Cyber Security Analyst
Cyber security analyst job in Seattle, WA
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplyInformation Security Engineer
Cyber security analyst job in Seattle, WA
Apple Information Security organization is seeking an information security engineer to support the enhancement of our security solutions. At Apple, we are a diverse collection of thinkers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply collaborative place, where everything we create is the result of people in different roles and teams working together to make each other's ideas stronger. That same passion for innovation that goes into our products also applies to our practices, strengthening our commitment to leave the world better than we found it.
Apple Information Security organization builds, deploys and operates security solutions throughout Apple, enabling our teams to do their best work, securely. In this role, you will join a team responsible for identifying, developing and enhancing the security insights we derive from the data our solutions generate This is a hands-on role in a dynamic and fast paced environment. As an information security engineer, you will: * Leverage deep functional expertise across Offensive and Defense security domains, to perform data analysis, identifying insights which both deliver meaningful security outcomes and can be operationalised at scale. * Partner with engineering and business teams, to identify, design and implement new features into our solutions, which enable us to extend and enhance the insights we generate. * Navigate ambiguity, be adept at managing competing priorities, and be able to effectively partner across teams to achieve a security outcome. You will have the opportunity to innovate on technology with a global reach. We are looking for a self-motivated individual with an intuition for security who is not afraid to question assumptions. The ability to be results-driven and comfortable with dynamic requirements, as well as having excellent interpersonal and time management skills, are keys to success in this position. Show us your talent in this challenging, fun, and exciting environment. It's what makes us Apple.
Proven ability to design, develop and deliver proof of concept solutions to address requirements Experience in Data and Analytics using technologies like Pandas or Spark Experience in programming using an object orientated language Experience in applying and experimenting with AI/ML, to solve security related use-cases Experience of working across the solutions development lifecycle Familiarity with cloud platforms (e.g., AWS, GCP) and their security services is a plus.
A Bachelor's Degree or equivalent years of work experience More than 5 years of applied experience in an operational cyber security role, such as Incident Response, Threat Intelligence, or Vulnerability Management. Experience of interpreting threat and vulnerability details, and devising ways to identify them in endpoint, network, and application Experience with security tools and technologies (e.g. XDR, IDS/IPS, EDR). Able to work with and present to technical engineers and business stakeholders Excellent verbal and written communication skills Ability to build and maintain strong internal and external collaborative relationships.
Blue Team DART - Senior Security Analyst
Cyber security analyst job in Seattle, WA
We exist to wow our customers. We know we're doing the right thing when we hear our customers say, "How did we ever live without Coupang?" Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce.
We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day.
Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world.
Role Overview
As our Cyber Security Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks.
The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis.
The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices.
What You Will Do
Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report
Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources
Ticket review, and security analysis escalated from SOC
Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare)
Analyze and respond to Email Security events
Oncall to response urgent security events or security issues
Collaborate effectively with internal teams through efficient communication
Minimum Qualifications
Bachelors Degree in Computer Science or a related technical field or equivalent professional experience.
2 years of experience in information Security with experience in Cyber Security Incident Analysis
Preferred Qualifications
8+ years of experience in information security with at least 5+ years as a Cyber Security Incident Analyst
Experience of Host based security investigation (Windows, Linux, Network/Security appliances)
Experience of analyzing security event and knowledge of AWS or Cloud environment
Experience of analyzing security event from Web security solutions (Akamai, CloudFlare)
Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc)
Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc)
Experience and skills querying SIEM Solutions for analyzing security events from the logs
Skill to analyze big data or big size logs
Experience in Automation and Scripting using Bash, Python, PowerShell
Proactive and proactive work attitude
Pay & Benefits
Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $108,000/year in our lowest geographic market to $232,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience.
General Description of All Benefits
Medical/Dental/Vision/Life, AD&D insurance
Flexible Spending Accounts (FSA) & Health Savings Account (HSA)
Long-term/Short-term Disability
Employee Assistance Program (EAP) program
401K Plan with Company Match
18-21 days of the Paid Time Off (PTO) a year based on the tenure
12 Paid Holidays
Paid Parental leave
Pre-tax commuter benefits
MTV - [Free] Electric Car Charging Station
General Description of Other Compensation
"Other Compensation" includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale.
Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate.
If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************.
Requisition # R0064937
Auto-ApplyThreat Hunter / Security Analyst
Cyber security analyst job in Seattle, WA
Galvanick protects the industrial world against cyber attacks. Our threat detection platform defends the modern world against criminals and nation-states that target Operational Technology (OT) systems and networks. This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.
About the Role
We are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick's growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.
What You Will Do
* Develop and implement effective detection strategies and ensure comprehensive threat coverage. You will be responsible for hunting and monitoring for threats using hundreds of telemetry sources from across the Galvanick platform.* Stay updated with the latest security trends, attack techniques, and vulnerabilities to continuously improve our threat detection capabilities.* Investigate and respond to security incidents, conducting thorough analysis and providing timely resolution.* Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for customers. You will respond to customer questions relating to threat intelligence and threat hunting.* Identify opportunities to increase overall customer satisfaction or streamline internal processes.* Perform adversary-focused threat hunting to identify abnormalities in the environment, with a focus on public cloud environments.* Contribute to automation and tooling that support hunting operations. Develop and maintain comprehensive documentation of threat hunting activities, findings, and remediation steps.
Who You Are
* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Fluency with Python and an understanding of query languages. You are comfortable getting into the code and helping with detections.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint. * In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks. * Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats. * Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses. * Proven experience as a SOC analyst or threat hunter, with a strong operational security background. * Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.
Bonus Points
* Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. * Knowledge of cyber threat intelligence terminology and data communication concepts and technologies. * You enjoy solving problems and are naturally curious about the technologies and tools you use. * Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems. * Experience with industrial, operational, or fulfillment environments. * Relevant certifications such as CISSP, CEH, or GCIH are desirable.
Benefits
We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member's vitality, health, and wellness. Our compensation reflects the cost of labor across various geographic markets. The base pay for this position ranges from $100,000/year in our lowest geographic market up to $180,000/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Galvanick is an early stage startup and base salary is only one component of our compensation package. Dependent on the position offered, equity may be provided as part of the compensation package, in addition to medical, financial, and/or other benefits.
Location
The Galvanick engineering team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.
ITAR Requirements
To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here.
Auto-ApplyStaff Information Security Engineer
Cyber security analyst job in Seattle, WA
At Adaptive, we're Powering the Age of Immune Medicine. Our goal is to harness the power of the adaptive immune system to transform the way diseases are diagnosed and treated.
As an Adapter, you'll have the opportunity to make a difference in people's lives. With Adaptive, you'll create a career highlight through collaboration with bright, curious colleagues working at the apex of innovation and application.
It's time for your next chapter. Discover your story with Adaptive.
Position Overview
The Staff Information Security Engineer is responsible for driving information security functions as related to specific domain(s) of cyber security. This role is accountable for the organization's governance of information security risk domains by developing and implementing processes responsible for overseeing and managing information security risk. As part of Information Security team, this role will collaborate closely with leaders in Information Technology, Software Development and other departments to implement and manage Adaptive's information security strategy and priorities and offer independent advice and recommendations regarding ways to further mature the information security and risk management posture and policies.
Key Responsibilities and Essential Functions
Strategic Leadership & Governance
Serve as subject matter expert on information security, guiding cross-functional partners and leading enterprise-wide risk committees and security reviews.
Participate in the definition and evolution of Adaptive's cybersecurity strategy, architecture, and GRC roadmap aligned with business priorities.
Develop and maintain security reference architecture across cloud, hybrid, and on-prem environments
Policy & Compliance Management
Drive the development and implementation of security policies and ISMS practices, ensuring alignment with ISO 27001, SOC 2, TX-RAMP, HIPAA, and other regulatory frameworks.
Lead internal and external audits and certification efforts.
Security Architecture & Control Design
Collaborate with IT, Privacy, and Engineering to design and implement layered security controls across identity, access, network, endpoint, application, and data environments. Continuously evaluate and integrate emerging technologies to strengthen Adaptive's security architecture.
Risk Management & Assurance
Conduct enterprise risk assessments, maintain the risk register, and monitor key indicators to identify and remediate non-compliance.
Support customer audits, contract negotiations, and third-party risk management.
Lead the assessment, management and response efforts for incidents, vulnerabilities, and other security events.
Control Implementation & Optimization
Ensure effective deployment and optimization of security tools (e.g., SIEM, EDR, DLP, IAM), ensuring controls meet GRC requirements and business needs.
Lead control testing, continuous monitoring, and third-party penetration testing engagements.
Reporting & Stakeholder Communication
Develop and maintain KPIs, metrics, dashboards and reporting to measure the effectiveness of information security program activities.
Translate technical risks into business impact for non-technical stakeholders and support customer audits and inquiries.
All other duties as assigned.
Position Requirements
Bachelors + 12 years of related experience, or Masters + 8 years of related experience
Understand Risk Management principles and the tools to ensure attention is brought to high-risk areas.
Have solid knowledge of ISO 27001, NIST and other information security standards, with some experience implementing these standards.
Good communicator who is used to working in a dynamic environment.
Solid attention to detail and ability to communicate that detail in summary form.
Ability to multi-task and meet deadlines.
Proven ability to achieve results in a fast moving, dynamic environment.
Proven understanding of information security risk assessment and technology risk management and compliance procedures and methodologies.
Ability to establish and maintain relationships with individuals at all levels of the organization, in the business community and with vendors.
Thorough knowledge of all aspects of information security and compliance including SOC 2, ISO 27001/2, and HIPAA. Life sciences, medical device, or healthcare industry experience ideal, particularly experience with FDA cybersecurity guidance.
Solid understanding of application security, cloud security, security operations, incident response and infrastructure security.
Skilled in translating technical data into business impact information, including for non-technical audiences.
Proven analytical and problem-solving abilities.
Prefer one of the following certifications: certificated internal auditor; certified lead implementor CISSP, CISM, CISA or equivalent experience.
Working Conditions
Administrative work in a home/office environment.
Regular weekday work hours, with occasional weekend/after-hours planned or unplanned work as needed.
#LI-Remote
Compensation
Salary Range: $143,200 - $214,800
Other compensation elements to include:
equity grant
bonus eligible
ALERT: Malicious groups posing as Adaptive employees have recently used fraudulent email aliases to extend employment offers, provide fake documents, and request sensitive personal and financial information. Legitimate Adaptive employment opportunities are initiated through our careers page and extended after multiple interviews with verified employees. Adaptive does not ask new hires to purchase anything out-of-pocket, including home office supplies and equipment.
Interested in this position, but don't meet all the requirements? Adaptive is committed to building diverse, equitable, and inclusive teams across our organization. Please consider applying even if your experience doesn't match all the qualifications; you may be the exact candidate we're searching for!
Adaptive is not currently sponsoring candidates requiring work authorization support for this position.
Adaptive's posted compensation information includes a base salary (or hourly rate) range and summary of other available total compensation. The base salary range represents a minimum-to-maximum salary (or hourly rate) available to candidates upon extension of offer. Base salary is thoughtfully considered upon offer and is determined through multiple evaluation checks throughout the interview process, including: a candidate's ability to meet minimum qualifications (skills/experience/education), a candidate's ability to thoughtfully address preferred qualifications, current market conditions, and internal pay equity. Listed base salary is exclusive of bonus, commission, equity, differential pay, benefits, and other incentives.
Adaptive's benefits at-a-glance.
Adaptive Biotechnologies is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against based on disability. Please refer the “Know Your Rights: Workplace Discrimination is Illegal” Poster for more information. If you'd like to view a copy of the company's affirmative action plan or policy statement, please email **********************.
If you have a disability and you believe you need a reasonable accommodation to search for a job opening or to submit an online application, please e-mail accommodations@adaptivebiotech.com. This email is created exclusively to assist disabled job seekers whose disability prevents them from being able to apply online. Only messages left for this purpose will be returned. Messages left for other purposes, such as following up on an application or technical issues not related to a disability, will not receive a response.
NOTE TO EMPLOYMENT AGENCIES: Adaptive Biotechnologies values our relationships with our Recruitment Partners and will only accept resumes from those partners who have active agreements with Adaptive. Adaptive Biotechnologies is not responsible for any fees related to resumes that are unsolicited or are received by any employee of Adaptive Biotechnologies who is not a member of the Human Resources team.
Auto-ApplySenior Security Analyst
Cyber security analyst job in Seattle, WA
Join us in stopping bad bots, for good! Kasada protects millions of online users everyday. Founded to stop automated bot attacks, we believe the internet should be a safe place for everyone. Bad bots are highly destructive. They take over accounts, steal content, overload systems and infrastructure and cause billions of dollars in damages every year. Seeking to restore trust in the internet, Kasada stops bots at the very first request including those that have never been seen before.
We've grown from a few friends working out of a shipping container under the Sydney Harbour Bridge to now operating globally, we're spread across the world protecting some of the most well-known brands on the face of the earth.
We're an innately curious team that's not afraid to bring bold ideas to create better ways of solving problems. We're looking for people who are passionate about solving some of the most difficult and pressing cybersecurity issues, while having fun doing it!
The Role
We're currently on the lookout for a Senior Security Analyst to join our Security Operations team, focused on taking on complex and high impact unwanted automation for our customers. This role will require you to act as an escalation point for other analysts, handle investigations end to end, and contribute to improving our investigative methods and tooling. Your experience in a similar role in a cyber security environment will be highly regarded.
This position will allow you to apply your analytical skills in the fight against bad bots. Working with some of the world's biggest companies, you'll help reduce the damage caused by unwanted automation, while sharing your expertise and supporting our team.
This is a remote role, to ensure timezone overlap with our Australia-based team candidates should be located on the West Coast. What you will be doing;
Lead complex investigations and in-depth analysis of automated software activity within customer environments, driving cases to resolution.
Act as an escalation point for incident response and threat detection, providing expert guidance on challenging or ambiguous cases.
Apply and optimise a range of investigative tools and techniques to uncover patterns, anomalies, and root causes.
Collaborate across teams to provide clear, actionable advice on complex investigations and contribute to improving detection and response processes.
What you will bring;
Demonstrable, recent experience in cybersecurity or IT security roles.
Significant experience identifying and mitigating security risks in a web application or similar environments.
Solid understanding of security frameworks, incident response methodologies, and threat intelligence.
Familiarity with analytical security tools (e.g., Splunk, ElasticSearch, SQL, NoSQL databases).
Solid knowledge of web technologies (TCP stack, HTTP/S, WebSockets, Browser Architectures, Operating Systems)
Subject matter knowledge and awareness of automated cyber security attacks and/or bot groups.
Relevant certifications (e.g., CISSP, CISM, CEH, Bachelors degree in a relevant field) are desirable but not essential.
Critical and analytical mindset with proven ability to make sound, timely judgments.
$140,000 - $175,000 a year The Benefits of being a Kasadian
We want to ensure Kasada remains a great place to work and a place to do great work. It's important to us to build an inclusive environment where you can realize your full potential. We are a highly collaborative team regardless of location, placing a strong emphasis on our core values; and we have designed our benefits package so you can thrive, both inside and outside of work:
- A stake in Kasada's global success with equity/stock options - Flexible working hours and arrangements - Create a schedule that suits you - Support for growing families - Generous parental leave allowances and resources to help in the lead up, during and after parental leave. - Resources for well-being to support your growth including our EAP - confidential counselling for you and your loved ones - Birthday leave - Wellness leave - An action packed calendar of fun in-person and virtual events
Sound interesting? What's next?
Hit the apply button and one of our team will set up an exploratory, confidential discussion. We have designed our hiring process to be streamlined and thorough so everyone can make the right call on whether it is the right move for you. We are an inclusive team and this extends to all candidates that interview with us. Interviews are conducted virtually however if you want to come onsite - just ask! When you apply, please tell us the pronouns you use and any adjustments you may need during the interview process, we want to ensure you are set up for success in every conversation.
Still with us? Just a little bit more…
Research shows that women and other marginalized individuals tend to only apply when they check every box. We're always keen to broaden our perspective, so if you think you have what it takes, but don't necessarily meet every single point above, please still get in touch, we'd love to have a chat and see if you could be a great addition to the team!
Please note: Kasada is an e-verify employer (US based applicants only)
Auto-ApplyCyber Security Support Specialist
Cyber security analyst job in Keyport, WA
Netsimco, a Saalex Company is seeking a Cyber Security Support Specialist in Keyport, WA.
Position Type: Full-Time
Salary: $90k-$125k (depending on experience)
Essential Functions:
Responsible for applying security engineering principles to design, develop, and implement secure information systems.
Defining security requirements
Performing risk assessments
Implementing security controls
Ensuring systems comply with various government regulations and frameworks like NIST and Risk Management Framework (RMF).
Documenting security measures, manage system vulnerabilities, and provide guidance to system administrators and developers throughout the system's lifecycle.
Requirements
Required:
A minimum of two years of experience in each of the following tasks: preparing system accreditation documentation required by the Navy and/or DoD, and Assessing system vulnerability using approved DOD tools.
Awarded and current certification(s) sufficient to be designated as Cyber Security Workforce Risk Management - Advanced or Information System Security Management -Advanced in accordance with DoD 8140.01.
Desired:
A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls.
A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls, protecting the organization's IT infrastructure by implementing and managing security measures, monitoring systems, conducting risk assessments, and ensuring compliance with security policies and regulations; developing security documentation, oversee vulnerability assessments, respond to security incidents, and foster a security-aware culture, requiring strong technical, analytical, and communication skills.
Education:
HS Diploma or GED required.
Security Clearance:
Must have active Secret Clearance and be eligible for Top Secret Clearance (SSBI). T5 investigation is required. Requirements to obtain a clearance include US Citizenship, security investigation, etc.
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Short Term & Long Term Disability
Training & Development
Wellness Resources
Stock Option Benefit
Auto-ApplyNeed for Information Risk Security Specialist @ Seattle, WA
Cyber security analyst job in Seattle, WA
Title: Information Risk Security Specialist Duration: 6 to 9 Months + Contract to Hire Seeking an experienced, detail-orientated, and motivated Information Risk Security Specialist to monitor and oversee the Information Security program and activities of Avanade, protecting the confidentiality, integrity, availability, and accountability of Avanade's assets.
Key Responsibilities:
Assisting in maintaining the security and health status of Avanade's systems by supporting the following tasks:
Establishes and maintains the annual Information Security Risk Assessment for the entity
Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards
Identify and evaluate complex technology risks, internal controls which mitigate risks and related opportunities for internal control improvement
Understand complex business and information technology management processes
Facilitate the use of technology-based security testing tools or methodologies, synthesize results and make recommendations for technical remediation
Understand the fundamentals of risk management and using the organization's risk management framework to risk rate issues and vulnerabilities and effectively negotiate risk levels and response and complete the required information security
Skills/Knowledge:
Strong Knowledge of Microsoft Technologies
Strong Knowledge of Cloud Technologies i.e. IaaS, SaaS, PaaS, Public, Private, Hybrid
Collaboration: Leverage others (people, group, services) to achieve maximum results. Use collaboration tools effectively to support the process
Ability to work with teams both on shore and off shore, using remote collaboration technologies
Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change
Experience in full project life cycle and application development desired
5 or more years in system security, controls or information management experience
Familiar with security industry standards (ISO 17799, ISO 27001/2, ISO 31000, NIST 800 series, etc.)
Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing
Familiar with regulatory (GLBA, SOX) and standards-body based requirements (ex: PCI) for protecting information
Implements security improvements by assessing current situation, evaluating trends and anticipating requirements
Highly motivated and organized with excellent time management and problem solving skills
Demonstrated ability to write business and technical reports and participate in presentations
Influencing experience at senior levels within an organization
Excellent verbal and written communication skills
Proficiency in spreadsheet and word processing applications
Industry experiences in high-tech preferred
Minimum years of experience (or attach Job Description)
A minimum of five years of experience in Information Security with SANS and/or CISSP accreditation
Bachelor's degree in Information Technology or Business Administration or a related discipline, or equivalent work experience
Additional Information
Engineer, Information Security and Risk
Cyber security analyst job in Olympia, WA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Senior Security Engineer
Cyber security analyst job in Seattle, WA
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
Position summary:
The Senior Security Engineer position will be part of the Enterprise Security organization consisting of IAM professionals across several technologies. This specific position will have a specialized role in directory services and SaaS applications! It will focus on large implementations of Entra ID with integrations with other directories, IDPs, applications, and automated workflows. We give technical direction, administer tools, and provide support for various security technologies. We participate in driving Enterprise Security projects that use our cloud directory services for various internal and external Adobe services. We work with other specialists, architects, security teams, and software engineer teams across Adobe and collectively provide services, guidance, and strategies that protect services and data as well as adhere to various global government regulations. You will work with business customers, management teams, infrastructure teams, development teams, project managers, and other security teams to help implement the vision, structure, standards, and plan solutions that support the future architecture.
At Adobe, you will be immersed in an exceptional work environment that is recognized throughout the world on Best Companies lists! You will also be surrounded by colleagues who are committed to helping each other grow through our Check-In approach where ongoing feedback flows freely.
If you're looking to make an impact, Adobe is the place for you. Discover what our employees are saying about their career experiences on the Adobe Life blog and explore the meaningful benefits we offer.
Adobe is an equal opportunity employer. We welcome and encourage diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability or veteran status.
Primary Responsibilities May Include, but Are Not Limited To:
* Managing deep and complex directory architectures and services span directories, IDPs, and federated environments.
* Providing guidance and architecting solutions for directory service strategies across a variety of internal customers at Adobe.
* We help test, implement, and support secure services used by end-users, devices, and application workflows to all of Adobe.
* We engineer secure identity solutions for on-premises and cloud environments.
* We are a team of Security Engineers that handle incoming requests, respond to issues, solve reported problems, and develop solutions.
* We meet with teams to get business requirements, understand workflows, and devise solutions.
* We help assess SaaS implementations for identity integrations and general security.
* We generate useful metrics to help make decisions, identify issues, and manage our sevices.
Requirements:
* Possess a Bachelor's or advanced degree in MIS, Computer Science, Cybersecurity, or Engineering OR 10+ years in IT or Cybersecurity
* Comfortable working on and leading different projects with many teams at one time
* In-depth understanding of Windows, Mac and UNIX/Linux based systems, permissions, and interoperability.
* Strong knowledge of machine to machine and application to machine connections using MFA, certificates, tokens, and other methods.
* Strong understanding of the identity lifecycle, secure by design, least privileged and zero trust.
* An in-depth knowledge and understanding of managing and securing cloud directories (e.g. Entra ID/AWS/Okta) and integrating with traditional directories (e.g. Active Directory/389DS/ LDAP based directories).
* Proficient in written and verbal communications, skilled at working alongside differing viewpoints to accomplish shared objectives.
* Able to work independently and as a team member.
* Capable of conveying technical concepts to diverse audiences including non-technical users, architects, and senior leadership.
* Professional written, verbal, and presentation communication skills to engage with senior leadership.
* A deep understanding of Cloud Directories, especially Entra ID, and how to secure it, use conditional access policies, and apply/create automation.
* Ability to teach and mentor others while fostering a collaborative environment.
* Can model leadership behavior and help to grow other's leadership behavior.
Preferred:
* Understanding of Desktop operating systems including Windows, Linux, and Mac
* Experience or knowledge of Public Key Infrastructure
* Strong abilities in programming/scripting languages for automating repeatable tasks like Python, PowerShell, etc.
* Experience and/or Knowledge of dashboarding and log correlation engines such as Grafana, Telegraph, Splunk, etc.
* Experience with SaaS Security Posture Management technologies.
* Experience with developing PowerBI dashboards.
The Person Should:
* Have strong social skills, ability to "win people over" and be a great teammate.
* Be able to communicate, influence and mentor across business and executive leadership as well as partners while being able to explain the benefits for their teams.
* Be neutral toward technology, vendor and product choices; more interested in results than in personal preferences.
* Have the ability to think creatively and to solve complex tasks and problems with minimal direction.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $168,200 -- $310,100 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process. In California, the pay range for this position is $214,100 - $310,100 In Washington, the pay range for this position is $194,000 - $281,000
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
Security Engineer
Cyber security analyst job in Seattle, WA
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides technical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Title: Security Engineer/ System Security Engineer
Location: Seattle WA
Duration: 12 Months (Chances for extension)
Job Description:
Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise.
Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).
Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses.
Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.
Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for security related issues.
Educates IT and the business about security policies and consults on security issues regarding user built/managed systems.
Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues.
Must have extensive knowledge in networking, databases, systems and/or Web operations.
More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.
Bachelor's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
Typically has 3 - 6 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, database design and administration; 3+ years of experience with information security.
Requires knowledge of security issues, techniques and implications across all existing computer platforms.
Position Comments: This is a security jack of all trades that will help with hardware patching, web app security, policy, RFP response, audits, facility security, etc.
Additional Skill: Linux experience required MPAA, Privacy Shield or Safe Harbour experience a plus
Additional Information
For more information, Please contact
Pankhuri Razada
Associate Recruiter
Artech information Systems LLC
360 Mt. Kemble Avenue, Suite 2000 Morristown, NJ 07960
************
[email protected] om
Lead Security Engineer - Python/GCP
Cyber security analyst job in Seattle, WA
Take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions.
As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity Technology & Controls team, you will drive the design and development of advanced security solutions, with a primary focus on building engineering solutions that enhance the firm's cloud security posture. This role centers on software engineering, where you will apply a security-first mindset throughout the development lifecycle.
You will architect, develop, and implement robust software systems that proactively defend against misuse, circumvention, and malicious activities. Your work will involve creating tamper-proof, audit-defensible solutions across multiple technical domains, directly contributing to the protection of the firm's critical assets and data.
In this role, you will provide technical leadership by guiding teams in the delivery of innovative security technologies and engineering solutions that strengthen cloud security. Your expertise will be instrumental in developing resilient cybersecurity frameworks and ensuring our defenses remain strong against emerging threats. You will continuously learn and adapt to the evolving security landscape, maintaining and enhancing the organization's overall security posture.
Job responsibilities
Architect, design, and implement advanced security solutions to enhance the organization's cloud security posture across AWS, Azure, and GCP environments.
Develop and deploy security policies as code, automating enforcement and remediation to ensure consistent protection in cloud platforms.
Engineer and maintain automated monitoring frameworks to detect misconfigurations, compliance drift, and emerging threats within cloud environments.
Collaborate with cross-functional teams to conduct risk assessments, identify vulnerabilities, and drive prioritized remediation through technical solutions.
Partner with Cloud Security leads to embed security into every phase of cloud service development and deliver technical training on secure engineering practices.
Stay current with cloud security technologies, engineering best practices, and industry trends through ongoing learning and participation in professional events.
Required qualifications, capabilities, and skills
Formal training or certification on Software Engineering concepts and 5+ years applied experience.
Proven expertise in architecting, designing, and implementing software solutions using Python, with a strong emphasis on object-oriented programming (OOP) principles and software engineering best practices.
Demonstrated ability to approach complex problems with strong design and architectural skills, delivering scalable, maintainable, and robust security engineering solutions.
Deep understanding of at least one major cloud platform (AWS, Azure, or GCP), with hands-on experience in cloud security controls, compliance frameworks, and automation.
Solid grasp of cloud security concepts such as identity and access management, network security, encryption, and data protection.
Strong analytical and problem-solving skills, with the ability to proactively identify, assess, and mitigate security risks in complex, multi-cloud environments.
Experience with the full Software Development Life Cycle (SDLC), including agile methodologies, CI/CD pipelines, application resiliency, and secure coding practices.
Effective communication and collaboration skills, with the ability to work cross-functionally and provide technical leadership in a team environment.
Commitment to continuous learning and staying current with emerging cloud security technologies, trends, and best practices
Preferred qualifications, capabilities, and skills
Hands on experience with Google Cloud Platform (GCP); expertise in GCP security controls and architecture is a strong plus.
Experience building AI-driven solutions, with the ability to contribute to AI initiatives in cloud security.
Good knowledge of industry benchmark Cloud Security Posture Management (CSPM) tools, with the ability to assess, monitor, and improve cloud security configurations.
#CTC
Auto-ApplyEnterprise Security Engineer
Cyber security analyst job in Seattle, WA
About the Team
Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions. As an Enterprise Security Engineer, you will work in a highly technical and employee-focused environment.
Our IT team is a small and nimble team, where you'll have the opportunity to dive into a wide breadth of areas and build from the ground up. We're well supported and well resourced, and have a mandate to deliver a world-class enterprise security program to our teams.
About the Role
As an Enterprise Security Engineer, you will be responsible for implementing and managing the security of OpenAI's internal information systems' infrastructure and processes. You will work closely with our IT and Security teams to develop security capabilities, enforce security policies, and monitor internal systems for security threats.
This role is open to remote employees, or relocation assistance is available to Seattle.
In this role, you will:
Develop and implement security measures to protect our company's information assets against unauthorized access, disclosure, or misuse.
Monitor internal and external systems for security threats and respond to alerts.
Contribute to and enforce our company's IT and Security policies and procedures.
Work closely with our IT department to harden our infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling.
Advise our employees on best practices for maintaining the security of their endpoints, and office AV and network infrastructure.
Devise novel sharing controls and associated monitoring to protect company data, including intelligent groups management, Data Loss Prevention (DLP) and other security controls as appropriate.
Employ forward-thinking models like “secure by default” and “zero trust” to create sustainably secure environments for knowledge workers and developers.
Identify and remediate vulnerabilities in our internal systems, adhering to best practices for data security.
Use our own AI-driven models to develop systems for improved security detection and response, data classification, and other security-related tasks.
Educate employees on the importance of data security, and advise them on best practices for maintaining a secure environment.
Contribute to OpenAI's endpoint and cloud security roadmaps by staying up to date with the latest security threats, and making recommendations for improving our security posture.
You might thrive in this role if you have:
Experience in protecting and managing mac OS fleets.
Experience deploying and managing endpoint security solutions (e.g. management frameworks, EDR tools).
Experience with public cloud service providers (e.g. Amazon AWS, Microsoft Azure).
Experience with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM.
Experience with e-mail security protocols (e.g. SPF, DKIM, DMARC) and controls.
Intermediate or advanced proficiency with a scripting language (e.g. Python, Bash, or similar).
Knowledge of modern adversary tactics, techniques, and procedures.
Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's Affirmative Action and Equal Employment Opportunity Policy Statement.
Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
Auto-ApplySecurity Engineer, Operating Systems
Cyber security analyst job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplySecurity Engineer
Cyber security analyst job in Seattle, WA
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
Join a team using leading edge security technology and processes to protect the F5 enterprise
and product environment. The Security Engineer position will execute strategic processes
and implement technical solutions to enable our information security program and address day-to-day security challenges amidst the industry's evolving technology landscape.
Primary Responsibilities
Build and implement new security controls, processes and tools.
Identify organizational risks to confidentiality, integrity, and availability, and determine appropriate mitigations.
Leverage native Azure, GCP, and AWS cloud services to automate and improve existing security and control activities.
Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats.
Perform technical security assessments against product and enterprise cloud hosted, virtual, and on-premise systems including static and dynamic analysis, and threat modeling.
Review and test changes to services, applications, and networks for potential security impacts.
Collaborate with Architecture, Site Reliability Engineering and Operations teams to develop and implement technical solutions and security standards.
Stay abreast on security best practices and secure design principles.
Review changes to and ongoing operations of enterpise environments and supporting systems for security and compliance impacts.
Assist in incident detection and response efforts.
Implement zero-trust patterns with cloud agnostic tools to support enterprise business units.
Implement, design, develop, administer, and manage enterprise security tooling.
Knowledge, Skills and Abilities
Experience working with high-availability enterprise production environments
Familiarity with scripting languages (e.g., (Go, Python, Ruby, Rust,etc.). and building scripts for process improvements
Experience automating security testing and reporting outputs
Technical knowledge and hands-on experience with security and networking security, basic networking protocols, cloud security, network security design, intrusion prevention/detection, and firewall architecture
Experience assessing and implementing technical security controls
Willingness to innovate and learn new technologies
Excellent interpersonal and relationship skills with a collaborative mindset
Knowledge or familiarity with technological stack (Big-IP, Azure, AWS, GCP, CentOS, Hashicorp Vault, Palo Alto, Qualys).
Experience with network and application vulnerability and penetration testing tools.
Baseline competency in administration of Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) or equivalent public cloud infrastructure.
Exposure to DevOps tooling, CI/CD pipelines, container orchestration, and infrastructure as code approach (e.g. Puppet, Chef, Ansible, Terraform, Jenkins, CircleCI, Artifactory, Git)
Strong written and verbal cowimmunication skills.
Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance and professionalism.
Agile, tactful, and proactive attitude that can manage prioritization and know when to escalate.
Qualifications
B.S. or M.S. in Computer Science, Engineering, or related field, or equivalent experience.
3+ years of relevant security and networking experience
LI-KT1
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
The annual base pay for this position is: $120,000.00 - $180,000.00
F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change.
You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link:
*******************************************
. F5 reserves the right to change or terminate any benefit plan without notice.
Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com).
Equal Employment Opportunity
It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Auto-ApplySecurity Engineer
Cyber security analyst job in Federal Way, WA
* Bot Attacks Analytics. Akamai hands on experience. * Experience on security tools like OWASP ZAP, Burp Suite, Nessus, or others. Roles & Responsibilities: * Analyze Bot Attacks: Independently analyze and respond to bot attacks in real-time, ensuring minimal disruption to our services.
* Pattern Analysis: Identify and analyze attack patterns using Akamai, security logs, and other tools. Query data across various systems to gain comprehensive insights into attack vectors.
* Technical Expertise: Utilize your deep understanding of e-commerce applications to contribute to the design and implementation of security features on our platform.
* SRE Practices: Apply Site Reliability Engineering (SRE) principles to enhance the reliability, scalability, and security of our infrastructure.
* Technology Proficiency: Work with technologies such as Java, Python, SQL. work with monitoring tools like Dataset (centralized logging) and New Relic (observability)
* Continuous Learning: Stay updated with the latest security trends, SRE practices, and technologies. Be willing to learn and implement new tools and techniques.
* Analytical Skills: Employ strong analytical skills to dissect complex security issues and develop effective mitigation strategies. Create detailed reports and alerts based on system logs and data analysis.
* Security Assessment: Conduct thorough security assessments to identify potential vulnerabilities in our features and infrastructure. Propose and drive conversations on necessary feature changes to enhance security.
* Vendor Collaboration: Lead discussions with vendors like Akamai and Riskified, ensuring that we leverage their solutions effectively to bolster our security posture.
TCS Employee Benefits Summary:
* Discretionary Annual Incentive.
* Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans.
* Family Support: Maternal & Parental Leaves.
* Insurance Options: Auto & Home Insurance, Identity Theft Protection.
* Convenience & Professional Growth: Commute r Benefits & Certification & Training Reimbursement.
* Time Off: Vacation, Time Off, Sick Leave & Holidays.
* Legal & Financial Assistance: Legal Assistance, 401K Plan, Performance Bonus, College Fund, Student Loan Refinancing.
# LI-RJ2
Salary Range - $100,000-$125,000 a year
Threat Hunter / Security Analyst
Cyber security analyst job in Seattle, WA
Galvanick protects the industrial world against cyber attacks. Our threat detection platform defends the modern world against criminals and nation-states that target Operational Technology (OT) systems and networks. This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.
About the Role
We are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick's growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.
What You Will Do
* Develop and implement effective detection strategies and ensure comprehensive threat coverage. You will be responsible for hunting and monitoring for threats using hundreds of telemetry sources from across the Galvanick platform.* Stay updated with the latest security trends, attack techniques, and vulnerabilities to continuously improve our threat detection capabilities.* Investigate and respond to security incidents, conducting thorough analysis and providing timely resolution.* Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for customers. You will respond to customer questions relating to threat intelligence and threat hunting.* Identify opportunities to increase overall customer satisfaction or streamline internal processes.* Perform adversary-focused threat hunting to identify abnormalities in the environment, with a focus on public cloud environments.* Contribute to automation and tooling that support hunting operations. Develop and maintain comprehensive documentation of threat hunting activities, findings, and remediation steps.
Who You Are
* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Fluency with Python and an understanding of query languages. You are comfortable getting into the code and helping with detections.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint. * In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks. * Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats. * Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses. * Proven experience as a SOC analyst or threat hunter, with a strong operational security background. * Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.
Bonus Points
* Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. * Knowledge of cyber threat intelligence terminology and data communication concepts and technologies. * You enjoy solving problems and are naturally curious about the technologies and tools you use. * Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems. * Experience with industrial, operational, or fulfillment environments. * Relevant certifications such as CISSP, CEH, or GCIH are desirable.
Benefits
We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member's vitality, health, and wellness. Our compensation reflects the cost of labor across various geographic markets. The base pay for this position ranges from $100,000/year in our lowest geographic market up to $180,000/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Galvanick is an early stage startup and base salary is only one component of our compensation package. Dependent on the position offered, equity may be provided as part of the compensation package, in addition to medical, financial, and/or other benefits.
Location
The Galvanick engineering team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.
ITAR Requirements
To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here.
Cyber Security Support Specialist
Cyber security analyst job in Keyport, WA
Job Description
Netsimco, a Saalex Company is seeking a Cyber Security Support Specialist in Keyport, WA.
Position Type: Full-Time
Salary: $90k-$125k (depending on experience)
Essential Functions:
Responsible for applying security engineering principles to design, develop, and implement secure information systems.
Defining security requirements
Performing risk assessments
Implementing security controls
Ensuring systems comply with various government regulations and frameworks like NIST and Risk Management Framework (RMF).
Documenting security measures, manage system vulnerabilities, and provide guidance to system administrators and developers throughout the system's lifecycle.
Requirements
Required:
A minimum of two years of experience in each of the following tasks: preparing system accreditation documentation required by the Navy and/or DoD, and Assessing system vulnerability using approved DOD tools.
Awarded and current certification(s) sufficient to be designated as Cyber Security Workforce Risk Management - Advanced or Information System Security Management -Advanced in accordance with DoD 8140.01.
Desired:
A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls.
A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls, protecting the organization's IT infrastructure by implementing and managing security measures, monitoring systems, conducting risk assessments, and ensuring compliance with security policies and regulations; developing security documentation, oversee vulnerability assessments, respond to security incidents, and foster a security-aware culture, requiring strong technical, analytical, and communication skills.
Education:
HS Diploma or GED required.
Security Clearance:
Must have active Secret Clearance and be eligible for Top Secret Clearance (SSBI). T5 investigation is required. Requirements to obtain a clearance include US Citizenship, security investigation, etc.
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Short Term & Long Term Disability
Training & Development
Wellness Resources
Stock Option Benefit
Engineer, Information Security and Risk
Cyber security analyst job in Olympia, WA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Enterprise Security Engineer
Cyber security analyst job in Seattle, WA
About the Team Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions. As an Enterprise Security Engineer, you will work in a highly technical and employee-focused environment.
Our IT team is a small and nimble team, where you'll have the opportunity to dive into a wide breadth of areas and build from the ground up. We're well supported and well resourced, and have a mandate to deliver a world-class enterprise security program to our teams.
About the Role
As an Enterprise Security Engineer, you will be responsible for implementing and managing the security of OpenAI's internal information systems' infrastructure and processes. You will work closely with our IT and Security teams to develop security capabilities, enforce security policies, and monitor internal systems for security threats.
This role is open to remote employees, or relocation assistance is available to Seattle.
In this role, you will:
* Develop and implement security measures to protect our company's information assets against unauthorized access, disclosure, or misuse.
* Monitor internal and external systems for security threats and respond to alerts.
* Contribute to and enforce our company's IT and Security policies and procedures.
* Work closely with our IT department to harden our infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling.
* Advise our employees on best practices for maintaining the security of their endpoints, and office AV and network infrastructure.
* Devise novel sharing controls and associated monitoring to protect company data, including intelligent groups management, Data Loss Prevention (DLP) and other security controls as appropriate.
* Employ forward-thinking models like "secure by default" and "zero trust" to create sustainably secure environments for knowledge workers and developers.
* Identify and remediate vulnerabilities in our internal systems, adhering to best practices for data security.
* Use our own AI-driven models to develop systems for improved security detection and response, data classification, and other security-related tasks.
* Educate employees on the importance of data security, and advise them on best practices for maintaining a secure environment.
* Contribute to OpenAI's endpoint and cloud security roadmaps by staying up to date with the latest security threats, and making recommendations for improving our security posture.
You might thrive in this role if you have:
* Experience in protecting and managing mac OS fleets.
* Experience deploying and managing endpoint security solutions (e.g. management frameworks, EDR tools).
* Experience with public cloud service providers (e.g. Amazon AWS, Microsoft Azure).
* Experience with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM.
* Experience with e-mail security protocols (e.g. SPF, DKIM, DMARC) and controls.
* Intermediate or advanced proficiency with a scripting language (e.g. Python, Bash, or similar).
* Knowledge of modern adversary tactics, techniques, and procedures.
* Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's Affirmative Action and Equal Employment Opportunity Policy Statement.
Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.