Post job

Information security analyst jobs in Shoreline, WA

- 219 jobs
All
Information Security Analyst
Securities Analyst
Senior Security Analyst
Information Security Engineer
Information Security Manager
Senior Security Specialist
Security System Engineer
Cyber Security Specialist
Cyber Security Analyst
Information Security Officer
Data Security Analyst
Senior Security Engineer
  • Blue Team DART - Senior Security Analyst

    Coupang 4.5company rating

    Information security analyst job in Seattle, WA

    We exist to wow our customers. We know we're doing the right thing when we hear our customers say, “How did we ever live without Coupang?” Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce. We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day. Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world. Role Overview As our Cyber Security Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks. The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices. What You Will Do Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources Ticket review, and security analysis escalated from SOC Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare) Analyze and respond to Email Security events Oncall to response urgent security events or security issues Collaborate effectively with internal teams through efficient communication Minimum Qualifications Bachelors Degree in Computer Science or a related technical field or equivalent professional experience. 2 years of experience in information Security with experience in Cyber Security Incident Analysis Preferred Qualifications 8+ years of experience in information security with at least 5+ years as a Cyber Security Incident Analyst Experience of Host based security investigation (Windows, Linux, Network/Security appliances) Experience of analyzing security event and knowledge of AWS or Cloud environment Experience of analyzing security event from Web security solutions (Akamai, CloudFlare) Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc) Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc) Experience and skills querying SIEM Solutions for analyzing security events from the logs Skill to analyze big data or big size logs Experience in Automation and Scripting using Bash, Python, PowerShell Proactive and proactive work attitude Pay & Benefits Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $108,000/year in our lowest geographic market to $232,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience. General Description of All Benefits Medical/Dental/Vision/Life, AD&D insurance Flexible Spending Accounts (FSA) & Health Savings Account (HSA) Long-term/Short-term Disability Employee Assistance Program (EAP) program 401K Plan with Company Match 18-21 days of the Paid Time Off (PTO) a year based on the tenure 12 Paid Holidays Paid Parental leave Pre-tax commuter benefits MTV - [Free] Electric Car Charging Station General Description of Other Compensation “Other Compensation” includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale. Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate. If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************. Requisition # R0064937
    $108k-232k yearly Auto-Apply 14d ago
  • Information Security Analyst

    Aditistaffing

    Information security analyst job in Bellevue, WA

    Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients. Visit our website: http://www.aditistaffing.com/ Job Description Role: Information Security Analyst Location: Information Security Analyst 6-8 years of experience in information security / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups. Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established. While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the information security and privacy program. Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls. Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines. Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls). Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required. Good to Have: Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus Experience in developing and administering an information security program desirable Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable Additional Information Regards, Arun Kumar R arunkr(AT)aditistaffing.com D: 425-457-7916
    $85k-126k yearly est. 60d+ ago
  • Cyber Security Analyst

    Zone It Solutions

    Information security analyst job in Seattle, WA

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $80k-111k yearly est. Easy Apply 21d ago
  • Data Security Analyst

    Robert Half 4.5company rating

    Information security analyst job in Renton, WA

    We are looking for a skilled Data Security Analyst to protect and secure critical organizational assets. This role involves assessing vulnerabilities, implementing security solutions, and ensuring rapid resolution of incidents to maintain system integrity. The ideal candidate will collaborate with various teams to develop and enforce security strategies that minimize risk while supporting business operations. Responsibilities: - Evaluate and address vulnerabilities in the organization's infrastructure to enhance overall security. - Implement and recommend security measures to safeguard digital assets and minimize risks. - Investigate security incidents, mitigate potential loss, and restore system functionality promptly. - Collaborate with business units to align security strategies with organizational goals. - Develop and enforce cybersecurity policies and procedures to ensure compliance and best practices. - Utilize SIEM tools to monitor and analyze security events, identifying potential threats. - Provide guidance on application security to protect against unauthorized access and data breaches. - Stay informed on the latest cybersecurity trends and technologies to proactively address emerging threats. - Conduct regular security assessments and audits to ensure system integrity. - Train team members and stakeholders on security protocols and awareness. M/D/V after 30 days Life/Disability yes 401K after 1 year Vacation 10 days Holidays 9 sick time Requirements - At least 2 years of experience in cybersecurity or a related field. - Strong knowledge of cybersecurity principles and best practices. - Proficiency with SIEM tools for monitoring and threat detection. - Certification in CompTIA Security+ or equivalent is preferred. - Familiarity with developing and implementing cybersecurity policies. - Experience in application security, including securing web and software applications. - Ability to analyze and address security vulnerabilities effectively. - Strong problem-solving and communication skills for cross-functional collaboration. Technology Doesn't Change the World, People Do. Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles. Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information. © 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
    $78k-108k yearly est. 60d+ ago
  • Senior Security Analyst

    Kasada

    Information security analyst job in Seattle, WA

    Join us in stopping bad bots, for good! Kasada protects millions of online users everyday. Founded to stop automated bot attacks, we believe the internet should be a safe place for everyone. Bad bots are highly destructive. They take over accounts, steal content, overload systems and infrastructure and cause billions of dollars in damages every year. Seeking to restore trust in the internet, Kasada stops bots at the very first request including those that have never been seen before. We've grown from a few friends working out of a shipping container under the Sydney Harbour Bridge to now operating globally, we're spread across the world protecting some of the most well-known brands on the face of the earth. We're an innately curious team that's not afraid to bring bold ideas to create better ways of solving problems. We're looking for people who are passionate about solving some of the most difficult and pressing cybersecurity issues, while having fun doing it! The Role We're currently on the lookout for a Senior Security Analyst to join our Security Operations team, focused on taking on complex and high impact unwanted automation for our customers. This role will require you to act as an escalation point for other analysts, handle investigations end to end, and contribute to improving our investigative methods and tooling. Your experience in a similar role in a cyber security environment will be highly regarded. This position will allow you to apply your analytical skills in the fight against bad bots. Working with some of the world's biggest companies, you'll help reduce the damage caused by unwanted automation, while sharing your expertise and supporting our team. This is a remote role, to ensure timezone overlap with our Australia-based team candidates should be located on the West Coast. What you will be doing; Lead complex investigations and in-depth analysis of automated software activity within customer environments, driving cases to resolution. Act as an escalation point for incident response and threat detection, providing expert guidance on challenging or ambiguous cases. Apply and optimise a range of investigative tools and techniques to uncover patterns, anomalies, and root causes. Collaborate across teams to provide clear, actionable advice on complex investigations and contribute to improving detection and response processes. What you will bring; Demonstrable, recent experience in cybersecurity or IT security roles. Significant experience identifying and mitigating security risks in a web application or similar environments. Solid understanding of security frameworks, incident response methodologies, and threat intelligence. Familiarity with analytical security tools (e.g., Splunk, ElasticSearch, SQL, NoSQL databases). Solid knowledge of web technologies (TCP stack, HTTP/S, WebSockets, Browser Architectures, Operating Systems) Subject matter knowledge and awareness of automated cyber security attacks and/or bot groups. Relevant certifications (e.g., CISSP, CISM, CEH, Bachelors degree in a relevant field) are desirable but not essential. Critical and analytical mindset with proven ability to make sound, timely judgments. $140,000 - $175,000 a year The Benefits of being a Kasadian We want to ensure Kasada remains a great place to work and a place to do great work. It's important to us to build an inclusive environment where you can realize your full potential. We are a highly collaborative team regardless of location, placing a strong emphasis on our core values; and we have designed our benefits package so you can thrive, both inside and outside of work: - A stake in Kasada's global success with equity/stock options - Flexible working hours and arrangements - Create a schedule that suits you - Support for growing families - Generous parental leave allowances and resources to help in the lead up, during and after parental leave. - Resources for well-being to support your growth including our EAP - confidential counselling for you and your loved ones - Birthday leave - Wellness leave - An action packed calendar of fun in-person and virtual events Sound interesting? What's next? Hit the apply button and one of our team will set up an exploratory, confidential discussion. We have designed our hiring process to be streamlined and thorough so everyone can make the right call on whether it is the right move for you. We are an inclusive team and this extends to all candidates that interview with us. Interviews are conducted virtually however if you want to come onsite - just ask! When you apply, please tell us the pronouns you use and any adjustments you may need during the interview process, we want to ensure you are set up for success in every conversation. Still with us? Just a little bit more… Research shows that women and other marginalized individuals tend to only apply when they check every box. We're always keen to broaden our perspective, so if you think you have what it takes, but don't necessarily meet every single point above, please still get in touch, we'd love to have a chat and see if you could be a great addition to the team! Please note: Kasada is an e-verify employer (US based applicants only)
    $140k-175k yearly Auto-Apply 60d+ ago
  • Senior Security Specialist

    Walt Disney Co 4.6company rating

    Information security analyst job in Seattle, WA

    At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance and protect these exciting experiences. The Enterprise Technology mission is to deliver technology solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence. The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to: * Secure the Magic by protecting information systems and platforms. * Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests. * Strengthen the business through optimizing execution, application, and technology used to protect the Company. * Innovate by investing in core capabilities to enhance operational efficiency. Team Description: As a member of the Cyber Remediation Operations team, you will work closely with the Disney Entertainment business teams in protecting Disney's highly respected Disney Entertainment portfolio, including ESPN, Disney+, Hulu, and ABC. Responsibilities of Role: * Review reports, assessments, and findings to develop and prioritize appropriate remediation or corrective action plans. * Collaborate with IT, security teams, business partners, and operational teams to drive remediation of security deficiencies. * Regularly communicate portfolio health results to stakeholders, including technical and non-technical audiences. * Develop and document risk mitigation strategies when compliance cannot be achieved. * Analyze business areas and develop improvement plans to strengthen security posture. * Drive improvement to security baselines, policies and standards. * Verify implemented remediation and corrective action activity achieves compliance with TWDC policies and standards. * Stay updated on evolving cybersecurity threats, vulnerabilities, trends, technologies, and best practices and incorporate them into IT and business practices. * Consolidate data from multiple sources into clear, concise, actionable presentations for senior management, communicating data-driven insights. * Support the on-time delivery of security and compliance initiatives. Must Haves: * Minimum of 5+ Years of related cybersecurity experience * Demonstrated experience facilitating cyber remediation and vulnerability management. * Ability to handle confidential information with integrity. * Ability to work well with individuals and teams with varying technical and business backgrounds. * Understanding of security frameworks and standards. * Strong analytical, problem-solving, and critical-thinking skills with attention to detail. * Established problem-solving skills with an ability to develop creative alternatives to complex problems, as well as continuous process improvement skills. * Experience working in a security program for a large and complex organization. Nice to Haves: * Working knowledge of industry compliance programs such as PCI, SOX, etc. * One or more general security certifications including Security+, CySA+, AWS, GSEC, GICSP, CISSP, or other relevant certifications * One or more vulnerability assessment or auditing certification including CISA, CISM, GCCC, GSNA or other relevant certifications Education: * Bachelor's degree in Computer Science, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience #DISNEYTECH The hiring range for this position in Glendale, CA is $117,500 to $157,500 per year and in Seattle, WA is $123,000 to $165,000 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered. About The Walt Disney Company (Corporate): At Disney Corporate you can see how the businesses behind the Company's powerful brands come together to create the most innovative, far-reaching and admired entertainment company in the world. As a member of a corporate team, you'll work with world-class leaders driving the strategies that keep The Walt Disney Company at the leading edge of entertainment. See and be seen by other innovative thinkers as you enable the greatest storytellers in the world to create memories for millions of families around the globe. About The Walt Disney Company: The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise that includes three core business segments: Disney Entertainment, ESPN, and Disney Experiences. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney's stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished. This position is with Disney Worldwide Services, Inc., which is part of a business we call The Walt Disney Company (Corporate). Disney Worldwide Services, Inc. is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, religion, color, sex, sexual orientation, gender, gender identity, gender expression, national origin, ancestry, age, marital status, military or veteran status, medical condition, genetic information or disability, or any other basis prohibited by federal, state or local law. Disney champions a business environment where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a constantly evolving world. Apply Now Apply Later Current Employees Apply via My Disney Career Explore Location
    $123k-165k yearly 38d ago
  • Chief Information Security Officer (CISO)

    Milliman 4.6company rating

    Information security analyst job in Seattle, WA

    NOTE TO APPLICANTS: Individual(s) must be legally authorized to work in the United States without the need for immigration support or sponsorship from Milliman now or in the future The Chief Information Security Officer (CISO) is a senior-level executive responsible for developing, implementing, and overseeing Milliman's global information security program. As a member of Global Corporate Services (GCS) reporting directly to the Chief Information Officer (CIO) and working closely with the CEO, Board of Directors, and Equity Principals, the CISO ensures the confidentiality, integrity, and availability of Milliman's information assets, technology infrastructure, and data across all practices and geographies. This role provides strategic leadership, vision, and governance for all aspects of information security, aligning security initiatives with business objectives and regulatory requirements. RESPONSIBILITIES: Strategic Leadership & Governance * Drive the information security function across Milliman, ensuring alignment with organizational goals. * Establish and implement a global information security vision and strategy by collaborating with the Board, senior leaders, and Equity Principals. * Design and deliver the security roadmap, including staffing and budget plans, and manage the approved corporate information security budget. * Serve as an expert advisor to the Board and senior leadership on IT security matters. * Facilitate organization-wide security enhancements that integrate business objectives with IT infrastructure, physical infrastructure, and human resources. * Act as the primary change agent facilitating information security improvements in security culture, business relationships, and product/service design. * Chair the Security Technology Steering Group (STSG). Risk Management & Compliance * Collaborate with senior leadership on IT-related risk management to identify, assess, and address risks. * Oversee the development, implementation, and maintenance of global information security policies, standards, guidelines, and procedures. * Ensure compliance with relevant laws, regulations, and industry frameworks (e.g., ISO 27001, HIPAA, HITRUST, SOC 2). * Partner with the Legal Department to maintain a collaborative approach to information security and privacy. * Manage third-party/vendor security risk programs and ensure alignment with corporate policies. * Serve as a voting member of the Enterprise Risk Management Committee and Technology Operations Committee and act as a key advisor to senior leadership on IT security matters. Incident Response & Operational Oversight * Oversee emergency procedures and incident response protocols, serving as the control point during significant security incidents. * Direct teams to detect, report, contain, and mitigate incidents impacting data and infrastructure security. * Oversee periodic security reviews of all business units and present findings to the Enterprise Risk Committee and Board. * Partner with the Legal team in response to privacy incidents and significant events. * Collaborate with IT teams to develop, evaluate, and improve network disaster recovery plans. * Maintain relationships with law enforcement and relevant government agencies in support of the information security program. Program Development & Stakeholder Engagement * Develop and implement enterprise-wide security awareness training. * Build and report on metrics and KPIs to measure program effectiveness. * Recommend security enhancements and purchases consistent with evolving threats and strategic objectives. * Stay current on technological advances and identify opportunities for adoption within Milliman. * Provide coordination, communication, and dissemination of best practices across the organization. * Support Equity Principals and their practices in security-related matters consistent with GCS service expectations. SKILLS & QUALIFICATIONS REQUIRED: * Bachelor's degree in Computer Science, Computer Engineering, Information Systems, or related discipline. * The ideal candidate must possess certification (s): Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) * The ideal candidate must have 10+ years in management of business or technology organizations, with demonstrated competency in strategic thinking, leadership, and relationship management, and enterprise-level responsibility. * The ideal candidate must have 7+ years of direct management experience overseeing security teams and budgets. * The ideal candidate must have previous experience with regulatory compliance frameworks such as ISO 27001/2, HIPAA, HITRUST, and SOC 2. * The ideal candidate must have previous experience with cloud security control design and management experience. * The ideal candidate must have thorough knowledge of finance, budgeting, project management, and systems development lifecycle. * The ideal candidate must have knowledge of security domains such as auditing, policy, database security, firewall design and implementation, risk analysis, identity management, access management, and web services. * Must have demonstrated leadership in multi-discipline, high-performance teams, including supervision and professional development of technical staff. * Must have proven ability to work with geographically diverse offices in a global organization. * Must have excellent verbal and written communication skills, including the ability to prepare documentation, policies, and build consensus across broad groups. * Must have the ability to deal effectively with concrete, tangible issues as well as abstract, conceptual matters. * Must demonstrated thought leadership in information security and creating innovative, scalable business solutions with the ability to lead and motivate cross-functional, interdisciplinary teams. * Must have strong time management skills, ability to handle multiple projects concurrently, and the capacity to be flexible and nimble as business needs change and evolve. SKILLS & QUALIFICATIONS PREFERRED: * Advanced degree (master's or PhD) in Information Security, Computer Science, or related field. * Experience within consulting or professional services organizations. * Familiarity with enterprise-level cloud technologies, defect tracking tools, agile management tools, and Microsoft Suite. * Additional certifications (e.g., GIAC, CCSP, CRISC, PMP). LOCATION: This is a remote role. The expected application deadline for this job is December 15th, 2025 COMPENSATION: The overall salary range for this role is $203,200 - $397,210. For candidates residing in: * Alaska, California, Connecticut, Illinois, Maryland, Massachusetts, New Jersey, New York City, Newark, San Jose, San Francisco, Pennsylvania, Virginia, Washington, or the District of Columbia the salary range is $233,680 - $397210. * All other locations the salary range is $203,200 - $345,400. A combination of factors will be considered, including, but not limited to, education, relevant work experience, qualifications, skills, certifications, etc. BENEFITS: We offer a comprehensive benefits package designed to support employees' health, financial security, and well-being. Benefits include: * Medical, Dental and Vision - Coverage for employees, dependents, and domestic * Employee Assistance Program (EAP) - Confidential support for personal and work-related * 401(k) Plan - Includes a company matching program and profit-sharing * Discretionary Bonus Program - Recognizing employee * Flexible Spending Accounts (FSA) - Pre-tax savings for dependent care, transportation, and eligible medical expenses. * Paid Time Off (PTO) - Begins accruing on the first day of Full-time employees accrue 15 days per year, and employees working less than full-time accrue PTO on a prorated basis. * Holidays - A minimum of 10 paid holidays per * Family Building Benefits - Includes adoption and fertility * Paid Parental Leave - Up to 12 weeks of paid leave for employees who meet eligibility * Life Insurance & AD&D - 100% of premiums covered by * Short-Term and Long-Term Disability - Fully paid by ABOUT MILLIMAN: Independent for over 75 years, Milliman delivers market-leading services and solutions to clients worldwide. Today, we are helping companies take on some of the world's most critical and complex issues, including retirement funding and healthcare financing, risk management and regulatory compliance, data analytics and business transformation. Milliman invests in skills training and career development and gives all employees access to a variety of learning and mentoring opportunities. Our growing number of Milliman Employee Resource Groups (ERG's) are employee-led communities that influence policy decisions, develop future leaders, and amplify the voices of their constituents. We encourage our employees to give back to their varied professions, including leadership in professional organizations. Please visit our web site (****************************************** to learn more about Milliman's commitments to our people, inclusion, and sustainability. Through a team of professionals ranging from actuaries to clinicians, technology specialists to plan administrators, we offer unparalleled expertise in employee benefits, investment consulting, healthcare, life insurance and financial services, and property and casualty insurance. EQUAL OPPORTUNITY: All qualified applicants will receive consideration for employment, without regard to race, color, religion, sex, sexual orientation, national origin, disability, or status as a protected veteran.
    $124k-165k yearly est. 20d ago
  • Threat Hunter / Security Analyst

    Galvanick

    Information security analyst job in Seattle, WA

    Galvanick protects the industrial world against cyber attacks. Our threat detection platform defends the modern world against criminals and nation-states that target Operational Technology (OT) systems and networks. This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others. About the Role We are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick's growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations. What You Will Do * Develop and implement effective detection strategies and ensure comprehensive threat coverage. You will be responsible for hunting and monitoring for threats using hundreds of telemetry sources from across the Galvanick platform.* Stay updated with the latest security trends, attack techniques, and vulnerabilities to continuously improve our threat detection capabilities.* Investigate and respond to security incidents, conducting thorough analysis and providing timely resolution.* Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for customers. You will respond to customer questions relating to threat intelligence and threat hunting.* Identify opportunities to increase overall customer satisfaction or streamline internal processes.* Perform adversary-focused threat hunting to identify abnormalities in the environment, with a focus on public cloud environments.* Contribute to automation and tooling that support hunting operations. Develop and maintain comprehensive documentation of threat hunting activities, findings, and remediation steps. Who You Are * 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Fluency with Python and an understanding of query languages. You are comfortable getting into the code and helping with detections.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint. * In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks. * Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats. * Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses. * Proven experience as a SOC analyst or threat hunter, with a strong operational security background. * Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations. Bonus Points * Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. * Knowledge of cyber threat intelligence terminology and data communication concepts and technologies. * You enjoy solving problems and are naturally curious about the technologies and tools you use. * Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems. * Experience with industrial, operational, or fulfillment environments. * Relevant certifications such as CISSP, CEH, or GCIH are desirable. Benefits We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member's vitality, health, and wellness. Our compensation reflects the cost of labor across various geographic markets. The base pay for this position ranges from $100,000/year in our lowest geographic market up to $180,000/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Galvanick is an early stage startup and base salary is only one component of our compensation package. Dependent on the position offered, equity may be provided as part of the compensation package, in addition to medical, financial, and/or other benefits. Location The Galvanick engineering team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses. ITAR Requirements To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here.
    $100k-180k yearly Auto-Apply 60d+ ago
  • Product Security Analyst (Mid-Senior)

    Jeppesen 4.8company rating

    Information security analyst job in Seattle, WA

    Company: The Boeing Company Boeing Defense Space & Security (BDS) is seeking an innovative Product Security Analyst to join our team in Seattle, Washington. In this role, you will lead embedded system cybersecurity and resiliency efforts across the full product lifecycle-from requirements and design through testing, production, and sustainment-ensuring the security of Boeing's advanced aerospace products and services. You will collaborate with a multidisciplinary, enterprise-wide Product Security community to develop and implement best practices, tools, and solutions that protect complex systems, including IT, embedded, and non-IT environments. This role offers the opportunity to solve high-impact security challenges, influence next-generation security engineering, and directly contribute to the resilience of Boeing's commercial and defense offerings. Ideal candidates bring experience in software and system security, rapid prototyping, and supporting system development, integration, and testing. Strong communication, problem-solving skills, and the ability to work independently and collaboratively with diverse teams and customers are essential. If you are passionate about advancing cybersecurity in aerospace and want to make a meaningful impact on the future of flight, we encourage you to apply. Position Responsibilities: In this position, you will engage in one or more of the following activities: Support the development and enhancement of product security requirements and architectures to meet certification and customer requirements. Conduct product security risk assessments, attack surface analyses, and vulnerability evaluations for embedded and IT systems. Assist in security audits and assessments of applications, components, and subsystems integrated into Boeing products and services. Coordinate with governments, customers, suppliers, and industry partners to identify risks and improve security standards and regulatory compliance. Analyze and triage product security incidents, identifying attack indicators and escalating potential breaches. Perform trend analysis and support the development of detection and mitigation capabilities against evolving threats. Prepare and present technical reports and briefings tailored to technical teams and senior leadership. Collaborate with cross-functional teams to integrate security practices into the product lifecycle, ensuring a holistic approach to security. Stay current with emerging threats, vulnerabilities, and security technologies to continuously improve security posture. Support research and development activities that result in innovative solutions to enhance product security. Travel to other Boeing sites within the U.S. may be required (estimated to be ~10% travel time). Differentiators by Level: Individual Contributor 3 (IC-3): Focuses on researching and analyzing technical data, performing standard risk assessments, and supporting incident coordination. Prepares technical reports and briefings under guidance. Individual Contributor 4 (IC-4): Leads complex security analyses and incident coordination efforts. Provides technical leadership within teams and presents findings to senior management. Drives improvements in detection capabilities and security integration. Individual Contributor 5 (IC-5): Acts as a consultant and technical authority on product security integration and risk management. Oversees complex assessments and leads strategic initiatives to advance detection and mitigation capabilities. Communicates technical impacts to senior leadership and influences enterprise security posture. This position is expected to be 100% onsite. The selected candidate will be required to work onsite at one of the listed location options. This position requires a minimum active/current U.S. Secret Security Clearance for which the U.S. Government requires U.S. Citizenship. Basic Qualifications (Required Skill/Experience): Bachelor's degree in Cybersecurity, or related technical discipline. Bachelor's degree and 5+ years' experience or Master's and 3+ years (IC-3); Bachelor's degree and 9+ years' experience or Master's and 7+ years (IC-4); Bachelor's degree and 14+ years' experience or Master's and 12+ years (IC-5) 3+ years of experience in product security analysis, risk assessment, vulnerability management, or related fields. Must obtain a CompTIA Security+, a CISSP certification or equivalent Cyber Security certification within 6 months of employment in this role. Preferred Qualifications (Desired Skills/Experience): Experience leading security projects or teams (for levels IC-4 and IC-5). Knowledge of system-level product security concepts and operational environments. Familiarity with malware analysis, attack surface reduction, and security audit methodologies. Experience with security incident response and trend analysis. Ability to present complex technical information to diverse audiences, including senior leadership. Strong analytical and problem-solving skills. Effective written and verbal communication skills. Ability to work collaboratively in cross-functional teams. Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies. Relocation: This position offers relocation based on candidate eligibility. Note: Basic relocation will be offered for eligible internal candidates. Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary Pay Range: Level 3: 119,000 - $161,000 Level 4: $148,750 - $201,250 Level 5: 181,900 - $246,100 Language Requirements: Not Applicable Education: Not Applicable Relocation: This position offers relocation based on candidate eligibility. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E - Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)
    $148.8k-201.3k yearly Auto-Apply 3d ago
  • Sr Ent Information Security Manager

    Direct Staffing

    Information security analyst job in Bellevue, WA

    Bellevue Telecommunications Services Exp 10-15 years Deg Bachelors Relo Bonus Job Description The Information Security Manager, working with in Corporate Information Security Team will be responsible for liaising with assigned business units on behalf of Corporate Information Security (CIS). These responsibilities will include understanding business-driven projects that involve network and information security, applications, networking and web based technologies. They will be responsible for understanding the Business Unit's processes and priorities and working with them to manage business impact and threats, through a risk based methodology. Ensures through positive engagement that business goals are met in a secure and compliant manner, according to industry standard regulations Qualifications Ideal Candidate will have: Candidate must have strong technical, influential and organizational skills. Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience. Expert relationship building and partnering skills, including persuasion, negotiation and consensus building. Experience translating emerging IT and business trends into meaningful risk reduction opportunities. Demonstrated ability to work effectively in a complex matrixed environment. Outstanding verbal and written communication skills. Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement. Ability to translate security requirements into business risks and impacts. Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA. Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls. Appropriate industry certifications, such as CISSP, CISA or CCIE. Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline. Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred. Skills and Qualifications: A broad, enterprise-wide view of the wireless (or similar) business and understanding of strategy, processes and capabilities, enabling technologies, and governance. Experience in telecommunications, internet service provider, or application service providers a plus. The ability to apply Information Security principles to business solutions. Extensive experience planning and deploying both business and technology security initiatives. Exceptional communication skills and the ability to convey results in a summarily and persuasive manner to business owners. This includes written and verbal communications as well as visualizations. The ability to act as liaison conveying information needs of the business to technology teams and technology constraints to the business. Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus. Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI. Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks. Understanding of Local (Wired & Wireless), Wide area, and mobile networks. A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS. Strong background and experience in IP Networking and Routing Protocols. Fluency in the use of all MS Office applications, including SharePoint services. Qualifications · Preferred: Any of the following CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt Education Minimum Required High School Diploma/GED Education/Vocational Training/Experience Preferred Bachelor's degree in Computer Science, Information Technology or related field from an accredited 4-year college or university 10 years of system, network, and application design and architecture experience. Preferably in the wireless communications space CISSP and or CISM Certification (required; experience may be substituted for Cert requirements (4 years minimum) CISA Certification (preferred but not required; experience may be substituted for Cert requirements (4 years minimum) Responsibilities What you will do: Make proactive assessments of threat information in and outside the public domain, understanding the threat as it relates to its customers, and implementing measures to combat the threat. Understand the operations of the business and comprehend how these create value and risk for the organization. Collaborate with team members, peers and the business unit management team to determine technical information security requirements, planned remediation, and advocate for the program to gain resources to implement appropriate protection technologies and processes. Implement and monitor controls necessary to ensure operational processes are performed and are effective to protect the environment from all forms of malicious cyber activity. Assist the Governance group in the development and refinement of technical security standards, key performance indicators and other necessary processes to maintain effective operational security, as it relates to the business. Make risk-based decisions on a daily basis that has the potential to impact our ability to operate and communicate. Ensure the information and network security controls for us are appropriate and operating as intended; includes solutions that are directly controlled as well as security solutions that are operated by other internal and external groups. Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program. Interact with internal audit, third party auditors, and appropriate regulatory bodies. Support the Information Security policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance. Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures. Additional Information All your information will be kept confidential according to EEO guidelines. Direct Staffing Inc
    $110k-159k yearly est. 6h ago
  • Staff Information Security Engineer

    Adaptive Biotechnologies 3.8company rating

    Information security analyst job in Seattle, WA

    At Adaptive, we're Powering the Age of Immune Medicine. Our goal is to harness the power of the adaptive immune system to transform the way diseases are diagnosed and treated. As an Adapter, you'll have the opportunity to make a difference in people's lives. With Adaptive, you'll create a career highlight through collaboration with bright, curious colleagues working at the apex of innovation and application. It's time for your next chapter. Discover your story with Adaptive. Position Overview The Staff Information Security Engineer is responsible for driving information security functions as related to specific domain(s) of cyber security. This role is accountable for the organization's governance of information security risk domains by developing and implementing processes responsible for overseeing and managing information security risk. As part of Information Security team, this role will collaborate closely with leaders in Information Technology, Software Development and other departments to implement and manage Adaptive's information security strategy and priorities and offer independent advice and recommendations regarding ways to further mature the information security and risk management posture and policies. Key Responsibilities and Essential Functions Strategic Leadership & Governance Serve as subject matter expert on information security, guiding cross-functional partners and leading enterprise-wide risk committees and security reviews. Participate in the definition and evolution of Adaptive's cybersecurity strategy, architecture, and GRC roadmap aligned with business priorities. Develop and maintain security reference architecture across cloud, hybrid, and on-prem environments Policy & Compliance Management Drive the development and implementation of security policies and ISMS practices, ensuring alignment with ISO 27001, SOC 2, TX-RAMP, HIPAA, and other regulatory frameworks. Lead internal and external audits and certification efforts. Security Architecture & Control Design Collaborate with IT, Privacy, and Engineering to design and implement layered security controls across identity, access, network, endpoint, application, and data environments. Continuously evaluate and integrate emerging technologies to strengthen Adaptive's security architecture. Risk Management & Assurance Conduct enterprise risk assessments, maintain the risk register, and monitor key indicators to identify and remediate non-compliance. Support customer audits, contract negotiations, and third-party risk management. Lead the assessment, management and response efforts for incidents, vulnerabilities, and other security events. Control Implementation & Optimization Ensure effective deployment and optimization of security tools (e.g., SIEM, EDR, DLP, IAM), ensuring controls meet GRC requirements and business needs. Lead control testing, continuous monitoring, and third-party penetration testing engagements. Reporting & Stakeholder Communication Develop and maintain KPIs, metrics, dashboards and reporting to measure the effectiveness of information security program activities. Translate technical risks into business impact for non-technical stakeholders and support customer audits and inquiries. All other duties as assigned. Position Requirements Bachelors + 12 years of related experience, or Masters + 8 years of related experience Understand Risk Management principles and the tools to ensure attention is brought to high-risk areas. Have solid knowledge of ISO 27001, NIST and other information security standards, with some experience implementing these standards. Good communicator who is used to working in a dynamic environment. Solid attention to detail and ability to communicate that detail in summary form. Ability to multi-task and meet deadlines. Proven ability to achieve results in a fast moving, dynamic environment. Proven understanding of information security risk assessment and technology risk management and compliance procedures and methodologies. Ability to establish and maintain relationships with individuals at all levels of the organization, in the business community and with vendors. Thorough knowledge of all aspects of information security and compliance including SOC 2, ISO 27001/2, and HIPAA. Life sciences, medical device, or healthcare industry experience ideal, particularly experience with FDA cybersecurity guidance. Solid understanding of application security, cloud security, security operations, incident response and infrastructure security. Skilled in translating technical data into business impact information, including for non-technical audiences. Proven analytical and problem-solving abilities. Prefer one of the following certifications: certificated internal auditor; certified lead implementor CISSP, CISM, CISA or equivalent experience. Working Conditions Administrative work in a home/office environment. Regular weekday work hours, with occasional weekend/after-hours planned or unplanned work as needed. #LI-Remote Compensation Salary Range: $143,200 - $214,800 Other compensation elements to include: equity grant bonus eligible ALERT: Malicious groups posing as Adaptive employees have recently used fraudulent email aliases to extend employment offers, provide fake documents, and request sensitive personal and financial information. Legitimate Adaptive employment opportunities are initiated through our careers page and extended after multiple interviews with verified employees. Adaptive does not ask new hires to purchase anything out-of-pocket, including home office supplies and equipment. Interested in this position, but don't meet all the requirements? Adaptive is committed to building diverse, equitable, and inclusive teams across our organization. Please consider applying even if your experience doesn't match all the qualifications; you may be the exact candidate we're searching for! Adaptive is not currently sponsoring candidates requiring work authorization support for this position. Adaptive's posted compensation information includes a base salary (or hourly rate) range and summary of other available total compensation. The base salary range represents a minimum-to-maximum salary (or hourly rate) available to candidates upon extension of offer. Base salary is thoughtfully considered upon offer and is determined through multiple evaluation checks throughout the interview process, including: a candidate's ability to meet minimum qualifications (skills/experience/education), a candidate's ability to thoughtfully address preferred qualifications, current market conditions, and internal pay equity. Listed base salary is exclusive of bonus, commission, equity, differential pay, benefits, and other incentives. Adaptive's benefits at-a-glance. Adaptive Biotechnologies is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against based on disability. Please refer the “Know Your Rights: Workplace Discrimination is Illegal” Poster for more information. If you'd like to view a copy of the company's affirmative action plan or policy statement, please email **********************. If you have a disability and you believe you need a reasonable accommodation to search for a job opening or to submit an online application, please e-mail accommodations@adaptivebiotech.com. This email is created exclusively to assist disabled job seekers whose disability prevents them from being able to apply online. Only messages left for this purpose will be returned. Messages left for other purposes, such as following up on an application or technical issues not related to a disability, will not receive a response. NOTE TO EMPLOYMENT AGENCIES: Adaptive Biotechnologies values our relationships with our Recruitment Partners and will only accept resumes from those partners who have active agreements with Adaptive. Adaptive Biotechnologies is not responsible for any fees related to resumes that are unsolicited or are received by any employee of Adaptive Biotechnologies who is not a member of the Human Resources team.
    $143.2k-214.8k yearly Auto-Apply 21d ago
  • Information Security Manager

    Triplenet Technologies

    Information security analyst job in Seattle, WA

    Guide security policy and participate in broader Information Security governance efforts. Develop and maintain the Information Security Management System (ISMS) in collaboration with regional information security SMEs and technical consultants. Oversee and manage the ISMS and recommend appropriate mitigating controls. Oversees Information Security Risk Management activities, including risk identification, assessment, and communication to relevant interest holders. Provide valuable expertise and leadership directly to the governing Joint Board executive leadership, including sharing metrics to reflect the performance of the regional security program functions, executive risk score reports, and other guidance on a variety of information security topics. Facilitate a committee of Information Security SMEs across the Agencies to ensure both regional compliance and concurrence on information security-related matters, recommending solutions, and working from the regional perspective to achieve optimal solutions. Collaborate with the Systems Integrator, other vendors, and partner Agencies to ensure security best practices, standards, policies, and regulatory requirements are incorporated into core payment system design, implementation, and sustainment, as well as support other future phase projects. Conduct regular security reviews of both software and processes, advising on information security practices. Reviews and creates threat models and recommends security enhancements consistent with information security strategy and evolving threats. Support external IT security audits and assessments that focus on operation. Develop, update, implement, and conduct information security training programs to support the ISMS objectives. Manage approvals for Identity and Access Management (IAM) and Access Control Administration. Act as Incident Commander for Security Incident Response activities, whenever the Information Security Incident Response Plan is invoked by the regional program; play an interest holder and oversight role if the plan is invoked by other partners or vendors. Participate in information security incident investigation and response efforts; perform root-cause analysis when incidents occur and prepare incident reports. Evaluate change requests to determine potential impacts to Information Security, including IT systems, processes, policies, and provide appropriate input to the Change Management process. Coach future Regional Operations Team (ROOT) information security personnel as the ISMS becomes complete and mature. Keep up to date on latest information security trends, "best practices", threats, and countermeasures. Required Skills and Qualifications: Enterprise-level information security plans, policies, standards, guidelines, methods, and practices based on current industry standards, best practices, tools, and techniques. Information Security Management Systems, and applicable industry standards (ISO 27001/2). Pertinent federal, state, and local laws, codes, and regulations; particularly those that affect information security for payment systems. Environments subject to the Payment Card Industry Data Security Standard (PCI DSS), including compliance-related duties. Knowledge and understanding of developing and administering information-security standards, practices, audits, risk management, and policy compliance. Information Security Audit principles and practices. Knowledge of one or more governance frameworks such as COBIT 5, ISO, NIST, or COSO. Strong understanding of IT Service Delivery (ITIL) core processes and methodologies. Principles, methods, and techniques used in the facilitation of managing projects and leading teams. Relevant experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography. In-depth knowledge of security software threats and vulnerability mitigation techniques. Working knowledge of cloud platforms such as Azure/ AWS and relevant security controls. Establishing and maintaining collaborative working relationships with other department staff, management, vendors, and other interest holders. Documenting and explaining risks, recommendations, and incident data to technical interest holders. Interpreting and administering information security policies, standards, and procedures sufficiently to administer, discuss, resolve, and explain them to staff and other constituencies. Leading or supporting an Information Security Management System. Generating metrics and preparing reports to facilitate decision-making on security-related activities. Utilizing personal computer software programs affecting assigned work and in compiling and preparing spreadsheets and reports. Responding to inquiries with effective oral and written communication. Researching, analyzing, and evaluating new security processes, products, and techniques. Excellent time management skills including the ability to prepare, prioritize, and complete work plans. Working effectively under pressure, meeting deadlines, and adjusting to changing priorities. Writing of technical documentation and standards, including skill in English usage, spelling, grammar, and punctuation Required Certifications or Licenses: At least one of the following (in valid status): Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). Certified Information Security Auditor (CISA). Other industry relevant certifications in the fields of information security, project management, auditing and/ or risk management, such as the Certification in Risk and Information Systems Control (CRISC) Preferred Skills and Qualifications: Knowledge of Governance, Risk, and Compliance (GRC) tools. Principles of leadership, supervision, training, and performance evaluation. Extensive knowledge of risk-based methodologies, and one or more of the following frameworks: ISO 27001/2:2017, 27005:2011, and 31000; PCI-DSS; or NIST 800-53. Duration:11/07/2025 to 2/28/2026 Location: Downtown Seattle (Hybrid) M-F: 8 AM to 5 PM Hybrid: 3 days work onsite Pay: $75 per hour
    $75 hourly 36d ago
  • Cyber Security Support Specialist

    Saalex 4.0company rating

    Information security analyst job in Keyport, WA

    Job Description Netsimco, a Saalex Company is seeking a Cyber Security Support Specialist in Keyport, WA. Position Type: Full-Time Salary: $90k-$125k (depending on experience) Essential Functions: Responsible for applying security engineering principles to design, develop, and implement secure information systems. Defining security requirements Performing risk assessments Implementing security controls Ensuring systems comply with various government regulations and frameworks like NIST and Risk Management Framework (RMF). Documenting security measures, manage system vulnerabilities, and provide guidance to system administrators and developers throughout the system's lifecycle. Requirements Required: A minimum of two years of experience in each of the following tasks: preparing system accreditation documentation required by the Navy and/or DoD, and Assessing system vulnerability using approved DOD tools. Awarded and current certification(s) sufficient to be designated as Cyber Security Workforce Risk Management - Advanced or Information System Security Management -Advanced in accordance with DoD 8140.01. Desired: A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls. A minimum of one year of experience in each of the following tasks: evaluating security configurations of systems, and maintaining security configurations of production, development and test systems by applying and configuring security controls, protecting the organization's IT infrastructure by implementing and managing security measures, monitoring systems, conducting risk assessments, and ensuring compliance with security policies and regulations; developing security documentation, oversee vulnerability assessments, respond to security incidents, and foster a security-aware culture, requiring strong technical, analytical, and communication skills. Education: HS Diploma or GED required. Security Clearance: Must have active Secret Clearance and be eligible for Top Secret Clearance (SSBI). T5 investigation is required. Requirements to obtain a clearance include US Citizenship, security investigation, etc. Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k, IRA) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Short Term & Long Term Disability Training & Development Wellness Resources Stock Option Benefit
    $90k-125k yearly 3d ago
  • Security Analyst

    360 It Professionals 3.6company rating

    Information security analyst job in Bellevue, WA

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective-C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and Jquery mobile. Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us. We make sure that we deliver performance-driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change. Job Description • Participate in security planning and analyst activities. • Performs security assessments and security attestations. • Participates in security investigations and compliance reviews as requested. • Make security analysis reports for security vulnerabilities and recommends feasible and appropriate options. • Hands-on experience of Mobile Applications and Device security tools. • Should have sound understanding of secure coding practices which are in conformance with OWASP Top 10, SANS and WASC. • Understanding of various Application Security Threat Models and their applicability to existing and upcoming applications. • Perform Vulnerability Analysis of applications based on the industry wide Application Security Threat Models like ASF, STRIDE and Risk Assessment model like DREAD. • Prepare technical solutions to mitigate the vulnerabilities identified during threat modelling and vulnerability analysis. • Hands-on experience of various Data Security Tools for Data Discovery, Governance, DLP, etc. • Evaluate all design documentations and perform design assessments to ensure appropriate security controls are implemented within designs. • Prepare strategies to mitigate vulnerabilities emanating from Vulnerability Assessments and Penetration Tests of Applications both at production level and source code level, i.e. DAST and SAST. • Assist audit team in developing audit reports; present audit reports to top management, as needed and execute and properly document the audit process on a variety of cyber security environments. • Possess strong analytical and problem solving abilities • Worked on different security tools w.r.t. around VA, PC, DAST, SAST, PT. Additional Information Thanks and Regards, Ankur Bhatia
    $78k-101k yearly est. 60d+ ago
  • Security Engineer, Operating Systems

    Anthropic

    Information security analyst job in Seattle, WA

    Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Role We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training. This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale. What You'll Do: Design and implement hardened OS configurations for AI workloads across diverse hardware platforms Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms Implement and maintain full-disk encryption solutions for diverse storage systems Build security infrastructure for AI systems, research environments, and production services Build secure network stacks with appropriate isolation and segmentation Create OS-level attestation and integrity monitoring systems Develop security patches, custom kernel modules, and kernel hardening configurations Design secure boot processes and trusted execution environments Work with container teams to ensure proper workload isolation at the kernel level Design privilege separation and mandatory access control policies Implement secure update mechanisms for OS components Build tooling for security configuration management and compliance verification Who You Are: 5+ years of experience in operating systems security or kernel development Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.) Experience with kernel hardening techniques and exploit mitigation Strong programming skills in C and systems programming languages Experience with eBPF for security monitoring and enforcement Understanding of virtualization and containerization security Track record of identifying and fixing OS-level security vulnerabilities Experience with security-focused Linux distributions Strong candidates may also have: Kernel development experience or contributions to Linux kernel Experience with real-time or embedded operating systems Knowledge of hardware security features and their OS integration Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX) Background in vulnerability research, exploit development, or fuzzing Experience with formal methods for OS verification Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves) Deadline to apply: None. Applications will be reviewed on a rolling basis. The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation. Annual Salary:$300,000-$405,000 USDLogistics Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices. Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this. We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team. How we're different We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills. The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences. Come work with us! Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
    $79k-113k yearly est. Auto-Apply 13d ago
  • Information Security Engineering

    Blackhount

    Information security analyst job in Bellevue, WA

    Are you ready to become a key player in Information Security Engineering? Welcome to BlackHount Cyber University's Information Security Engineering Mastery Program, where you'll transform into an expert in safeguarding information systems. What You'll Learn: Risk Assessment: Understand and manage risks to ensure information safety across various platforms. Cryptography: Master the art of securing information through encryption techniques and protocols. Network Security: Learn how to protect data in transit across networks, including intrusion detection and prevention. Security Architecture: Gain knowledge in designing robust security structures for information systems. Incident Response: Equip yourself with the skills to detect, respond to, and recover from security breaches. Security Policies: Understand how to develop and enforce policies to ensure information safety and compliance. Security Auditing: Learn techniques for conducting thorough security checks and compliance audits. Data Protection: Master strategies to ensure the confidentiality, integrity, and availability of data. Access Control: Understand methods to control who or what can view or use resources in a computing environment. Security Awareness: Cultivate a culture of security mindfulness within organizations. Why Choose Our Program? Real-world Application: Our curriculum emphasizes practical experiences and real-world problem-solving. Expert Faculty: Our instructors are seasoned information security professionals with deep industry knowledge. Vibrant Community: Join a network of ambitious peers and industry leaders passionate about information security. Career Advancement: With dedicated job placement assistance, we're committed to helping you succeed in the field of Information Security Engineering. Take your place as a defender of information integrity and confidentiality with BlackHount Cyber University. Secure your future and become a leader in Information Security Engineering! Apply now to embark on your journey towards becoming an Information Security Engineering expert! Visit us at BlackHount Cyber University #SecureInformation #InformationSecurityEngineering #MasteryProgram #Cybersecurity #CareerAdvance Job Requirements: Strong Soft Skills: Clear communication and teamwork abilities, alongside problem-solving skills, are essential. Foundational IT Knowledge: Understanding of basic IT concepts and structures is beneficial. Dedication to Security: A robust interest and ongoing engagement with security trends and practices. Analytical Mindset: Ability to think critically and creatively to solve complex security challenges. Detail-Oriented: Precision and attention to detail are crucial in identifying and mitigating security threats. Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-116k yearly est. 60d+ ago
  • Senior Security Engineer - Edge Team

    Armada 3.9company rating

    Information security analyst job in Bellevue, WA

    Job Description About the Company Armada is an edge computing startup that provides computing infrastructure to remote areas where connectivity and cloud infrastructure is limited, as well as areas where data needs to be processed locally for real-time analytics and AI at the edge. We're looking to bring on the most brilliant minds to help further our mission of bridging the digital divide with advanced technology infrastructure that can be rapidly deployed anywhere . About the role We are seeking a highly skilled and motivated Senior Security Engineer to join our Edge Team. In this role, you will be responsible for securing our cloud and edge computing environments, with a focus on our Galleon mobile data centers and their integration with our Atlas cloud platform. You will play a crucial role in designing, implementing, and managing security controls across our infrastructure, ensuring the confidentiality, integrity, and availability of our systems and data. Location. This role is office-based at our Bellevue, Washington office. What You'll Do (Key Responsibilities) Design, implement, and manage security controls across our cloud platforms (AWS, Azure, GCP), Kubernetes environments, and Galleon mobile data centers, ensuring secure deployment practices and platform security for microservices and APIs Integrate security components within our CI/CD pipelines, including automated security testing (SAST, DAST, container image scanning), vulnerability scanning, and compliance checks. Ensure that security is embedded throughout the software development lifecycle Define and implement security configurations for infrastructure, including Kubernetes, using IaC tools (Terraform, Ansible) to ensure consistent enforcement of security policies Monitor and respond to security events, develop and maintain security monitoring tools, and participate in incident response activities Architect and implement security solutions that protect our cloud-native, hybrid, and on-premises infrastructure, including our Galleon data centers. Conduct security architecture reviews, threat modeling, and risk assessments to identify and mitigate vulnerabilities Partner with engineering teams to integrate security tooling into the SDLC, enabling DevSecOps adoption and fostering a culture of shared security responsibility Ensure compliance with relevant security standards and regulations (e.g., SOC 2, ISO 27001) through regular audits and implementing necessary controls. Stay up-to-date with cybersecurity threats, trends, and industry standards Data Center Security Responsibilities Implement robust perimeter security for Galleon data centers, including physical access controls, intrusion detection systems, and video surveillance Design and implement network segmentation within data centers to isolate critical systems and limit the impact of security breaches Utilize micro-segmentation techniques to enforce security policies at the workload level, controlling communication between individual applications and services Implement data loss prevention (DLP) solutions to prevent sensitive data from leaving the data center environment Securely manage and store cryptographic keys used for encryption and authentication within the data center Implement robust logging and monitoring systems to track security-related events and detect anomalies Regularly conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses Develop and maintain incident response plans specific to data center security incidents Required Qualifications 7+ years of experience in security engineering, with a focus on cloud-native technologies, distributed systems, and edge computing, including securing Kubernetes environments Strong understanding of security best practices across the SDLC, including secure coding principles, threat modeling, and vulnerability management Experience securing cloud platforms (AWS, Azure, GCP) and Kubernetes environments, including implementing RBAC, network policies, and container security Proficiency in scripting and automation (Python, Bash, Go) for security tooling and infrastructure-as-code (Terraform, Ansible) Experience with security monitoring, threat detection, and incident response in cloud and containerized environments Excellent communication and collaboration skills, with the ability to work effectively with engineering teams and advocate for security best practices Bachelor's degree in a relevant field or equivalent practical experience Compensation For U.S. Based candidates: To ensure fairness and transparency, the starting base salary range for this role for candidates in the U.S. are listed below, varying based on location experience, skills, and qualifications. In addition to base salary, this role will also be offered equity and subsidized benefits (details available upon request). Benefits Competitive base salary and equity Medical, dental, and vision (subsidized cost) Health savings accounts (HSA), flexible spending accounts (FSA), and dependent care FSAs (DCFSA) Retirement plan options, including 401(k) and Roth 401(k) Unlimited paid time off (PTO) 15 paid company holidays per year #LI-ST1 #LI-Onsite #439 Compensation$128,000-$160,000 USD You're a Great Fit if You're A go-getter with a growth mindset. You're intellectually curious, have strong business acumen, and actively seek opportunities to build relevant skills and knowledge A detail-oriented problem-solver. You can independently gather information, solve problems efficiently, and deliver results with a "get-it-done" attitude Thrive in a fast-paced environment. You're energized by an entrepreneurial spirit, capable of working quickly, and excited to contribute to a growing company A collaborative team player. You focus on business success and are motivated by team accomplishment vs personal agenda Highly organized and results-driven. Strong prioritization skills and a dedicated work ethic are essential for you Equal Opportunity Statement At Armada, we are committed to fostering a work environment where everyone is given equal opportunities to thrive. As an equal opportunity employer, we strictly prohibit discrimination or harassment based on race, color, gender, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other characteristic protected by law. This policy applies to all employment decisions, including hiring, promotions, and compensation. Our hiring is guided by qualifications, merit, and the business needs at the time. Unsolicited Resumes and Candidates Armada does not accept unsolicited resumes or candidate submissions from external agencies or recruiters. All candidates must apply directly through our careers page. Any resumes submitted by agencies without a prior signed agreement will be considered unsolicited and Armada will not be obligated to pay any fees.
    $128k-160k yearly 28d ago
  • Information Security Specialist (Cyber security analysis)

    Aditistaffing

    Information security analyst job in Bellevue, WA

    Job Title: “Information Security Specialist” (Cyber security analysis) Duration: 9+ Months (with high possibility of extending into full time) Job Description: This position is in Corporate Information Security and under the direction of the Manager, Third-Party Cybersecurity Assessments. The Cybersecurity Assessment Analyst will perform cybersecurity assessments on new and existing third parties. The Analyst will construct detailed and summary reports of assessments, including customized reports, as needed. The Analyst will work with Subject Matter Experts (SME) to develop and apply risk assessment criteria (aligned with Policy) to new and existing suppliers using internal and external business intelligence. The Analyst will work with Third-Party Risk Management, Privacy and Legal Counsel, Procurement and Contract Managers, Compliance, and Business Owners to develop and maintain an internal service model that informs the business of key risks in a timely manner to limit unnecessary impediments and avoid bureaucracy. Specific responsibilities: - Coordinate the development of information security policies, standards and procedures. Work with key IT offices, data custodians and governance groups in the development of such policies. Ensure that company policies support compliance with external requirements. Oversee the dissemination of policies, standards and procedures to the user community - Coordinate the development and delivery of an education and training program on information security and privacy matters for employees, other authorized users, and vendors - Serve as the company compliance officer with respect to state and federal information security policies and regulations. Work with the -designated internal audit, SOX compliance, legal, and HR on compliance issues as necessary. Prepare and submit and submit required reports to external agencies. - Develop and implement an Incident Reporting and Response System to address security incidents (breaches), respond to alleged policy violations, or complaints from external parties. - Serve as the official company contact point for information security, privacy and copyright infringement incidents, including relationships with law enforcement entities. - Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing. Required Qualifications: Talent management, results focus and inspirational leadership. Essential Functions • Conduct third-party cybersecurity risk assessments, applying established criteria • Support assessment team with quality assurance reviews over work product and reporting • Collaborate with internal partners and third parties to mitigate and otherwise resolve third-party cyber risks • Consistently deliver on commitments, deadlines and objectives while remaining in scope and leveraging appropriate tools, methods, frameworks, and professional standards • Demonstrate consistent credibility with business partners and leadership while recommending initiatives, identifying gaps, and potential issues • Continuously demonstrate the ability to work independently while representing the services of the department with the highest level of professionalism • Demonstrate the ability to appropriately influence business decisions, and the professional judgment for selecting the appropriate methods and techniques to do so Preferred Qualifications: • Solid background both educationally and via professional experience. No less than 3 years' professional experience in business operations, project/program management, finance, risk management, information security, business analytics or similar. • Experience in large companies and/or complex environments, or providing professional consulting services for them. • Demonstrated abilities in problem-solving and analysis: identifies issues, analyses information to assess root cause and relationships, risks, and potential risk responses. Proven ability to synthesize and summarize complex data into concise recommendations and reports. • Demonstrated strong business writing and professional oral communication skills. • Proven ability to balance multiple priorities, adapt to a constantly changing business environment, work independently, drive projects to completion, and meet deadlines in a fast-paced environment-with only periodic supervision. • Ability to work collaboratively and manage and initiate effective cross-functional relationships. • Strong computer skills, including MS Office products (e.g. Word, Excel, PowerPoint, Visio) and other business software to prepare reports, memos, summaries, and analyses. Desired • Analytical - Synthesizes complex or diverse information; Collects and researches data; employs intuition and experience to complement data; Designs work flows and procedures. • Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness. Applies feedback to improve performance; Monitors own work to ensure quality • Planning/Organizing - Prioritizes and plans work activities to achieve success; Sets and achieves goals and objectives; Develops realistic action plans • Professionalism - Reacts well under pressure; Keeps commitments; Accepts responsibility for own actions. • Career Growth: Focus on cyber security auditing with potential advancement goals in engineering or threat analysis roles • Self-directed team player with Agile environment experience Education Minimum Required • Bachelor's Degree • Equivalent experience is acceptable. License or Certification Desired: (one of the following): CISA (Certified Information Systems Auditor) GSEC (GIAC Security Essentials Certification) CompTIA - Security+ ECSA - EC-Council Certified Security Analyst SSCP (Systems Security Certified Practitioner) Other: Six Sigma, PMP or Agile certificates Other comments - suppliers: Organizational skills; office suite knowledge; and good communication skills are “must haves”. Cyber security analysis experience is preferred. Additional Information All your information will be kept confidential according to EEO guidelines.
    $85k-126k yearly est. 60d+ ago
  • Senior Security Design Specialist

    Jeppesen 4.8company rating

    Information security analyst job in Seattle, WA

    Company: The Boeing Company The Boeing Company is looking for a Senior Security Design Specialist to join the Network Security Operations (NSO) team in North Charleston, SC; Arlington, VA; Auburn, WA; Berkeley, MO; Chicago, IL; El Segundo, CA; Everett, WA; Huntington Beach, CA; Huntsville, AL; Long Beach, CA; Mesa, AZ; Oklahoma City, OK; Plano, TX; Renton, WA; Ridley Park, PA; San Antonio, TX; Seal Beach, CA; or Seattle, WA. Boeing Information Technology is seeking a talented and innovative team member with a strong background in Virtual Private Network (VPN) technology and networking to join our team. In this role, you will have the opportunity to design, develop, and implement enterprise-wide web-based VPN solutions that enhance our capabilities as a company and drive our technology forward. The ideal candidate will possess a deep understanding of networking technologies, architectures, and security, combined with proficiency in programming languages such as Python, Java, or C++. You will collaborate with cross-functional teams to create robust applications that optimize VPN services' performance and reliability. If you are passionate about technology, eager to tackle complex challenges, and ready to make a significant impact in a fast-paced environment, we invite you to apply and be part of our mission to innovate and excel in the world of VPN and networking solutions. Join us in shaping the future of connectivity! Position Responsibilities: Works collaboratively with other teams and stakeholders, Network Designers, Information Security, Corporate Communications and vendors to deliver solutions for the enterprise services Leads and performs the identification, analysis, and documentation of requirements for architecture, cost and security constraints and leads the design processes to those strategies implemented Develops and implements scalable, and secure solutions Creates and document designs that conform to architectural and security standards to meet business requirements, using approved processes, and policies Prepares, deploys, and coordinates installation of complex implementation packages per Boeing standards Provides Level 3 and 4 Incident/Problem Management support in preventative, proactive and reactive maintenance to meet service restoration and service availability objectives, using analytics, monitoring tools and automation Leads vendor and component research evaluations and recommendations to establish architectural direction and technical roadmaps Leads and performs implementation planning for tactical multi-technology insertion projects, using established project management methodologies for the purpose of controlling quality, costs, and adherence to the project plan Supports off shift, on call support on a rotational basis Basic Qualifications (Required Skills/Experience): 5+ years of experience with network and software architecture 5+ years of experience with Pulse Secure/Ivanti VPN web-based VPN Experience with design, programming, and installation of VPN client packages Experience programming in PowerShell, Python, Java, C++ and/or XML Experience with clientless VPN solutions Experience with network, Internet Protocol (IP) addressing and IP network troubleshooting Experience with troubleshooting tools such as Wireshark Preferred Qualifications (Desired Skills/Experience): 5+ years' experience configuring and managing VPN technologies such as Pulse Secure/Ivanti 5+ years' experience in IT configuration management planning, change management, and configuration management auditing 3+ years' experience writing scripts and deployment using PowerShell, Python, Visual Basic, and/or C++ 3+ years' experience in cloud-based technologies Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $146,200 - $227,700 Language Requirements: Not Applicable Education: Not Applicable Relocation: Relocation assistance is not a negotiable benefit for this position. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position does not require a Security Clearance. Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E - Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)
    $146.2k-227.7k yearly Auto-Apply 4d ago
  • Security Engineer, Systems Integrity

    Anthropic

    Information security analyst job in Seattle, WA

    Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Role We're seeking a Systems Integrity Security Engineer to design and implement security architectures for bare-metal infrastructure. You'll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up. This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models. What you'll do: Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, peripherals, embedded microcontrollers) Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer Define trust boundaries and security policies for multi-party authorization systems Develop measured boot implementations and runtime integrity monitoring Create reference architectures and security requirements for bare-metal deployments Integrate security controls with infrastructure teams without impacting training performance Prototype and validate security mechanisms before production deployment Conduct firmware vulnerability assessments and penetration testing Build firmware analysis pipelines for continuous security monitoring Document security architectures and maintain threat models Collaborate with hardware vendors to ensure security capabilities meet our requirements Who you are: 8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security) Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone) Strong understanding of cryptographic protocols and hardware security modules Experience with UEFI/BIOS security, bootloader hardening, and chain of trust implementation Proficiency in low-level programming (C, Rust, Assembly) and systems programming Knowledge of firmware vulnerability assessment and threat modeling Track record of designing security architectures for complex, distributed systems Experience with supply chain security and firmware vulnerability analysis Ability to work effectively across hardware and software boundaries Knowledge of NIST firmware security guidelines and hardware security frameworks Strong candidates may also have: Experience with confidential computing technologies and hardware-based TEEs Knowledge of SLSA framework and software supply chain security standards Experience securing large-scale HPC or cloud infrastructure Contributions to open-source security projects (coreboot, CHIPSEC, etc.) Background in formal verification or security proof techniques Experience with silicon root of trust implementations Experience working with building foundational technical designs, operational leadership, and vendor collaboration Previous work with AI/ML infrastructure security Deadline to apply: None. Applications will be reviewed on a rolling basis. The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation. Annual Salary:$300,000-$405,000 USDLogistics Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices. Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this. We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team. How we're different We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills. The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences. Come work with us! Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
    $79k-113k yearly est. Auto-Apply 13d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Shoreline, WA?

The average information security analyst in Shoreline, WA earns between $72,000 and $150,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Shoreline, WA

$104,000

What are the biggest employers of Information Security Analysts in Shoreline, WA?

The biggest employers of Information Security Analysts in Shoreline, WA are:
  1. XpertTech
  2. DAT
Job type you want
Full Time
Part Time
Internship
Temporary