Principal Analyst - Responsible AI (Remote)
Remote cryptographic vulnerability analyst job
Achieving our goals starts with supporting yours. Grow your career, access top-tier health and wellness benefits, build lasting connections with your team and our customers, and travel the world using our extensive route network. Come join us to create what's next. Let's define tomorrow, together.
Description
United's Digital Technology team is comprised of many talented individuals all working together with cutting-edge technology to build the best airline in the history of aviation. Our team designs, develops and maintains massively scaling technology solutions brought to life with innovative architectures, data analytics, and digital solutions.
Job overview and responsibilities
The Principal Architect - Responsible Artificial Intelligence validates that our services, applications, and websites are designed and implemented in accordance with United's secure development and responsible AI standards. The Principal Architect is a senior level position that works closely with development teams, product teams, and other teams across the organization to integrate security into the product lifecycle from design, deployment, and recurring testing.
The Principal Architect is a recognized subject matter expert in defining security requirements, performing application assessments, and providing application teams with remediation guidance and advice. On any given day, the Principal Architect for Responsible AI can be pulled in to evaluate a new system, review a proposed application change, or provide guidance on application security/coding best practices.
* Leads responsible architecture design evaluations and threat modelling of our products (both bought and built)
* Recommends and implements products/services that support operational needs and responsible AI requirements
* Promotes and contributes to the continuous improvement of our Responsible AI strategy through accurate, reusable documentation and education materials
* Perform code analysis of applications, manually and using SAST, DAST, and SCA scanning solutions as well as conducting manual vulnerability analysis
* Technical point of contact for product teams as it relates to Responsible AI at United
* Sought out as a trusted advisor/consultant and assists in the creation of security designs, requirements, risk monitoring and mitigation guidance in alignment with industry best practices and regulatory requirements
* Assist in leading the design, definition and implementation of security best practices and standards and ensure product development teams understand them
Qualifications
What's needed to succeed (Minimum Qualifications):
* Bachelor's degree in STEM, Computer Science, or related field
* Minimum of 9 years of experience in related field
* Deep understanding of Generative Artificial Intelligence and its associated risks
* Ability to collaborate with development teams to build secure solutions, communicating risks and bringing consensus to diverse priorities
* Knowledge of common vulnerabilities and attack vectors against a GenAI model such as prompt attacks, training data extraction, and data poisoning
* Assessment, risk categorization, and application security testing tools
* Excellent problem solving, critical thinking, interpersonal, collaboration, written and verbal communication skills
* Knowledge of the fast-evolving industry standards, best practices, and reference architectures
* Solid understanding of secure network and system design in both cloud and conventional environments, as well as of network and web related protocols
* Excellent understanding of web applications, web servers, layer 7 application technologies, frameworks and protocols with respect to application development and deployment
* Ability to work independently and self-motivate
* Ability to strategically evaluate SaaS providers and their data storage policies
* Must be legally authorized to work in the United States for any employer without sponsorship
* Successful completion of interview required to meet job qualification
* Reliable, punctual attendance is an essential function of the position
What will help you propel from the pack (Preferred Qualifications):
* Master's degree
* Certified Ethical Hacker (CEH)
* GIAC Security Essentials (GSEC)
* Certified Information Security Manager (CISM)
* Comp TIA Security +
* Certified Information Systems Security Professional (CISSP)
* Certified Information Systems Auditor (CISA)
* Systems Security Certified Practitioner (SSCP)
* CompTIA Advanced Security Practitioner (CASP+)
* Offensive Security Certified Professional (OSCP)
* Minimum of 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security, cloud computing
* Thought leadership publishing within the Responsible AI or Generative AI categy
* Familiar with waterfall and agile development processes and ability to integrate secure development practices into both models
* Experience with multiple programming languages
* Success in implementing effective Secure SDLC frameworks across a large corporation
The base pay range for this role is $143,450.00 to $186,778.00.
The base salary range/hourly rate listed is dependent on job-related, factors such as experience, education, and skills. This position is also eligible for bonus and/or long-term incentive compensation awards.
You may be eligible for the following competitive benefits: medical, dental, vision, life, accident & disability, parental leave, employee assistance program, commuter, paid holidays, paid time off, 401(k) and flight privileges.
United Airlines is an equal opportunity employer. United Airlines recruits, employs, trains, compensates and promotes regardless of race, religion, color, national origin, gender identity, sexual orientation, physical ability, age, veteran status and other protected status as required by applicable law. Equal Opportunity Employer - Minorities/Women/Veterans/Disabled/LGBT.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform crucial job functions. Please contact JobAccommodations@united.com to request accommodation.
Senior Security Operations Analyst
Remote cryptographic vulnerability analyst job
About Extend:
Extend is revolutionizing the post-purchase experience for retailers and their customers by providing merchants with AI-driven solutions that enhance customer satisfaction and drive revenue growth. Our comprehensive platform offers automated customer service handling, seamless returns/exchange management, end-to-end automated fulfillment, and product protection and shipping protection alongside Extend's best-in-class fraud detection. By integrating leading-edge technology with exceptional customer service, Extend empowers businesses to build trust and loyalty among consumers while reducing costs and increasing profits.
Today, Extend works with more than 1,000 leading merchant partners across industries, including fashion/apparel, cosmetics, furniture, jewelry, consumer electronics, auto parts, sports and fitness, and much more. Extend is backed by some of the most prominent technology investors in the industry, and our headquarters is in downtown San Francisco.
What You'll Do:
Serve as a core member of Security Operations, monitoring and triaging alerts from platforms such as SentinelOne and Wiz. Perform end-to-end investigations to identify, contain, and remediate threats and incidents, driving timely, appropriate response.
Proactively identify and assess vulnerabilities in infrastructure and code, working with development and other cross functional teams to address issues.
Contribute to the end-to-end detection lifecycle: model attacker behaviors (MITRE ATT&CK), write and test detections as code across security programs and tooling (SentinelOne, Wiz, Okta, AWS CloudTrail), and continuously enrich to reduce false positives and improve MTTD. Support data quality and telemetry onboarding, maintain response playbooks, and provide threat validation assistance across the business.
Assist teams with the application of secure configuration baselines and best practices in accordance with CIS Benchmarks, NIST, vendor hardening guides, and applicable compliance standards across all company computing assets.
Correlate endpoint and infrastructure telemetry to identify emerging threats. Curate and operationalize intelligence (IOCs, TTPs) into detections and response playbooks, and maintain vetted intelligence feeds.
Assist GRC initiatives by mapping controls to internal policies and frameworks (e.g., SOC 2, NIST CSF, NYC DFS 500), identifying gaps, supporting audits and evidence collection, tracking remediation, and maintaining policies and control documentation.
Work with engineering and business teams to champion security best practices, communicate risks to accountable owners, and assist with mitigation planning and execution.
What We Are Looking For:
3+ years experience in a Security Analyst / Security Operations role
3+ years experience with AWS CloudFormation, or other infrastructure-as-code systems (like Terraform)
3+ years experience or certification in AWS serverless technologies (API Gateway, Lambda, S3, DynamoDB)
Certifications (one or more preferred): CISSP, CCSP, GIAC (GCIH/GCIA/GMON/GCED/GCFA/GREM), cloud security (AWS or cloud agnostic security specialty) or equivalent experience.
Proficiency with hands on management and use of SIEM, CNAPP, EDR, Vulnerability Management tooling, and Detection Engineering strategies.
Proficiency with AI technologies and the corresponding threat landscape and strategies for mitigation. Understands agentic workflows such as AWS Bedrock, MCP based workflows (or similar technologies)
Working Knowledge of best practices around security roles and responsibilities for AWS IAM
Experience working with observability services and tooling (including Coralogix, CloudWatch, OpenTelemetry)
Ability to perform in a high energy environment with dynamic job responsibilities and priorities
Nice to Haves:
Experience with AWS Cloud Development Kit(CDK)
Experience with Mastra AI
Expected Pay Range: $157,000 - $182,000 per year salaried*
* The target base salary range for this position is listed above. Individual salaries are determined based on a number of factors including, but not limited to, job-related knowledge, skills and experience.
Life at Extend:
Working with a great team from diverse backgrounds in a collaborative and supportive environment.
Competitive salary based on experience, with full medical and dental & vision benefits.
Stock in an early-stage startup growing quickly.
Generous, flexible paid time off policy.
401(k) with Financial Guidance from Morgan Stanley.
Extend CCPA HR Notice
Auto-ApplyComputer Systems Analyst
Remote cryptographic vulnerability analyst job
T-Rex Solutions is seeking a results-driven Computer Systems Analyst to support our IRS Development, Infrastructure, Security and Modernization (DISM) program. The program objective is to provide ongoing support for the development, operation and maintenance of critical CI/CD capabilities, enterprise infrastructure, application development, and modernization of IRS tax filing and enterprise systems. The ideal candidate will be responsible for analyzing business problems to implement and improve computer systems. You will analyze user requirements, procedures, and problems to automate or enhance existing systems and review computer system capabilities, workflow, and scheduling limitations. You may also analyze or recommend commercially available software. This is a fully remote program and requires all individuals to pass an IRS investigation and acquire a public trust clearance.
Responsibilities:
System Analysis: Analyze complex data processing problems to design and implement effective computer systems.
Requirement Gathering: Work with users to gather and understand their requirements, procedures, and problems to develop or improve systems.
System Improvement: Recommend and implement improvements to existing systems, focusing on automation, efficiency, and user satisfaction.
Capability Review: Review computer system capabilities, workflow, and scheduling limitations to optimize system performance.
Software Evaluation: Analyze and recommend commercially available software to meet user needs and improve system functionality.
Documentation: Create detailed documentation of system requirements, specifications, and operational procedures.
Collaboration: Collaborate with other IT professionals, including developers, network administrators, and support staff, to ensure seamless system integration and performance.
Testing and Validation: Conduct system testing and validation to ensure systems meet user requirements and function as intended.
Requirements:
Bachelor's Degree in Computer Science, Information Systems, or a related field with 5+ years of related experience
US Citizenship required
Must be able to pass an IRS public trust investigation
Proficiency in system analysis and design, with strong knowledge of various programming languages and software tools.
Experience with databases, network infrastructure, and data processing techniques.
Strong analytical and problem-solving abilities to understand and address complex system issues.
Excellent verbal and written communication skills to effectively interact with users and IT professionals.
High attention to detail and accuracy in analyzing user requirements and system capabilities.
Ability to work collaboratively in a team environment and manage multiple projects simultaneously.
Desired Skills:
Experience with enterprise-level applications and systems.
Knowledge of business process modeling and improvement techniques.
Familiarity with cloud computing and cybersecurity principles.
Current IRS clearance desired
T-Rex Overview
Established in 1999, T-Rex Solutions, LLC is a proven mid-tier business providing data-centric mission services to the Federal government as it increasingly tries to secure and leverage the power of data. We design, integrate, secure, and deploy advanced technical solutions for our customers so they can efficiently fulfill their critical objectives. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering.
T-Rex is constantly seeking qualified people to join our growing team. We have built a broad client base through our devotion to delivering quality products and customer service, and to do that we need quality individuals. But more than that, we at T-Rex are committed to creating a culture that supports the development of every employee's personal and professional lives. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training and educational reimbursement, Transamerica 401(k) and Cigna healthcare benefits.
T-Rex is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, sex (including pregnancy and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors.
In compliance with pay transparency guidelines, the annual base salary range for this position is $100,000 - $113,000. Please note that the salary information is a general guideline only. T-Rex considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as market and business considerations when extending an offer.
T-Rex offers a diverse and collaborative work environment, exciting opportunities for professional growth, and generous benefits, including: PTO available to use immediately upon joining (prorated based on start date), paid parental leave, individual and family health, vision, and dental benefits, annual budget for training, professional development and tuition reimbursement, and a 401(k) plan with company match fully vested after 60 days of employment among other benefits.
Auto-ApplySenior Security Analyst III
Remote cryptographic vulnerability analyst job
OppFi is a leading tech-enabled digital finance platform that works with banks to provide financial products and services for everyday Americans. Through a transparent and responsible platform, which includes financial inclusion and excellent customer experience, the Company supports consumers who are turned away by mainstream options to build better financial health.
We are a team of caring, innovative, and inclusive individuals who thrive in being immersed in diverse talents, expertise, perspectives, and backgrounds. Our employees approach every new challenge with an unparalleled ability to see what could be rather than settle for what is. Our business principles guide us and create an open and collaborative culture where we improve 1% every day, and the best ideas always win! We welcome individuals who want to make an impact in the financial system by facilitating credit access, expanding financial inclusion, promoting financial health, and delivering exceptional customer service.
A few other fun facts about us. OppFi is one of the top consumer-rated financial platforms online, maintaining a 4.5/5.0-star rating on Trustpilot. We are a 2025 Crain's Fast 50™ company and were named on Built In's 2025 Best Places to Work in Chicago.
Senior Security Analyst III
As Senior Information Security Analyst III, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices. You will work closely with senior team members and various OppFi internal teams to ensure our environment maintains security, visibility, and compliance standards.
What you get to do:
Information Security Risk Management:
Own the security review and assessment process evaluating the risk associated with introducing new applications/tools into the environment.
Assist with security risk management activities, including the analysis, quantification, and tracking of information security risks, plus the review and documentation of risk exception requests.
Policy and Compliance Analysis: Identify emerging compliance requirements and assess their impact on our policies. Develop and refresh our policies, procedures, standards, and guidelines to stay compliant and aligned with industry best practices.
Governance Visibility: Design and maintain dynamic dashboards or scorecards that offer clear insights into Information Security Governance activities, demonstrating our commitment to security and compliance.
Security Operations & Incident Support
Monitor security alerts from various tools (SIEM, EDR, cloud logs) and support the triage of potential security incidents by gathering initial data and escalating to senior engineers as needed.
Assist in the execution of security incident response playbooks, focusing on initial steps like investigation, basic containment, and documentation.
Contribute to the documentation and tracking of security incidents to support audit and compliance requirements.
Support the monitoring and logging strategy by assisting with the configuration and tuning of SIEM (Security Information and Event Management) alerts and reports.
Perform regular log review and analysis for suspicious activities under the guidance of senior staff.
Improvement & Collaboration
Contribute to the development and maintenance of operational playbooks and documentation for security processes.
Learn to deploy and manage new security tools and assist in the development of basic threat detection logic.
Develop basic security performance metrics and assist with reporting to measure the effectiveness of security controls.
Performs other related duties as assigned.
What you will bring to the team:
3-5 years of professional experience in Information Security or IT Risk Management, with a background supporting IT compliance programs to meet regulatory requirements and demonstrated expertise in at least one of the following areas: Security Operations, Incident Response, or Vulnerability Management.
Experience with
Security and control frameworks, such as FFIEC, NIST, COBIT, ITIL, and ISO control framework
EDR platforms (e.g., CrowdStrike, Defender for Endpoint, SentinelOne)
SIEM/SOAR tools (e.g., Sumo Logic, Splunk, Chronicle, or Azure Sentinel)
CSPM tools (e.g., Wiz, Prisma, Orca)
Vulnerability management platforms (e.g., Qualys, Tenable, Rapid7)
Experience identifying potential IT controls risks and opportunities through and offering sustainable recommendations that address cause rather than symptoms
Experience with information security standards, best practices for securing computer systems within applicable laws and regulations
Experience with Governance Risk & Compliance (GRC) tools and procedure development
Solid understanding of common attack techniques (MITRE ATT&CK), incident triage, and remediation workflows.
Foundational knowledge of AWS (Amazon Web Services) or other cloud environments.
Basic understanding of networking, operating systems (Linux/Windows), and common security principles (e.g., least privilege, defense-in-depth).
Familiarity with automation frameworks or API integrations for security tools.
Strong written communication skills necessary for developing clear, concise procedures and playbooks, coupled with effective verbal skills for communicating technical findings.
Experience building dashboards and metrics for leadership visibility.
Strong analytical and problem-solving skills with a keen attention to detail and a desire to learn quickly.
Bachelor's degree in Cybersecurity, Computer Science, or equivalent experience.
Certifications such as CompTIA CySA+, GCIH, GCIA, GMON, GCDA, GSOC, or CISSP associate are preferred.
Experience working in a regulated industry (financial services or health care)
Reports to: Manager, Security Operations
Total Rewards and Benefits:
At OppFi, we are committed to fostering a fair and equitable workplace. The compensation range for this role reflects our good faith compensation estimate for this position. Final offers are determined based on a myriad of factors including, but not limited to experience, skills, qualifications, and other relevant business considerations. Candidates are encouraged to discuss compensation expectations during the hiring process. In addition to base pay, the total compensation package includes eligibility and potential for performance-based bonuses and equity grants dependent upon the role and job level.
OppFi offers a flexible, remote environment, 401(k) matching program, and generous paid time off. Other benefits include medical, dental, and vision coverage, and tuition reimbursement. Additional benefits include DoorDash DashPass, Figo pet insurance, Rocket Lawyer, and access to LinkedIn Learning. OppFi also offers Fringe, a lifestyle benefits platform that allows employees to decide how to spend rewards from dozens of vendors like Uber, DoorDash, and UrbanSitter. #LI-Remote
Compensation Range:$102,400-$153,600 USD
EEO Statement:
OppFi is an equal opportunity employer and does not discriminate based on any actual or perceived legally recognized protected bases under local, state, federal law, or regulations. Our goal as a company is to build an equitable workplace that actively works to dismantle systems of oppression in our processes, procedures, and interactions. We aim to help our employees thrive where they work and beyond. Check out our Culture page here.
As part of OppFi's commitment to providing equal opportunity to qualified individuals, OppFi will ensure that persons with disabilities are provided reasonable accommodation as defined by applicable laws and organizational policies. If reasonable accommodation is needed to participate in the job application or interview processes or job requirements, please contact our People Team at ********************.
Pursuant to the requirements of the California Consumer Privacy Act, OppFi is providing the "OppFi California Employee Privacy Policy", which details the categories of personal information collected and your rights under the policy. If you are a California resident, please review the policy here: *******************************
The information in this document is for general informational purposes only. It is not intended to be an all-inclusive list or description of the organization and its requirements for positions and employees. OppFi reserves the right to modify or change the information on this document at its discretion.
Auto-ApplyCloud Security Analyst (Remote)
Remote cryptographic vulnerability analyst job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 12/30/2025.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
Auto-ApplySenior Security GRC Analyst
Remote cryptographic vulnerability analyst job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplySenior Information Security Risk Specialist (GRC)
Remote cryptographic vulnerability analyst job
About Us
At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you.
What are we looking for?
We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively.
What will you do?
Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders.
Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth.
Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate.
Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities.
Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002.
Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance.
Help support internal/external audits and evidence collection via a GRC tool.
Document new and update existing policies, procedures, standards and resources
Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities.
Help support customer security reviews, RFPs and external security and privacy inquiries.
Participate in defining, collecting and tracking various Security Metrics.
What skills and experience should you bring?
5+ years of experience working in information security, risk or compliance.
Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc.
Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST.
Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk.
Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines.
Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization.
Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers.
Experience working with both technical and non-technical teams.
Ability and desire to understand the intent of requirements and provide effective recommendations.
Ability to prioritize in a highly dynamic work environment.
Our Preferred Qualifications:
Advanced degree in computer science, Information Technology, Information Security or related field.
Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks.
Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.)
Ability to assess and pragmatically define scope and relevant controls.
Strong desire to learn and continuously develop and deepen technical skills.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events, including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000-$138,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
Auto-ApplySenior Security Analyst - Architecture
Cryptographic vulnerability analyst job in Reynoldsburg, OH
Your Role We are seeking a Senior Security Analyst reporting to the Cybersecurity Architecture team that will have a critical role in translating enterprise security standards into actionable technical controls and processes. This position acts as a security subject matter expert, focusing on ensuring the security integrity of technology solutions from the initial phases of a project through deployment. The successful candidate is analytical and detail-oriented, has intellectual curiosity, focus on problem solving, and proactive in adapting and anticipating risks.
Why You Belong Here
At Victoria's Secret & Co, you'll join a world-leading specialty retail brand recognized globally for innovation and excellence in lingerie and fashion. You'll work alongside industry leaders to set the standard for what a retail brand can achieve, placing customers at the center of everything we do to create products and experiences that bring them joy.
We believe everyone deserves a place where they truly belong. We celebrate individuality and know that your passion, experience, and unique perspective strengthen our team and business. Here, you'll be empowered to perform, grow, and engage through unmatched opportunities to develop your skills, gain real-world experience, and learn from the best in the business.
Your Impact
Architectural Guidance and Review:
* Conduct thorough project security assessments (including risk analysis, penetration test coordination, and vulnerability reviews) on existing infrastructure and new application designs.
* Develop and socialize robust security requirements and technical specifications for new systems, platforms, and architectural patterns, ensuring alignment with risk, regulatory, and compliance needs.
* Diagram and document the security posture of critical enterprise assets, creating clear, technical representations of control mapping, data flow, and threat models.
* Inform and update internal security standards and requirements.
Security Technology Portfolio:
* Research and evaluate the latest security threats, technologies, and industry best practices.
* Oversee the effective implementation and maintenance of defined security controls (e.g., identity management, data protection, network segmentation) across various cloud and on-premises environments.
Collaboration:
* Educate teams on secure design principles, defensive programming techniques, and proper configuration of security tools and services.
* Develop and grow relationships with system and technology owners across the business.
Ad-hoc duties as assigned
Click here for benefit details related to this position.
Minimum Salary: $96,500.00
Maximum Salary: $131,775.00
VS&Co provides a range of compensation for this role as shown. Your actual salary will be determined by a number of factors, including: your specific skills and experience, geographic region, or other relevant factors.
Qualifications
Your Experience
Required Qualifications
* Strong understanding of IT security concepts and technologies. Have experience with specific security tools and applications, such as firewalls, intrusion detection systems, and vulnerability scanners.
* Strong communication skills, the ability to problem solve, and work as part of a team.
* Work effectively with other IT and security professionals, as well as business stakeholders.
* Experience with security frameworks (e.g., NIST CSF, SABSA, TOGAF) and risk methodologies (e.g., FAIR, OCTAVE).
Preferred Qualifications
* 5+ years of progressive experience in security, with at least 1 year in a dedicated security architecture role.
* Relevant industry certifications such as ISA/IEC 62443 (Cybersecurity Risk Assessment Specialist), CISA (ISACA Certified Information Systems Auditor), CSA CGC (Cloud Security Alliance Cloud Governance and Compliance), GCIP (GIAC Critical Infrastructure Protection)
* Bachelor's degree in Computer Science, Information Technology, or a related field; or equivalent practical experience.
We will consider for employment all qualified applicants, including those with arrest records, conviction records, or other criminal histories, in a manner consistent with the requirements of any applicable state and local laws. Please see links: California Fair Chance Act, Los Angeles Fair Chance Initiative for Hiring Ordinance, Philadelphia Fair Chance Law, San Francisco Fair Chance Ordinance, Los Angeles County Fair Chance Ordinance
An equal opportunity employer, we do not discriminate in hiring or terms and conditions of employment because of an individual's race, color, religion, gender, gender identity, national origin, citizenship, age, disability, sexual orientation, marital status or any other protected category recognized by state, federal or local laws. We only hire individuals authorized for employment in the United States.
Senior Security GRC Analyst
Remote cryptographic vulnerability analyst job
Lambda, The Superintelligence Cloud, builds Gigawatt-scale AI Factories for Training and Inference. Lambda's mission is to make compute as ubiquitous as electricity and give every person access to artificial intelligence. One person, one GPU. If you'd like to build the world's best deep learning cloud, join us.
* Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
* Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
* Manage IT Risk Register including risk identification, tracking, and prioritization.
* Assist with and drive remediation of control deficiencies and gaps
* Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
* Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
* Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
* Assist control owners with root cause analysis and track risk management action plan progress.
* Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
* Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
* Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
* Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
* Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
* Experience in the machine learning or computer hardware industry
* Experience with Security by Design and/or Privacy by Design principles
* Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
* Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
* Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
* Certified Information Systems Auditor (CISA)
* Certified Information Security Manager (CISM)
* Certified Information Systems Security Professional (CISSP)
* Certified in Risk and Information Systems Control (CRISC)
* Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
* Founded in 2012, ~400 employees (2025) and growing fast
* We offer generous cash & equity compensation
* Our investors include Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, US Innovative Technology, Gradient Ventures, Mercato Partners, SVB, 1517, Crescent Cove.
* We are experiencing extremely high demand for our systems, with quarter over quarter, year over year profitability
* Our research papers have been accepted into top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
* Health, dental, and vision coverage for you and your dependents
* Wellness and Commuter stipends for select roles
* 401k Plan with 2% company match (USA employees)
* Flexible Paid Time Off Plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Sr. Security Ops Analyst- Incident Response
Remote cryptographic vulnerability analyst job
Taxwell helps everyday Americans get every tax advantage they deserve by finding credits and deductions they never even knew existed. Our tax preparation software offers easy guidance and ensures your maximum tax refund. We strive to build a team of like-minded experts in both tax and technology who align with our brand purpose, are advocates for our customers and have a fresh, non-traditional approach to the tax industry.
The Sr. Security Ops Analyst/Incident Response role is a part of the Taxwell IRM team. IRM SecOps provides cyber security monitoring, reporting, and response along with detection capabilities and threat hunting. Duties include, but are not limited to:
Receive incident escalations from monitoring team and assist with real-time advanced analysis, response, and reporting.
Mentor and assist in training analysts to aid in their skills development and analytical capabilities.
Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts.
Point person for coordination with appropriate parties during a security incident - client, management, legal, security, operations, etc.
Create thorough reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis
Supports detection capabilities and refines process through alert validation.
Performs threat hunting and proactive incident response.
Completes follow-through to ensure quality forensic materials are captured, preserved and documented along with details and timelines of events and recommendations to avoid future occurrences.
Assist in the general maintenance and improvement of processes and/or playbooks.
Conduct research regarding the latest methods, tools, and trends in digital forensics analysis.
Conduct analysis using logs, previous alerts, etc. to identify trends to identify and prevent potential incidents.
Ingest data from multiple sources and aggregate client metrics.
Basic Qualifications
Bachelor's degree or equivalent combination of CISSP certification and prior experience
Five or more years of experience in information systems security.
Good communication skills to interact with clients, team members, management, and support personnel.
Good analytical and problem-solving skills.
Ability to work independently and as part of a team, be highly self-motivated.
Experience with cloud environments, such as Microsoft Azure and Amazon. Web Services; Container services and Kubernetes; Azure Monitor and/or Sentinel; Experience with AD and Entra ID; Mimecast and Microsoft Purview; Microsoft OpenAI Services; AWS technologies such as EC2, ECS, Lambdas, LightSail, and VMware Cloud.
Ability to script in PowerShell, Python.
Preferred Qualifications
Previous expertise in consulting or finance, tax background desirable
Preferred experience with EDR solutions such as Defender XDR and CrowdStrike Falcon.
Experience in Data Visualization (example: PowerBI).
Preferred experience with Splunk and osquery.
GIAC GCFA and/or GCFR certification.
Work Environment
Requires being on-call during off hours.
May require occasional weekend work.
Location is Remote.
#LI-DNI
At Taxwell, we believe our work benefits from the diverse perspectives of our employees. As such, Taxwell welcomes and celebrates diversity and inclusion and is committed to equal opportunity employment. At Taxwell, you can expect a supportive, open, and inclusive atmosphere and a team that values your contributions.
Taxwell is committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants without regard to race, color, religion, sex, national origin, age, d
isability, marital status, sexual orientation, gender identity, veteran status, and any other status protected under
applicable
law. Taxwell considers information gathered in the hiring process, including information on this application, confidential, and only shares it on a need-to-know basis or as required by law.
If you need assistance or accommodation due to a disability, you may contact us at **************
or by calling ************ extension 6049 to speak with a member of the HR Talent Acquisition team.
Auto-ApplyPhysical Security Systems Analyst (CCure 9000)
Cryptographic vulnerability analyst job in Columbus, OH
Rate: $45 - $50/hr Contract Duration: 3 to 6 Months with possible extension/Contract to Hire Contract Type: W2 (must be authorized to work in the US; no sponsorships or C2C/1099)
Job Overview
We are seeking a motivated and adaptable Physical Security Systems Analyst to support the maintenance, implementation, and modernization of physical security systems, including card readers, security cameras, backend equipment. This role involves hands-on work with security equipment, troubleshooting, end-of-life replacement strategies, supporting service calls, and assisting the Lead Analyst in critical tasks. The ideal candidate will take ownership of various responsibilities related to physical security technology, standards, and upgrades. Experience with CCURE 9000 and/or Avigilon cameras and equipment is required.
Key Responsibilities
End-of-Life Equipment Implementation: Assist in replacing and implementing end-of-life security equipment, including cameras, access control systems, and alarm systems.
Service and Maintenance Support: Respond to service calls, troubleshoot issues, and ensure consistent operation of physical security systems.
Backup for Lead Analyst: Serve as a backup to the Lead Analyst, ensuring project continuity and system oversight during absences.
Updating Security Standards: Support the update and maintenance of security system standards and documentation to align with current technology and best practices.
Technology Development and Testing: Evaluate, develop, and test new physical security technologies, participating in proof-of-concept testing to identify deployment suitability.
Site Implementation Assistance: Provide on-site support for new technology implementations and equipment upgrades.
System Audits and Labeling: Conduct equipment audits (physical and software-based), label devices, and replace batteries where needed.
Documentation and Reporting: Maintain detailed records of installations, upgrades, audits, and services; contribute to reports on equipment health and project status.
Collaborative Engagement: Work with Facilities, Security, IT teams, and integrators to support project timelines and execution.
Security Operations Center Support: Ensure alarm data reliability and assist in refining configurations for improved responsiveness and reduced false notifications.
Emergency Support: Provide ongoing support during outages, patches, and system changes to maintain system availability.
Equipment Refresh Planning: Participate in the annual equipment refresh cycle to prioritize and replace outdated equipment.
Vendor and Manufacturer Liaison: Coordinate with vendors for support, warranty claims, training, and troubleshooting.
Continuous Improvement: Develop and refine training materials, quick reference guides, and documentation for internal use.
Site Security Coverage: Conduct site walks, audits, and evaluations to ensure proper security coverage, offering recommendations and assisting with best practice implementations.
Qualifications
Education: Associate's or Bachelor's degree in Information Technology, Cybersecurity, or a related field, or equivalent work experience.
Experience: 2-4 years of experience in physical security systems, access control, surveillance, or a similar field.
Technical Skills:
Expertise with physical security technologies (e.g., CCure 9000, Avigilon).
CCure 9000 certification is required.
Ability to troubleshoot technical issues effectively.
Additional Skills:
Strong organizational and documentation abilities.
Willingness to travel to various sites as needed.
Effective communication and teamwork skills.
Preferred Skills
Knowledge of security systems such as Avigilon or Software House.
Experience with service integrators (e.g., PSI, SDI).
Familiarity with updating and implementing security standards.
Ability to work proactively and independently in a fast-paced environment.
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Remote cryptographic vulnerability analyst job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
Auto-ApplyInformation Security Support Analyst, Contract
Remote cryptographic vulnerability analyst job
Overview of 66degrees
66degrees is a leading consulting and professional services company specializing in developing AI-focused, data-led solutions leveraging the latest advancements in cloud technology. With our unmatched engineering capabilities and vast industry experience, we help the world's leading brands transform their business challenges into opportunities and shape the future of work.
At 66degrees, we believe in embracing the challenge and winning together. These values not only guide us in achieving our goals as a company but also for our people. We are dedicated to creating a significant impact for our employees by fostering a culture that sparks innovation and supports professional and personal growth along the way.
Overview of Role
A client of 66degrees' is seeking a junior contractor to engage on a 8+-month remote contract with the potential to extend/convert into a permanent role with the client. Interested candidates should have the following required skills and the ability to work independently as well as within a team environment.
The Information Security Support Contractor will function as a member of the Security Support team and help support day-to-day operations. This role will focus on frontline duties and interact with technical and business units. This role requires strong teamwork and initiative, along with the ability to build and maintain relationships across technical and business units. Excellent communication skills are essential.
Responsibilities
Provide level 1 support for incident and request tickets escalated from other technical teams.
Contribute to protecting the integrity and confidentiality of client data and infrastructure while enabling business functionality in all systems and environments by learning to support applicable security solutions.
Learn about the security tools and solutions implemented within the organization.
Assist in improving processes, identify efficiencies, and recommend solution enhancements to improve service-level delivery.
Support the client Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews.
Assist in supporting the Identity Access Management team.
Gather and report on key organizational information security metrics.
Qualifications
1-3 years of experience as an Information Security Analyst or experience in an IT support capacity.
Required experience working with:
Active Directory/Azure
File Share Permissions
Email security understanding
Mimecast or a similar solution
Keeper - Nice to have
zScaler - Nice to have
Strong communication, good customer service experience and flexibility with change are all required.
Eagerness to work in a collaborative environment.
66degrees is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to actual or perceived race, color, religion, sex, gender, gender identity, national origin, age, weight, height, marital status, sexual orientation, veteran status, disability status or other legally protected class.
Auto-ApplySenior System Security / Cybersecurity Analyst
Cryptographic vulnerability analyst job in Columbus, OH
Responsibilities & Qualifications
RESPONSIBILITIES
Serve as a cybersecurity SME, providing support for ESS and EKC system assessments.
Fully versed in the general tenets of the DoD's authorization process, including relevant cybersecurity policies, procedures, and processes.
Support the DoD cybersecurity process by serving as a SME for ESS and/or EKC systems undergoing authorization.
Design, develop, and implement cybersecurity measures into systems, delivering comprehensive cybersecurity assessment documentation.
Understand and apply security controls identified in NIST 800-53 to the process of assessing and authorizing DLA ESS and EKC systems.
Determine the severity value of identified vulnerabilities and assess their potential impact on the system's current or future authorization status.
Perform key functions related to security control selection, implementation, and documentation.
Collaborate closely with the Information Systems Security Manager (ISSM) on complex system details.
Monitor and control communications at key internal boundaries among subsystems and provide system-wide common controls that meet or exceed the requirements of constituent subsystems.
Lead the development, integration, and testing processes to deliver and deploy production-ready systems that meet business requirements and project schedules.
Work closely with product management to translate business requirements into technical solutions, architecture design, level of effort, and project schedule.
Design architecture and establish best practices to produce efficient and effective system operations while minimizing refactoring and rework.
Provide support for the Security Technical Implementation Guides (STIGs) process and develop and submit cybersecurity documentation as required.
Ensure the implementation of DoD STIG compliance for ESS/EKC systems/applications and maintain compliance with required DoD STIGs.
Support reviews associated with STIGs, cyber assessments, and continuous monitoring activities.
REQUIRED QUALIFICATIONS
Experience:
Five (5) years of relevant C&A experience
MF and NIST C&A experience
DOD cybersecurity experience
Certifications: (One of the following)
CGRC/CAP
CASP+
CCSP
SSCP
Security+
GSEC
CISM
CISSO
FITSP-M
GCIA
GCSA
GCIH
GSLC
GICSP
CISSP-ISSMP
CISSP
Clearance:
Must possess a Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
Overview
We are seeking a Senior System Security / Cybersecurity Analyst to join our team supporting DLA Integrated Electronic Security Systems (IESS) and Electronic Key Control (EKC).
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Location: Columbus, OH
Type of environment: On Site
Noise level: Medium
Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
U.S. Citizen
Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
Auto-ApplyIT Security Specialist 4/ITSS2 (39604)
Cryptographic vulnerability analyst job in Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job.
Job Description
Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include:
-Monitor network and information system activity.
-Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures.
-Understands customer support, likes to work with people and can ensure that the customer is satisfied.
-Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc.
-Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
-Perform specialized security functions (e.g. forensics for incident response).
-Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services.
-Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc.
SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations.
During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS.
Qualifications
-1-2 Years SIEM (Q-Radar preferred)
-8 years customer service experience
-8 Years Troubleshooting experience
-8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP.
-8 years' experience with Active Directory.
-4 Years experience with Web and Email Filtering and Security (Ironport)
-5+ Years experience with Imperva (DAM/WAF)
-1 years of Vulnerability scanning experience (Qualys)
-3 years A/V suite experience McAfee
-3 years IPS (IBM)
-Contributes to continuous process improvements to increase the efficiency of section.
-Excellent communication skills both written and oral.
-Strong communication/ leadership skills.
-Strong influence, collaboration and negotiation experience.
-Ability to collaborate with supporting resources across business and/or functional lines.
-Have excellent oral and written skills/possess strong meeting and work session facilitation skills.
-Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines.
-Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements.
-Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills.
-Must be knowledgeable in the English language/speak clearly and understandably use the English language.
Desired Skills
-Q-Radar
-Ironport Web and Email Security
-Imperva
-Certifications in Microsoft
-Powershell 3.0 scripting background.
-Qualys
-McAfee Enterprise solutions
-IPS
-Splunk
-Other security related tools.
-ITIL Knowledge and ITSM Tools.
Additional Information
Additional Information :
- "All your information will be kept confidential according to EEO guidelines".
- All candidates who are authorized to work in US are encouraged to apply.
- Candidates must clear the Background check prior to commencing the assignment.
THIRD PARTY CANDIDATES:
Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability.
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
Senior System Security / Cybersecurity Analyst
Cryptographic vulnerability analyst job in Columbus, OH
Responsibilities and Qualifications
RESPONSIBILITIES
Serve as a cybersecurity SME, providing support for ESS and EKC system assessments.
Fully versed in the general tenets of the DoD's authorization process, including relevant cybersecurity policies, procedures, and processes.
Support the DoD cybersecurity process by serving as a SME for ESS and/or EKC systems undergoing authorization.
Design, develop, and implement cybersecurity measures into systems, delivering comprehensive cybersecurity assessment documentation.
Understand and apply security controls identified in NIST 800-53 to the process of assessing and authorizing DLA ESS and EKC systems.
Determine the severity value of identified vulnerabilities and assess their potential impact on the system's current or future authorization status.
Perform key functions related to security control selection, implementation, and documentation.
Collaborate closely with the Information Systems Security Manager (ISSM) on complex system details.
Monitor and control communications at key internal boundaries among subsystems and provide system-wide common controls that meet or exceed the requirements of constituent subsystems.
Lead the development, integration, and testing processes to deliver and deploy production-ready systems that meet business requirements and project schedules.
Work closely with product management to translate business requirements into technical solutions, architecture design, level of effort, and project schedule.
Design architecture and establish best practices to produce efficient and effective system operations while minimizing refactoring and rework.
Provide support for the Security Technical Implementation Guides (STIGs) process and develop and submit cybersecurity documentation as required.
Ensure the implementation of DoD STIG compliance for ESS/EKC systems/applications and maintain compliance with required DoD STIGs.
Support reviews associated with STIGs, cyber assessments, and continuous monitoring activities.
REQUIRED QUALIFICATIONS
Experience:
Five (5) years of relevant C&A experience
MF and NIST C&A experience
DOD cybersecurity experience
Certifications: (One of the following)
CGRC/CAP
CASP+
CCSP
SSCP
Security+
GSEC
CISM
CISSO
FITSP-M
GCIA
GCSA
GCIH
GSLC
GICSP
CISSP-ISSMP
CISSP
Clearance:
Must possess a Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
Overview
We are seeking a Senior System Security / Cybersecurity Analyst to join our team supporting DLA Integrated Electronic Security Systems (IESS) and Electronic Key Control (EKC).
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Location: Columbus, OH
Type of environment: On Site
Noise level: Medium
Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
U.S. Citizen
Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
Auto-ApplyInformation Security Expert
Cryptographic vulnerability analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Controls Analyst
Remote cryptographic vulnerability analyst job
About the Role:
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do:
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Participate in required compliance training and support internal/external audit activities.
What We're Looking For:
• Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
• Education:
Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
• Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
• Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Travel:
Up to 5% travel required.
Supervisory Responsibility:
This position does not have direct supervisory responsibilities.
Conditions of Employment:
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Non-Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Auto-ApplyPrincipal, Workday PAT Analyst
Remote cryptographic vulnerability analyst job
Toast creates technology to help restaurants and local businesses succeed in a digital world, helping business owners operate, increase sales, engage customers, and keep employees happy.
Toast is a leading cloud-based restaurant and retail management software company based in Boston, Massachusetts. The company provides an all-in-one point of sale system, driven by a commitment to fostering a world-class customer and employee experience, recognized as a key competitive advantage. The People Products team, a strategic arm of the People and Places organization, is dedicated to amplifying this ambition by pioneering AI-powered, conversational, self-service products. These solutions are designed to deliver hyper-personalized employee experiences and actionable workforce intelligence, thereby profoundly enhancing global productivity and engagement.
We are seeking a Principal Workday Architect to serve as a techno-functional Workday PAT expert (70%) and a Benefits configuration expert (30%) and thought partner. This is a highly visible, strategic role that demands a blend of deep technical mastery in Workday and the ability to influence organizational process and technology roadmaps. As a strategic architect and trusted executive-level advisor to the People, Payroll, Finance, IT, and Benefits departments, you will be responsible for configuring and leading the development of robust, scalable, compliant, and impactful Workday solutions that directly drive transformational change in the employee experience and operational efficiency across the enterprise.
A day in the life (Responsibilities)
PAT Global Architecture and Strategic Leadership (70%)
Act as the definitive global Workday architecture Subject Matter Expert (SME) for global Payroll, Absence, and Time Tracking (PAT). Provide thought leadership and deep technical guidance on these domains, including the optimal architecture for data management between Workday and Cloudpay/external systems.
Define the multi-year technical roadmap for the Workday PAT ecosystem, ensuring all configurations meet evolving global labor laws and tax regulations.
Provide strategic, executive-level counsel on Workday capabilities, compliance risks, and technical debt, driving decisions on major global policy changes, country rollouts, and legislative compliance (e.g., FLSA, EMEA/APAC working time directives).
Workday Benefits Architecture and Administration (30%)
Architect Global Benefits: Own the strategic design and configuration of all Benefit Plans, Plan Types, Coverage Levels, and complex Eligibility Rules across the enterprise, ensuring alignment with global and regional compensation philosophies.
Lead Enrollment Events: Configure and manage end-to-end Open Enrollment and Life Events/Change Benefits Events, defining workflow rules, validation processes, and employee self-service experience.
Own Carrier Integrations: Serve as the technical owner for the Workday Cloud Connect for Benefits, architecting and validating the secure and accurate transmission of enrollment and deduction data to external carriers.
Benefits-to-Payroll Integration: Ensure the seamless integration of Benefit Deductions into the Payroll system, setting up the necessary Pay Components and mappings to guarantee accurate gross-to-net calculations and compliance (e.g., ACA reporting).
Hybrid Global Payroll Integration Architecture
Lead the End-to-End Design and Expansion of the Workday <> CloudPay Integration: Serve as the primary architect for the Workday-CloudPay connection, utilizing certified frameworks (e.g., Global Payroll Connect) to manage the secure and efficient bi-directional flow of complex time, absence, and payroll data as Toast scales globally.
Determine the global payroll delivery architecture, defining the criteria for which countries utilize Workday Native Payroll versus the CloudPay integration, optimizing the distribution of PAT functionality (Time, Absence, and Payroll) for each new market.
Manage Cross-System PAT Data Configuration and Integrity: Own the governance, validation rules, and error-handling protocols for all critical data exchanged between Workday HCM, Time/Absence, and CloudPay, ensuring data consistency and reliability for global payroll execution.
Lead the design and deployment of the integration for new country rollouts, specifically utilizing certified frameworks like Workday Global Payroll Connect (GPC), Additional Payroll Data (APD), and Data Changes on Demand (DCOD).
Complex Configuration and Compliance Assurance
Lead the end-to-end configuration and design of the most complex PAT and Benefits processes, including advanced calculation rules for overtime/shift differentials, complex accrual and balance plans, regional/country-specific time policies, and Evidence of Insurability (EOI) rules.
Establish and enforce rigorous design principles to ensure system stability, data integrity, and seamless integration to minimize pay cycle risk across all payroll methodologies (Workday and CloudPay).
Partner with Finance and People Operations to redesign and transform complex processes, maximizing automation to achieve a "touchless payroll" environment by designing innovative, future-state Workday solutions.
What you'll need to thrive (Requirements)
A minimum of ten (10) years of hands-on, expert-level Workday configuration experience.
At least seven (7) years of deep, primary functional expertise specifically within Workday Payroll, Absence, and Time Tracking (PAT).
Mandatory: Proven architectural expertise in configuring and managing Workday Benefits (Plan Setup, Eligibility, Enrollment Events, and Carrier Integrations).
Mandatory: Proven, hands-on architectural experience managing and expanding Workday Global Payroll Integrations with a third-party provider (CloudPay experience is a significant advantage).
A minimum of ten (10) years of demonstrated experience architecting, building, and governing complex Workday security, reporting, and calculated fields within high-risk functional areas.
Proven track record as a Principal Architect/Lead for at least two major global Workday payroll implementation programs, managing a complex hybrid payroll environment.
Expert-level knowledge of global labor compliance requirements and how they translate into integrated Workday/CloudPay configuration.
Direct, end-to-end ownership of SOX-compliant programs and processes related to payroll sign-off, time approvals, system changes, and Benefits deductions in an integrated environment.
Exceptional executive-level written and verbal communication and negotiation skills, with a proven ability to influence CFO, VP of People, and CIO-level stakeholders on high-risk PAT and Benefits decisions.
AI at Toast
At Toast, one of our company values is that we're hungry to build and learn. We believe learning new AI tools empowers us to build for our customers faster, more independently, and with higher quality. We provide these tools across all disciplines, from Engineering and Product to Sales and Support, and are inspired by how our Toasters are already driving real value with them. The people who thrive here are those who embrace changes that let us build more for our customers; it's a core part of our culture.
Our Total Rewards Philosophy
We strive to provide competitive compensation and benefits programs that help to attract, retain, and motivate the best and brightest people in our industry. Our total rewards package goes beyond great earnings potential and provides the means to a healthy lifestyle with the flexibility to meet Toasters' changing needs. Learn more about our benefits at ********************************************
The base salary range for this role is listed below. The starting salary will be determined based on skills and experience. In addition to base salary, our total rewards components include cash compensation (overtime, bonus/commissions, if eligible), benefits, and equity (if eligible).
Pay Range$108,000-$173,000 USD
Diversity, Equity, and Inclusion is Baked into our Recipe for Success
At Toast, our employees are our secret ingredient-when they thrive, we thrive. The restaurant industry is one of the most diverse, and we embrace that diversity with authenticity, inclusivity, respect, and humility. By embedding these principles into our culture and design, we create equitable opportunities for all and raise the bar in delivering exceptional experiences.
We Thrive Together
We embrace a hybrid work model that fosters in-person collaboration while valuing individual needs. Our goal is to build a strong culture of connection as we work together to empower the restaurant community. To learn more about how we work globally and regionally, check out: *********************************************
Apply today!
Toast is committed to creating an accessible and inclusive hiring process. As part of this commitment, we strive to provide reasonable accommodations for persons with disabilities to enable them to access the hiring process. If you need an accommodation to access the job application or interview process, please contact candidateaccommodations@toasttab.com.
------
For roles in the United States, It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Auto-ApplyInformation Security & Systems Analyst
Cryptographic vulnerability analyst job in Dublin, OH
Join a team dedicated to making a real difference in the lives of our community. Our Mission at Friendship Village of Dublin is
“To care for, engage, and inspire our community to reimagine and maximize quality of life at every age”
.
At Friendship Village our Values Drive us to RISE to any Occasion
Values:
Respect
Integrity and Innovation
Stewardship
Excellence
We are seeking a Information Security & Systems Analyst to contribute to our mission by:
The Entry to Mid-Level System Analyst performs security, compliance and administration of systems and is responsible for the design, installation and management, configuration and reliable operation of security/compliance mechanisms, systems and policies that protect the computer network and information systems against cyber events. Participate in research and development to continuously improve and keep up with the IT business needs of the organization. Actively resolve problems and issues with computer and server systems to limit work disruptions within the company.
Essential Duties:
Design, install and manage security mechanisms that protect the computer network and information systems against threats including but not limited to hackers, breaches, viruses and spyware.
Educate and provide awareness to users regarding security policies and procedures as well as threats.
Develop and maintain security policies and guidelines around information classification, system integrity, incident response and user access.
Monitor, audit and review systems for and identify violations or attempted violations of security procedures, processes and access.
Plan and implement appropriate measures to safeguard data from accidental or unauthorized modification, destruction or disclosure.
Respond to incidents, investigate potential incidents and recommend enhancements to close potential security gaps and serve as a backup to other members of the Technology department.
Responsible for post breach/data loss activities including but not limited preservation of evidence, review of data to determine scope and support of legal and other processes.
Participate in supporting efforts, making sure all networks, systems, applications, servers, technology tools and related equipment problems are resolved in a timely manner with limited disruptions.
Monitor performance and maintain systems according to requirements.
Ensure security through access controls, backups and firewalls.
Recommend when to upgrade systems with new releases and models.
Timely completion of IT Projects.
All other duties as assigned.
Information Security & Systems Analyst Responsibilities:
Safeguard and help prevent cyber-attacks:
Implement industry best practices for cyber security.
Be up to date about the latest security trends and newest security technology.
Assist other technical support staff in identifying and implementing appropriate security safeguards, including patch applications and anti-malware strategies.
Operate, administer and monitor network and host-based intrusion detection/prevention systems.
Ensure ongoing compliance with industry standards for information security:
Participating in risk assessments to identify potential security threats
Conducting employee training on security policies and responsibilities
Auditing IT systems to ensure compliance with regulations.
Reporting security breaches to management for prompt resolution.
Collaborating with vendors to ensure proper data handling security measures.
Monitoring compliance with state and federal data privacy and security regulations.
Developing policies and procedures for maintaining data security.
Monitor and report on devices and networks including:
Maintain, configure, secure and provide reliable operation of computers systems, network servers, and virtualization.
Network switch and firewall health
Internet traffic and usage metrics
Design and install network devices and systems (including maintaining current software versions on all network equipment) Demonstrates ability to independently troubleshoot and diagnose network, telephone, Internet, Wi-Fi, network.
Assists with work order requests:
Helps the IT Team meet service levels of quality and responsiveness:
Satisfaction goal of 90%
2-business-day response time (resolution time dependent on issue SLA)
Creates, updates and closes tickets in incident management system.
Qualifications:
• Bachelor's degree in computer science, programming, or a related field or equivalent industry experience.
• 2-4 Years of Security or Systems Analyst experience
REQUIRED NON TECHNICAL QUALIFICATIONS
• Must have the ability to work under pressure, without constant direction and to react in a positive and spontaneous manner to the needs of residents, staff, visitors, and vendors.
• Must be able to independently handle multiple simultaneous tasks, following specific instructions carefully and general instructions completely.
• Excellent communication skills
• Resourcefulness and problem-solving aptitude
• Self-starter mentality willing to make constant improvements in the technical support process.
• Takes pride and ownership of the support role.
• Excellent customer service and communication skills
• Ability to assess resident and staff complaints and resolve disputes in a friendly professional manner.
REQUIRED TECHNICAL QULAIFICATION
• Strong understanding of cybersecurity tools, concepts and best practices.
• Knowledge of information security frameworks (e.g.,HIPAA, NIST) and relevant regulations.
• Knowledge of Windows Operating Systems - Desktop (10 and 11) and Server (2016+)
• Windows desktop device configuration, management, and operation.
• IOS Device configuration, management, and operation.
• Networking Concepts and basic troubleshooting (DNS, DHCP, IP Addressing).
• Switching and Routing Concepts (basic troubleshooting and configuration).
• Meraki Network and Camera Equipment
• VOIP/PBX
• Demonstrated working in a helpdesk ticketing environment.