Cyber security analyst jobs in Bothell, WA - 203 jobs
All
Cyber Security Analyst
Securities Analyst
Cyber Security Engineer
Security Engineer
Senior Security Engineer
Information Security Engineer
Information Security Analyst
Security System Engineer
Senior Security Analyst
Senior Red Team Engineer - Finance Security & Adversarial Testing
Robinhood 4.7
Cyber security analyst job in Bellevue, WA
A leading financial technology company based in Menlo Park, CA seeks an Offensive Security Engineer to enhance security and build resilience across their products. This role involves mentoring, conducting Red Team exercises, and collaborating on security findings with various teams. Ideal candidates have 5+ years of experience and strong communication skills. Attractive compensation includes health insurance and support for personal wellness. Join us to help democratize finance for all.
#J-18808-Ljbffr
$137k-192k yearly est. 3d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in Seattle, WA
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$80k-111k yearly est. Easy Apply 6d ago
Information Security Engineer
Apple Inc. 4.8
Cyber security analyst job in Seattle, WA
Apple Information Security organization is seeking an information security engineer to support the enhancement of our security solutions. At Apple, we are a diverse collection of thinkers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply collaborative place, where everything we create is the result of people in different roles and teams working together to make each other's ideas stronger. That same passion for innovation that goes into our products also applies to our practices, strengthening our commitment to leave the world better than we found it.
Apple Information Security organization builds, deploys and operates security solutions throughout Apple, enabling our teams to do their best work, securely. In this role, you will join a team responsible for identifying, developing and enhancing the security insights we derive from the data our solutions generate This is a hands-on role in a dynamic and fast paced environment. As an information security engineer, you will: * Leverage deep functional expertise across Offensive and Defense security domains, to perform data analysis, identifying insights which both deliver meaningful security outcomes and can be operationalised at scale. * Partner with engineering and business teams, to identify, design and implement new features into our solutions, which enable us to extend and enhance the insights we generate. * Navigate ambiguity, be adept at managing competing priorities, and be able to effectively partner across teams to achieve a security outcome. You will have the opportunity to innovate on technology with a global reach. We are looking for a self-motivated individual with an intuition for security who is not afraid to question assumptions. The ability to be results-driven and comfortable with dynamic requirements, as well as having excellent interpersonal and time management skills, are keys to success in this position. Show us your talent in this challenging, fun, and exciting environment. It's what makes us Apple.
Proven ability to design, develop and deliver proof of concept solutions to address requirements Experience in Data and Analytics using technologies like Pandas or Spark Experience in programming using an object orientated language Experience in applying and experimenting with AI/ML, to solve security related use-cases Experience of working across the solutions development lifecycle Familiarity with cloud platforms (e.g., AWS, GCP) and their security services is a plus.
A Bachelor's Degree or equivalent years of work experience More than 5 years of applied experience in an operational cybersecurity role, such as Incident Response, Threat Intelligence, or Vulnerability Management. Experience of interpreting threat and vulnerability details, and devising ways to identify them in endpoint, network, and application Experience with security tools and technologies (e.g. XDR, IDS/IPS, EDR). Able to work with and present to technical engineers and business stakeholders Excellent verbal and written communication skills Ability to build and maintain strong internal and external collaborative relationships.
The Integrity, Investigations, Intelligence and Events (i3E) teams at Meta are dedicated to protecting the users of our family of applications (e.g. Facebook, Instagram, WhatsApp, Oculus) from a multitude of threats including: criminal organizations, human trafficking and exploitation, and scams/fraud. We are seeking a securityanalyst - threat investigator to investigate sophisticated threat actors, advance investigative methods, automate and mature team processes through tooling, and use innovative approaches to protecting people from offline harm. You will have the opportunity to work on some of the most challenging, complicated, and high-visibility risks the company is facing.We are seeking an experienced securityanalyst to help drive our understanding and mitigation of child sexual abuse and exploitation on our family of apps. In addition to investigating complex threats, the ideal candidate will have an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our platforms. The ideal candidate will be someone with experience of solving complex problems and embracing ambiguity to drive novel and impactful solutions, who is motivated by our mission and will be able to extract, assimilate, and correlate a wide variety of data in order to surface, analyze, and disrupt threat actors across multiple spaces.
**Required Skills:**
Threat Investigator, SecurityAnalyst - Youth Safety, i3E Responsibilities:
1. Investigate complex child sexual exploitation operations to understand how abuse manifests on Meta's platforms and the wider information ecosystem
2. Lead a portfolio of investigative research to include identifying abuse trends, understanding adversarial behavior, and designing forward-looking enforcement strategies to mitigate harm
3. Proactively hunt for threats and undetected abuse by leveraging internal data sets, open-source intelligence, and third-party private intelligence
4. Analyze qualitative and quantitative data to advance investigations, quantify trends and support findings with clear, concise evidence
5. Apply analytical rigor to investigations, analysis, and programs while looking for strategic improvement opportunities
6. This role involves exposure to graphic and/or objectionable content including but not limited to graphic images, videos and writings, offensive or derogatory language, and other potential objectionable material, i.e. child exploitation, graphic violence, self-injury, animal abuse, and other content which may be considered offensive or disturbing
**Minimum Qualifications:**
Minimum Qualifications:
7. 2+ years work experience performing security investigations in government, intelligence, cybersecurity, journalism and/or private sector organizations
8. Subject matter expertise or prior work experience in child safety based laws or policies (i.e intelligence, law enforcement, legal analysis, or NGO)
9. Experience with open source investigation techniques and familiarity with a variety of internet research tools
10. Experience leveraging SQL, OSINT, and network security concepts in an investigative context
11. Adept at developing multi-source, evidence-based findings and communicating them to varied audiences
12. Bachelors Degree in Computer Science, Information Systems, Intelligence Studies, Cybersecurity or related field or equivalent work experience in information security
**Preferred Qualifications:**
Preferred Qualifications:
13. Experience conducting large scale data analysis and utilizing big data tools such as Jupyter Notebook, Maltego, Palantir, etc
14. Experience working on high-impact threats under compressed timelines
15. Experience working or managing projects that have enterprise-wide impact and/or multi-organization cross functional stakeholders
16. Experience working with a team spanning multiple locations/time zones
**Public Compensation:**
$111,000/year to $162,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$111k-162k yearly 30d ago
Threat Hunter / Security Analyst
Galvanick
Cyber security analyst job in Seattle, WA
Galvanick protects the industrial world against cyber attacks. Our threat detection platform defends the modern world against criminals and nation-states that target Operational Technology (OT) systems and networks. This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.
About the Role
We are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick's growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.
What You Will Do
* Develop and implement effective detection strategies and ensure comprehensive threat coverage. You will be responsible for hunting and monitoring for threats using hundreds of telemetry sources from across the Galvanick platform.* Stay updated with the latest security trends, attack techniques, and vulnerabilities to continuously improve our threat detection capabilities.* Investigate and respond to security incidents, conducting thorough analysis and providing timely resolution.* Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for customers. You will respond to customer questions relating to threat intelligence and threat hunting.* Identify opportunities to increase overall customer satisfaction or streamline internal processes.* Perform adversary-focused threat hunting to identify abnormalities in the environment, with a focus on public cloud environments.* Contribute to automation and tooling that support hunting operations. Develop and maintain comprehensive documentation of threat hunting activities, findings, and remediation steps.
Who You Are
* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Fluency with Python and an understanding of query languages. You are comfortable getting into the code and helping with detections.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint. * In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks. * Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats. * Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses. * Proven experience as a SOC analyst or threat hunter, with a strong operational security background. * Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.
Bonus Points
* Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. * Knowledge of cyber threat intelligence terminology and data communication concepts and technologies. * You enjoy solving problems and are naturally curious about the technologies and tools you use. * Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems. * Experience with industrial, operational, or fulfillment environments. * Relevant certifications such as CISSP, CEH, or GCIH are desirable.
Benefits
We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member's vitality, health, and wellness. Our compensation reflects the cost of labor across various geographic markets. The base pay for this position ranges from $100,000/year in our lowest geographic market up to $180,000/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Galvanick is an early stage startup and base salary is only one component of our compensation package. Dependent on the position offered, equity may be provided as part of the compensation package, in addition to medical, financial, and/or other benefits.
Location
The Galvanick engineering team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.
ITAR Requirements
To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here.
$100k-180k yearly 5d ago
Cyber Security Engineer - Bellevue, WA
Info. Services Inc. 4.2
Cyber security analyst job in Bellevue, WA
Resource should be able to do effective planning, execution, and management of multi-faceted projects related to security assurance, risk management, cyber-security, data security, application security, network security and infrastructure/information asset protection. Reviews assessment progress against established goals, objectives, service level targets and project milestones.
Responsibility & technical skills:
Perform Business Impact Analysis of different projects in flight and upcoming from security perspective.
· Evaluate each project against Security practices and provide a Security Architecture Score rating.
Evaluate the efficiency, effectiveness and compliance of operation processes with corporate security policies and related government regulations.
Should have sound understanding of Mobile Device Management and Security.
Should have sound understanding of various CyberSecurity Frameworks.
Should have sound understanding of secure coding practices for enabling secure SDLC into development phase.
Worked on different risk framework like COSO's ERM, FERMA, NIST-RMF and knowledge of security architecture like - SABSA, OSA, TOGAF 9.
Extensive understanding of Web application architecture and security framework.
Deep Understanding of various Application Threat Models and their applicability to existing and upcoming applications.
Perform Vulnerability Analysis of applications based on the industry wide Application Security Threat Models like ASF, STRIDE and Risk Assessment model like DREAD.
Provide technical solutions to mitigate the vulnerabilities identified during threat modelling and vulnerability analysis.
Perform Privacy and Security Policy Impact Security Architecture Assessment.
Better understanding of integrating Ticketing system with various technologies so as to track incidents and hence remediation holistically.
Must possess sound understanding of Data Privacy and Security regulations.
· Evaluate all design documentations and perform design assessments to ensure appropriate security controls are implemented within designs.
· Develop Reference Architectures and Roadmaps for program initiatives
Recommend strategies to mitigate vulnerabilities emanating from Vulnerability Assessments and Penetration Tests of Applications both at production level and source code level, i.e. DAST and SAST.
Done assessment on ISO 27001, NIST-CSF, CIS-CSC, PCI-DSS, SCADA systems, cloud security assessment.
Assist in development of audit / assessment plans, audit schedules and a dashboard to track the project progress.
Identify processes, situations, etc., where organization is meeting requirements, as well as identify opportunities for improvement
Assist audit team in developing audit reports; present audit reports to top management, as needed
Execute and properly document the audit process on a variety of cybersecurity environments.
Possess strong analytical and problem solving abilities
Manage and develop a team of cybersecurity assessment
Prepare effective reports and metrics to highlight the project status and findings to management.
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
$88k-123k yearly est. 1d ago
Cyber Security Platform Engineer
Confiz
Cyber security analyst job in Seattle, WA
Confiz is seeking a highly motivated and experienced Senior Security Platform Engineer to design, implement, and support mission-critical security platforms across multi-cloud and multi-platform environments. This role requires minimal supervision and close collaboration with cross-functional teams including project managers, engineers, developers, business stakeholders, and senior leadership to deliver secure, scalable, and reliable security solutions.
Responsibilities
Design, implement, and support secure platform configurations for enterprise security technologies, including EDR, CSPM, and Email Security, across AWS, Azure, GCP, and OCI.
Integrate security platforms with CI/CD pipelines and cloud-native services to enable automated detection and remediation.
Develop and maintain scripts to automate platform operations, monitoring, and troubleshooting.
Author and contribute to project plans, engineering documentation, and detailed test plans.
Partner with business and technology teams to deliver highly available, performant, and cost-effective security systems and services.
Analyze platform metrics and continuously optimize configurations for effectiveness and efficiency.
Support secure deployment of security platforms in containerized and virtualized environments.
Create dashboards and reports to visualize platform health, performance, and overall security posture.
Analyze logs, packet captures, security alerts, and forensic artifacts in alignment with security protocols and standards.
Participate in an on-call rotation as required to support critical security services.
Qualifications
Bachelor's or Master's degree in Information Technology, Computer Science, Cybersecurity, or a related field (or equivalent professional experience).
3+ years of experience in cybersecurity or a related field.
2+ years of hands-on experience with programming or scripting languages such as Python, PowerShell, or Ruby.
Proven experience with cloud security, automation, and platform engineering.
Experience supporting and operating enterprise security platforms such as Email Security, CSPM, EDR, SIEM/SOAR, Zero Trust, and encryption technologies.
Advanced understanding of systems design principles and technical architectures, with a demonstrated track record of technology selection, implementation, and operational support.
Strong written and verbal communication skills, with the ability to clearly explain technical concepts to both technical and non-technical audiences.
Strong customer service orientation with the ability to collaborate effectively across all organizational levels.
Ability to manage multiple priorities and meet deadlines in a fast-paced environment.
Highly organized, responsive, and detail-oriented problem solver.
Demonstrated work ethic, high energy, and a positive, proactive attitude.
Independent, entrepreneurial mindset with a passion for continuous improvement.
Willingness and ability to quickly learn and adopt new technologies and tools.
Strong focus on automation and streamlining operational processes.
We have a global team of amazing individuals working on highly innovative enterprise projects & products. Our customer base includes Fortune 100 retail and CPG companies, leading store chains, fast growth fintech, and multiple Silicon Valley startups.
What makes Confiz stand out is our focus on processes and culture. Confiz is ISO 9001:2015 (QMS), ISO 27001:2022 (ISMS), ISO 20000-1:2018 (ITSM) and ISO 14001:2015 (EMS) Certified. We have a vibrant culture of learning via collaboration and making workplace fun.
People who work with us work with cutting-edge technologies while contributing success to the company as well as to themselves.
To know more about Confiz Limited, visit ***************************************
$84k-118k yearly est. 2d ago
Virtual Cyber Security SDR, BDR
Planet Green Search
Cyber security analyst job in Seattle, WA
Virtual CyberSecurity SDR, BDR, Contract to Hire Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence.
Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft.
They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process.
This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel.
We Are Looking For:
As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category!
What You'll Do:
Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing.
Make daily outbound calls/emails to prospects who have demonstrated interest.
Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel.
Record all activities and properly manage lead stage/flow in our Salesforce CRM.
Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs.
Schedule product demos on AE's calendar.
Discern buyer intent and partner with AEs to get the right customers onboarded.
Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features.
What You'll Need:
Must have BDR/SDR experience in the SaaS or similar software space
Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel.
Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone.
Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must.
Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important.
Must be a great listener with an ability to address objections graciously and frame the next steps clearly.
Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel.
Verifiable track record of success and goal attainment in a frontline sales-oriented role
Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important.
Track record of (over)achieving sales quotas.
Must have a strong, self-motivated drive, passion, and desire to deliver results.
Experience in a fast-growing startup environment is a big plus.
What We Offer:
Contract to Hire, Strong Salary plus comm after 90 days
Full Benes
PreIPO equity
Be part of an exciting high-growth SaaS organization
An impactful role with lots of growth potential
A lot of freedom to apply your creative and strategic skills
A work-hard, play-hard environment
100% virtual
Virtual CyberSecurity SDR, BDR, Contract to Hire
$84k-118k yearly est. 60d+ ago
Cyber Security Engineer - Bellevue, WA
Info-Ways
Cyber security analyst job in Bellevue, WA
Role: CyberSecurity Engineer Duration: 6+ Months BGV will be done for the selected candidates.
Job Description: Resource should be able to do effective planning, execution, and management of multi-faceted projects related to security assurance, risk management, cyber-security, data security, application security, network security and infrastructure/information asset protection. Reviews assessment progress against established goals, objectives, service level targets and project milestones.
Responsibility & technical skills:
Perform Business Impact Analysis of different projects in flight and upcoming from security perspective.
· Evaluate each project against Security practices and provide a Security Architecture Score rating.
Evaluate the efficiency, effectiveness and compliance of operation processes with corporate security policies and related government regulations.
Should have sound understanding of Mobile Device Management and Security.
Should have sound understanding of various CyberSecurity Frameworks.
Should have sound understanding of secure coding practices for enabling secure SDLC into development phase.
Worked on different risk framework like COSO's ERM, FERMA, NIST-RMF and knowledge of security architecture like - SABSA, OSA, TOGAF 9.
Extensive understanding of Web application architecture and security framework.
Deep Understanding of various Application Threat Models and their applicability to existing and upcoming applications.
Perform Vulnerability Analysis of applications based on the industry wide Application Security Threat Models like ASF, STRIDE and Risk Assessment model like DREAD.
Provide technical solutions to mitigate the vulnerabilities identified during threat modelling and vulnerability analysis.
Perform Privacy and Security Policy Impact Security Architecture Assessment.
Better understanding of integrating Ticketing system with various technologies so as to track incidents and hence remediation holistically.
Must possess sound understanding of Data Privacy and Security regulations.
· Evaluate all design documentations and perform design assessments to ensure appropriate security controls are implemented within designs.
· Develop Reference Architectures and Roadmaps for program initiatives
Recommend strategies to mitigate vulnerabilities emanating from Vulnerability Assessments and Penetration Tests of Applications both at production level and source code level, i.e. DAST and SAST.
Done assessment on ISO 27001, NIST-CSF, CIS-CSC, PCI-DSS, SCADA systems, cloud security assessment.
Assist in development of audit / assessment plans, audit schedules and a dashboard to track the project progress.
Identify processes, situations, etc., where organization is meeting requirements, as well as identify opportunities for improvement
Assist audit team in developing audit reports; present audit reports to top management, as needed
Execute and properly document the audit process on a variety of cybersecurity environments.
Possess strong analytical and problem solving abilities
Manage and develop a team of cybersecurity assessment
Prepare effective reports and metrics to highlight the project status and findings to management.
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
$84k-118k yearly est. 60d+ ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Seattle, WA
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$108k-147k yearly est. Easy Apply 5d ago
Blue Team DART - Staff Security Analyst
Coupang 4.5
Cyber security analyst job in Seattle, WA
We exist to wow our customers. We know we're doing the right thing when we hear our customers say, “How did we ever live without Coupang?” Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce.
We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day.
Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world.
Role Overview
As our CyberSecurity Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks.
The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis.
The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices.
What You Will Do
Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report
Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources
Ticket review, and security analysis escalated from SOC
Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare)
Analyze and respond to Email Security events
Oncall to response urgent security events or security issues
Collaborate effectively with internal teams through efficient communication
Minimum Qualifications
Bachelors Degree in Computer Science or a related technical field or equivalent professional experience.
4 years of experience in information Security with experience in CyberSecurity Incident Analysis
Preferred Qualifications
12+ years of experience in information security with at least 8+ years as a CyberSecurity Incident Analyst
Experience of Host based security investigation (Windows, Linux, Network/Security appliances)
Experience of analyzing security event and knowledge of AWS or Cloud environment
Experience of analyzing security event from Web security solutions (Akamai, CloudFlare)
Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc)
Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc)
Experience and skills querying SIEM Solutions for analyzing security events from the logs
Skill to analyze big data or big size logs
Experience in Automation and Scripting using Bash, Python, PowerShell
Proactive and proactive work attitude
Pay & Benefits
Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $138,000/year in our lowest geographic market to $297,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience.
General Description of All Benefits
Medical/Dental/Vision/Life, AD&D insurance
Flexible Spending Accounts (FSA) & Health Savings Account (HSA)
Long-term/Short-term Disability
Employee Assistance Program (EAP) program
401K Plan with Company Match
18-21 days of the Paid Time Off (PTO) a year based on the tenure
12 Paid Holidays
Paid Parental leave
Pre-tax commuter benefits
MTV - [Free] Electric Car Charging Station
General Description of Other Compensation
“Other Compensation” includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale.
Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate.
If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************.
Requisition # R0064933
$80k-118k yearly est. Auto-Apply 27d ago
Information Security Specialist (Cyber security analysis)
Aditistaffing
Cyber security analyst job in Bellevue, WA
Job Title: “Information Security Specialist” (Cybersecurity analysis)
Duration: 9+ Months (with high possibility of extending into full time)
Job Description:
This position is in Corporate Information Security and under the direction of the Manager, Third-Party Cybersecurity Assessments. The Cybersecurity Assessment Analyst will perform cybersecurity assessments on new and existing third parties. The Analyst will construct detailed and summary reports of assessments, including customized reports, as needed. The Analyst will work with Subject Matter Experts (SME) to develop and apply risk assessment criteria (aligned with Policy) to new and existing suppliers using internal and external business intelligence. The Analyst will work with Third-Party Risk Management, Privacy and Legal Counsel, Procurement and Contract Managers, Compliance, and Business Owners to develop and maintain an internal service model that informs the business of key risks in a timely manner to limit unnecessary impediments and avoid bureaucracy.
Specific responsibilities:
- Coordinate the development of information security policies, standards and procedures. Work with key IT offices, data custodians and governance groups in the development of such policies. Ensure that company policies support compliance with external requirements. Oversee the dissemination of policies, standards and procedures to the user community
- Coordinate the development and delivery of an education and training program on information security and privacy matters for employees, other authorized users, and vendors
- Serve as the company compliance officer with respect to state and federal information security policies and regulations. Work with the -designated internal audit, SOX compliance, legal, and HR on compliance issues as necessary. Prepare and submit and submit required reports to external agencies.
- Develop and implement an Incident Reporting and Response System to address security incidents (breaches), respond to alleged policy violations, or complaints from external parties.
- Serve as the official company contact point for information security, privacy and copyright infringement incidents, including relationships with law enforcement entities.
- Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing.
Required Qualifications:
Talent management, results focus and inspirational leadership.
Essential Functions
• Conduct third-party cybersecurity risk assessments, applying established criteria
• Support assessment team with quality assurance reviews over work product and reporting
• Collaborate with internal partners and third parties to mitigate and otherwise resolve third-party cyber risks
• Consistently deliver on commitments, deadlines and objectives while remaining in scope and leveraging appropriate tools, methods, frameworks, and professional standards
• Demonstrate consistent credibility with business partners and leadership while recommending initiatives, identifying gaps, and potential issues
• Continuously demonstrate the ability to work independently while representing the services of the department with the highest level of professionalism
• Demonstrate the ability to appropriately influence business decisions, and the professional judgment for selecting the appropriate methods and techniques to do so
Preferred Qualifications:
• Solid background both educationally and via professional experience. No less than 3 years' professional experience in business operations, project/program management, finance, risk management, information security, business analytics or similar.
• Experience in large companies and/or complex environments, or providing professional consulting services for them.
• Demonstrated abilities in problem-solving and analysis: identifies issues, analyses information to assess root cause and relationships, risks, and potential risk responses. Proven ability to synthesize and summarize complex data into concise recommendations and reports.
• Demonstrated strong business writing and professional oral communication skills.
• Proven ability to balance multiple priorities, adapt to a constantly changing business environment, work independently, drive projects to completion, and meet deadlines in a fast-paced environment-with only periodic supervision.
• Ability to work collaboratively and manage and initiate effective cross-functional relationships.
• Strong computer skills, including MS Office products (e.g. Word, Excel, PowerPoint, Visio) and other business software to prepare reports, memos, summaries, and analyses.
Desired
• Analytical - Synthesizes complex or diverse information; Collects and researches data; employs intuition and experience to complement data; Designs work flows and procedures.
• Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness. Applies feedback to improve performance; Monitors own work to ensure quality
• Planning/Organizing - Prioritizes and plans work activities to achieve success; Sets and achieves goals and objectives; Develops realistic action plans
• Professionalism - Reacts well under pressure; Keeps commitments; Accepts responsibility for own actions.
• Career Growth: Focus on cybersecurity auditing with potential advancement goals in engineering or threat analysis roles
• Self-directed team player with Agile environment experience
Education
Minimum Required
• Bachelor's Degree
• Equivalent experience is acceptable.
License or Certification
Desired: (one of the following):
CISA (Certified Information Systems Auditor)
GSEC (GIAC Security Essentials Certification)
CompTIA - Security+
ECSA - EC-Council Certified SecurityAnalyst
SSCP (Systems Security Certified Practitioner)
Other:
Six Sigma, PMP or Agile certificates
Other comments - suppliers:
Organizational skills; office suite knowledge; and good communication skills are “must haves”. Cybersecurity analysis experience is preferred.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$85k-126k yearly est. 60d+ ago
Senior Security Engineer
Otter 4.4
Cyber security analyst job in Seattle, WA
The Opportunity We are seeking an experienced Security Engineer to join our team and help secure Otter's cloud infrastructure and the systems behind our AI-powered meeting products. In this role, you will design and implement security controls, improve detection and response, reduce cloud risk through automation, and partner closely with DevOps and Engineering to ensure secure-by-default cloud deployments.
This is a highly hands-on role for someone who thrives in fast-moving environments, can balance risk reduction with shipping velocity, and enjoys building security capabilities that scale.
Your Impact
* Design and implement secure cloud architectures and guardrails across our environments (network segmentation, encryption, key management, secure service patterns).
* Own IAM security: access controls, least-privilege policies, privileged access workflows, and recurring access reviews.
* Build and scale cloud security infrastructure (logging, monitoring, alerting, vulnerability management, and DLP controls where appropriate).
* Harden CI/CD and infrastructure-as-code with security automation (secrets detection, dependency scanning, IaC scanning, policy-as-code).
* Monitor cloud security signals and investigate security alerts; continuously improve detection quality and reduce noise.
* Lead incident response for cloud security events and help mature playbooks, forensics readiness, and response processes.
* Conduct cloud security assessments and threat modeling for new architectures and high-impact changes; partner with Engineering to drive remediation.
* Support compliance requirements and security controls aligned to enterprise needs (e.g., HIPAA, PCI-DSS, GDPR; and security frameworks such as NIST / ISO 27001).
We're looking for someone who
* 5+ years of experience in cloud security engineering or closely related security engineering roles.
* Strong knowledge of cloud security architectures, controls, and compliance requirements.
* Expertise securing public cloud platforms (e.g., AWS, Azure), including multi-cloud networking considerations and designing cloud-agnostic patterns where needed.
* Solid understanding of container security, network security, and cloud security services.
* Experience building and operating core security capabilities such as logging/monitoring, vulnerability management, and (bonus) DLP.
* Strong understanding of security frameworks such as NIST and ISO 27001.
* Excellent problem-solving and analytical skills, plus strong communication and cross-functional collaboration.
* Bachelor's degree in Computer Science, Cybersecurity, or related field
About Otter.ai
We are in the business of shaping the future of work. Our mission is to make conversations more valuable.
With over 1B meetings transcribed, Otter.ai is the world's leading tool for meeting transcription, summarization, and collaboration. Using artificial intelligence, Otter generates real-time automated meeting notes, summaries, and other insights from in-person and virtual meetings - turning meetings into accessible, collaborative, and actionable data that can be shared across teams and organizations. The company is backed by early investors in Google, DeepMind, Zoom, and Tesla.
Otter.ai is an equal opportunity employer. We proudly celebrate diversity and are committed to building an inclusive and accessible workplace. We provide reasonable accommodations for qualified applicants throughout the hiring process.
Accessibility & Accommodations
Otter.ai is committed to providing reasonable accommodations for candidates with disabilities in our hiring process. If you need assistance or an accommodation during any stage of the recruitment process, please contact *********** at least 3 business days before your interview.
* Otter.ai does not accept unsolicited resumes from 3rd party recruitment agencies without a written agreement in place for permanent placements. Any resume or other candidate information submitted outside of established candidate submission guidelines (including through our website or via email to any Otter.ai employee) and without a written agreement otherwise will be deemed to be our sole property, and no fee will be paid should we hire the candidate.
Salary range
Salary Range: $185,000 to $210,000 USD per year
This salary range represents the low and high end of the estimated salary range for this position. The actual base salary offered for the role is dependent based on several factors. Our base salary is just one component of our comprehensive total rewards package.
#LI-Hybrid
$185k-210k yearly 40d ago
Information Security Engineering
Blackhount
Cyber security analyst job in Bellevue, WA
Are you ready to become a key player in Information Security Engineering?
Welcome to BlackHount Cyber University's Information Security Engineering Mastery Program, where you'll transform into an expert in safeguarding information systems.
What You'll Learn:
Risk Assessment: Understand and manage risks to ensure information safety across various platforms.
Cryptography: Master the art of securing information through encryption techniques and protocols.
Network Security: Learn how to protect data in transit across networks, including intrusion detection and prevention.
Security Architecture: Gain knowledge in designing robust security structures for information systems.
Incident Response: Equip yourself with the skills to detect, respond to, and recover from security breaches.
Security Policies: Understand how to develop and enforce policies to ensure information safety and compliance.
Security Auditing: Learn techniques for conducting thorough security checks and compliance audits.
Data Protection: Master strategies to ensure the confidentiality, integrity, and availability of data.
Access Control: Understand methods to control who or what can view or use resources in a computing environment.
Security Awareness: Cultivate a culture of security mindfulness within organizations.
Why Choose Our Program?
Real-world Application: Our curriculum emphasizes practical experiences and real-world problem-solving.
Expert Faculty: Our instructors are seasoned information security professionals with deep industry knowledge.
Vibrant Community: Join a network of ambitious peers and industry leaders passionate about information security.
Career Advancement: With dedicated job placement assistance, we're committed to helping you succeed in the field of Information Security Engineering.
Take your place as a defender of information integrity and confidentiality with BlackHount Cyber University. Secure your future and become a leader in Information Security Engineering!
Apply now to embark on your journey towards becoming an Information Security Engineering expert!
Visit us at BlackHount Cyber University
#SecureInformation #InformationSecurityEngineering #MasteryProgram #Cybersecurity #CareerAdvance
Job Requirements:
Strong Soft Skills: Clear communication and teamwork abilities, alongside problem-solving skills, are essential.
Foundational IT Knowledge: Understanding of basic IT concepts and structures is beneficial.
Dedication to Security: A robust interest and ongoing engagement with security trends and practices.
Analytical Mindset: Ability to think critically and creatively to solve complex security challenges.
Detail-Oriented: Precision and attention to detail are crucial in identifying and mitigating security threats.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-116k yearly est. 60d+ ago
Security Analyst
360 It Professionals 3.6
Cyber security analyst job in Bellevue, WA
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective-C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and Jquery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance-driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
• Participate in security planning and analyst activities.
• Performs security assessments and security attestations.
• Participates in security investigations and compliance reviews as requested.
• Make security analysis reports for security vulnerabilities and recommends feasible and appropriate options.
• Hands-on experience of Mobile Applications and Device security tools.
• Should have sound understanding of secure coding practices which are in conformance with OWASP Top 10, SANS and WASC.
• Understanding of various Application Security Threat Models and their applicability to existing and upcoming applications.
• Perform Vulnerability Analysis of applications based on the industry wide Application Security Threat Models like ASF, STRIDE and Risk Assessment model like DREAD.
• Prepare technical solutions to mitigate the vulnerabilities identified during threat modelling and vulnerability analysis.
• Hands-on experience of various Data Security Tools for Data Discovery, Governance, DLP, etc.
• Evaluate all design documentations and perform design assessments to ensure appropriate security controls are implemented within designs.
• Prepare strategies to mitigate vulnerabilities emanating from Vulnerability Assessments and Penetration Tests of Applications both at production level and source code level, i.e. DAST and SAST.
• Assist audit team in developing audit reports; present audit reports to top management, as needed and execute and properly document the audit process on a variety of cybersecurity environments.
• Possess strong analytical and problem solving abilities
• Worked on different security tools w.r.t. around VA, PC, DAST, SAST, PT.
Additional Information
Thanks and Regards,
Ankur Bhatia
$78k-101k yearly est. 60d+ ago
Staff Infrastructure Security Engineer
Crusoe 4.1
Cyber security analyst job in Seattle, WA
Job Description
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
We are seeking a highly skilled Staff Infrastructure Security Engineer to architect, deploy, and operationalize the foundational security services that will underpin our shift to a Zero Trust model.
In this strategic role, you will define and establish the "roots of trust" for our organization, serving as a technical leader in Secrets Management and Identity architecture. While your immediate focus is to serve as the Subject Matter Expert (SME) driving our enterprise HashiCorp Vault platform from Proof-of-Concept (PoC) to global production readiness, your long-term scope is far broader. You will be responsible for evolving our credentials management strategy, onboarding engineering teams to secure self-service workflows, and designing scalable trust patterns across our hybrid multi-cloud environment.
Key Responsibilities
1. Strategic Architecture & Governance
Zero Trust Architecture: Architect a highly available, disaster-resilient, and scalable multi-cluster secrets management platform that serves as the foundation for the organization's Zero Trust strategy.
Technical Leadership: Drive consensus across Cloud Engineering, DevOps, and SRE teams to define standardized secret management workflows and integrate security patterns into the SDLC.
Compliance & Governance: Ensure the platform design meets rigorous internal policies and external compliance frameworks (e.g., SOX, ISO 27001).
Policy as Code: Design and implement advanced governance controls, including Sentinel Policy as Code, to automate security guardrails and access decisions.
2. Platform Engineering & Implementation
Infrastructure as Code (IaC): Lead the engineering of the Vault infrastructure using Terraform, ensuring all deployments are reproducible, version-controlled, and automated.
Identity Integration: Architect the integration between the secrets platform, Identity Providers (Okta), and workload identities (Kubernetes Service Accounts) to establish robust machine-to-machine authentication.
Advanced Secrets Capabilities: Configure and tune essential secrets engines (KV, Transit, KMIP) and Enterprise features (Performance Replication, Seal automation) to support diverse engineering use cases.
3. Operational Excellence & Developer Enablement
Vault as a Service (VaaS): Operationalize the platform by building self-service mechanisms, distinct "paved road" onboarding procedures, and documentation that allows engineering teams to easily consume security services.
Observability: Implement comprehensive monitoring, alerting, and audit logging to ensure platform health, provide visibility into usage patterns, and satisfy audit requirements.
Lifecycle Management: Own the full operational lifecycle of the production environment, including patching, version upgrades, backup/restore procedures, and incident response runbooks.
Required Qualifications
6+ years (or equivalent) hands-on experience in cloud security, DevOps, or infrastructure engineering.
Deep expertise and proven track record deploying and managing HashiCorp Vault in an enterprise environment (experience with the Enterprise edition is highly preferred).
Expert-level knowledge of Secrets Management, X.509 PKI (Public Key Infrastructure), Certificate Authority Operations, and Cryptography concepts.
Strong experience with Google Cloud Platform (GCP) and cloud native identity and access management (IAM).
Proficiency with Infrastructure as Code (IaC) tools, especially Terraform, for automating the deployment and configuration of Vault and its dependent infrastructure.
Technical Skills
Fluent in at least one programming language (ideally Go or Python).
Demonstrable experience with Kubernetes and container security principles, especially integrating secrets into microservices architectures.
Strong understanding of network security concepts (IP addressing, IP routing, firewalls, segmentation, Zero Trust).
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$111k-157k yearly est. 10d ago
Security Engineer, Operating Systems
Anthropic
Cyber security analyst job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The annual compensation range for this role is below. For sales roles, the range provided is the role's On Target Earnings ("OTE") range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. Our total compensation package for full-time employees includes equity and benefits.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you ******************* email addresses. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you're ever unsure about a communication, don't click any links-visit anthropic.com/careers directly for confirmed position openings.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
$79k-113k yearly est. Auto-Apply 5d ago
Enterprise Security Engineer
Openai 4.2
Cyber security analyst job in Seattle, WA
About the Team Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions. As an Enterprise Security Engineer, you will work in a highly technical and employee-focused environment.
Our IT team is a small and nimble team, where you'll have the opportunity to dive into a wide breadth of areas and build from the ground up. We're well supported and well resourced, and have a mandate to deliver a world-class enterprise security program to our teams.
About the Role
As an Enterprise Security Engineer, you will be responsible for implementing and managing the security of OpenAI's internal information systems' infrastructure and processes. You will work closely with our IT and Security teams to develop security capabilities, enforce security policies, and monitor internal systems for security threats.
This role is open to remote employees, or relocation assistance is available to Seattle.
In this role, you will:
* Develop and implement security measures to protect our company's information assets against unauthorized access, disclosure, or misuse.
* Monitor internal and external systems for security threats and respond to alerts.
* Contribute to and enforce our company's IT and Security policies and procedures.
* Work closely with our IT department to harden our infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling.
* Advise our employees on best practices for maintaining the security of their endpoints, and office AV and network infrastructure.
* Devise novel sharing controls and associated monitoring to protect company data, including intelligent groups management, Data Loss Prevention (DLP) and other security controls as appropriate.
* Employ forward-thinking models like "secure by default" and "zero trust" to create sustainably secure environments for knowledge workers and developers.
* Identify and remediate vulnerabilities in our internal systems, adhering to best practices for data security.
* Use our own AI-driven models to develop systems for improved security detection and response, data classification, and other security-related tasks.
* Educate employees on the importance of data security, and advise them on best practices for maintaining a secure environment.
* Contribute to OpenAI's endpoint and cloud security roadmaps by staying up to date with the latest security threats, and making recommendations for improving our security posture.
You might thrive in this role if you have:
* Experience in protecting and managing mac OS fleets.
* Experience deploying and managing endpoint security solutions (e.g. management frameworks, EDR tools).
* Experience with public cloud service providers (e.g. Amazon AWS, Microsoft Azure).
* Experience with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM.
* Experience with e-mail security protocols (e.g. SPF, DKIM, DMARC) and controls.
* Intermediate or advanced proficiency with a scripting language (e.g. Python, Bash, or similar).
* Knowledge of modern adversary tactics, techniques, and procedures.
* Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's Affirmative Action and Equal Employment Opportunity Policy Statement.
Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
$110k-154k yearly est. 44d ago
Security Engineer
Armada 3.9
Cyber security analyst job in Bellevue, WA
About the Role
Responsibilities:
Design and implement security architectures for Azure cloud environments, hybrid infrastructure, and edge computing solutions
Develop and maintain security policies, standards, and procedures aligned with industry best practices and compliance requirements
Lead security incident response efforts and conduct thorough post-incident reviews
Perform security assessments, vulnerability scanning, and penetration testing across all environments
Implement and manage security tools for continuous monitoring and threat detection
Secure DevOps pipelines and CI/CD workflows, emphasizing "security as code" principles
Address unique security challenges related to AI/ML development, deployment, and operations
Collaborate with development teams to implement secure coding practices and conduct code reviews
Design and implement security architectures for Azure cloud environments, hybrid infrastructure, and edge computing solutions
Develop and maintain security policies, standards, and procedures aligned with industry best practices and compliance requirements
Lead security incident response efforts and conduct thorough post-incident reviews
Perform security assessments, vulnerability scanning, and penetration testing across all environments
Implement and manage security tools for continuous monitoring and threat detection
Secure DevOps pipelines and CI/CD workflows, emphasizing "security as code" principles
Address unique security challenges related to AI/ML development, deployment, and operations
Collaborate with development teams to implement secure coding practices and conduct code reviews
Design and implement robust identity and access management solutions
Stay current with emerging security threats and technologies
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience)
5+ years of experience in information security, with at least 3 years focused on cloud security
Strong experience with Azure security services and best practices
Familiarity with security tools such as Microsoft Defender for Cloud, Sentinel, etc.
Knowledge of compliance frameworks (NIST, ISO 27001, SOC2, etc.)
Proficient in using vulnerability scanners such as Nexpose and Nessus.
Knowledge of Python and SQL for scripting and database analysis.
Familiarity with Azure environments is preferred.
Security Engineering certifications (CISSP, CCSP, Azure Security Engineer) - at least one is preferred.
Offensive Security Certifications (OSCP, OSWP, OSEE, OSWE, CEH,) - at least one is preferred.
US Citizenship required
Equal Opportunity Statement
At Armada, we are committed to fostering a work environment where everyone is given equal opportunities to thrive. As an equal opportunity employer, we strictly prohibit discrimination or harassment based on race, color, gender, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other characteristic protected by law. This policy applies to all employment decisions, including hiring, promotions, and compensation. Our hiring is guided by qualifications, merit, and the business needs at the time.
Citizenship Requirements
For select roles, due to the nature of our clientele and the technologies involved, there may be specific nationality or citizenship indicated in the required qualifications section. These roles may involve access to sensitive information that is subject to export control regulations or other legal restrictions. In such cases, employment offers will be contingent upon your ability to comply with these requirements.
Compensation & Benefits
For U.S. Based candidates: To ensure fairness and transparency, the
starting
base salary range for this role for candidates in the U.S. are listed below, varying based on location experience, skills, and qualifications. In addition to base salary, this role will also be offered equity and subsidized benefits
(details available upon request)
.
$103k-145k yearly est. 60d+ ago
Information Security Analyst
Aditistaffing
Cyber security analyst job in Bellevue, WA
Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients.
Visit our website: http://www.aditistaffing.com/
Job Description
Role: Information SecurityAnalyst
Location: Information SecurityAnalyst
6-8 years of experience in information security / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups.
Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established.
While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the information security and privacy program.
Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls.
Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines.
Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls).
Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required.
Good to Have:
Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems
Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools
Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus
Experience in developing and administering an information security program desirable
Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable
Additional Information
Regards,
Arun Kumar R
arunkr(AT)aditistaffing.com
D: 425-457-7916
How much does a cyber security analyst earn in Bothell, WA?
The average cyber security analyst in Bothell, WA earns between $69,000 and $129,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Bothell, WA