academy's mission, vision,
and values!
Currently, the Academy has a new strategic plan including three initiatives -
Hope for Reefs
,
Thriving California
, and
Islands 2030
- that leverage biodiversity science, environmental learning, and collaborative engagement to regenerate fragile ecosystems around the world. Learn more at ******************************************************
We hope you are inspired by what we do and are excited to contribute to our mission. The mission of the California Academy of Sciences is to regenerate the natural world through science, learning, and collaboration. The Academy is seeking candidates who consistently deliver exceptional work, and they may come from a variety of backgrounds and experiences. We encourage you to apply even if you do not believe you meet every qualification for the position.
This position is based in San Francisco, California. The specific onsite/hybrid schedule for this position is listed below. [FOR CAWU ROLES] This position is part of a bargaining unit represented by Cal Academy Workers United, and will be subject to the terms and conditions of that contract.
Key Responsibilities
Manage, coordinate, and implement the latest security best practices on network devices, firewalls, servers, and workstations to ensure continuous alignment with security standards and requirements.
Partner with the IT Infrastructure Manager to establish and maintain a system for ensuring that security policies are met and all staff are trained and informed fully on their role in security
Evaluate the effectiveness of awareness and security training programs and make recommendations for improvement.
Analyze, research, and resolve security breaches and vulnerability issues for all implemented software and hardware platforms.
Evaluate, Prioritize, and coordinate patching.
Provide security expertise and consulting to the IT Team and CAS internal technology partners
Partner with external security advisors to evaluate security posture and review/remediate issues
Participate in team exercises to identify potential security risks and tabletop scenarios
Maintain awareness/knowledge of industry-standard security trends/benchmarks/frameworks (e.g., NIST/CISA/ISO 27001)
Perform off-hour/weekend work as required
Qualifications: A successful candidate will have the following:
EXPERIENCE and/or EDUCATION:
5+ years of experience in the Information Technology field
3+ years of enterprise IT security experience
Experience with the administration/use of security software (e.g., Trellix/FireEye, Tenable, Nessus, Sophos, Splunk)
Experience assessing IT infrastructure and software to identify vulnerabilities
BS/BA or equivalent training and experience
Information Security Certifications - CISSP, CISM, GIAC - strongly preferred
Hands-on experience with firewalls, network security, and VPNs - preferred
SIEM Experience - preferred
Automation Experience - Preferred
SKILLS AND ABILITIES:
Strong problem-solving and troubleshooting skills
Ability to interact with users of varying levels of technical knowledge
Ability to work as part of a team or collaborate well with team members and external collaborators to accomplish mutual goals.
Ability to work efficiently and communicate with staff, cross-functional teams, and external customers from different identities and experiences.
Advanced knowledge of the processes, tools, and techniques of information security management, ability to deploy and monitor information security systems, as well as detect, resolve, and prevent violations of IT security, to protect organizational data
Physical Environment:
To perform this job successfully, an individual must be able to perform each essential job duty satisfactorily. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform essential job functions. (
Cut and paste from the Job Description, adding other requirements relevant to the position's responsibilities.)
Compensation and Benefits:
The salary range for this position is $121,762. Actual compensation will be commensurate with the final candidate's qualifications and experience, including skills, knowledge, relevant education, certifications and aligned with the internal peer group. We believe in fair and equitable compensation practices and are committed to providing competitive salaries within the industry and market standards. The Academy offers a total compensation package that emphasizes both base salary and comprehensive benefits based on the hours per week worked. Further details regarding compensation and benefits will be discussed during the interview process.
Schedule: Full-time, 40 hours per week
How to Apply:
Interested candidates should submit a resume and application through our Careers Page portal.
The California Academy of Sciences will give full consideration for employment to all qualified applicants with criminal histories in a manner consistent with the requirements of the San Francisco Fair Chance Ordinance (SF Police Code, Article 49).
Principal Information Security Architect
Montpelier, VT jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Information Security Engineer - Black Lotus Labs Threat Researcher (Crimeware)
Annapolis, MD jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Security Engineer on the Research & Analysis team to specialize in Threat Research with an emphasis on the Crimeware and Ransomware ecosystem, proactively identifying and disrupting adversary infrastructure. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**Location**
This is a remote position open to candidates based anywhere in the U.S.
**The Main Responsibilities**
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Fluency in the ransomware attack chain, adversary TTPs, and detection techniques with an emphasis on detections of adversary infrastructure using network telemetry.
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages) on distributed computing frameworks.
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience developing threat research thought leadership such as blogs and presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
Well-experienced candidates may also have the following skills:
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA
\#GSS
\#LI-MG1
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
Requisition #: 340001
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Principal Information Security Architect
Annapolis, MD jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Information Security Engineer - Black Lotus Labs Threat Researcher (Crimeware)
Montpelier, VT jobs
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Security Engineer on the Research & Analysis team to specialize in Threat Research with an emphasis on the Crimeware and Ransomware ecosystem, proactively identifying and disrupting adversary infrastructure. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**Location**
This is a remote position open to candidates based anywhere in the U.S.
**The Main Responsibilities**
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Fluency in the ransomware attack chain, adversary TTPs, and detection techniques with an emphasis on detections of adversary infrastructure using network telemetry.
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages) on distributed computing frameworks.
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience developing threat research thought leadership such as blogs and presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
Well-experienced candidates may also have the following skills:
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA
\#GSS
\#LI-MG1
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
Requisition #: 340001
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.