Manager Information Security & Risk Management - Cloud Security Manager
Phoenix, AZ jobs
This job provides Information Security and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various Information Security personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the Information Security ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents Information Security awareness and training programs.
**ESSENTIAL RESPONSIBILITIES**
+ Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity.
+ Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority.
+ Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management.
+ Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security innovation; encourage and enforce proper training in regards to security issues.
+ Ensure compliance to Corporate and Information Security policies, standards and procedures.
+ Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources.
+ Other duties as assigned or requested.
**EDUCATION**
**Required**
+ Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field
**Substitutions**
+ 6 years of relevant experience substitution for a Bachelor's Degree
**Preferred**
+ Master's Degree in Computer Science, Information Security or related field
**EXPERIENCE**
**Required**
+ 7 - 10 years in Information Security and/or Information Risk Management and/or Information Technology
+ 7 - 10 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences
+ 1 - 3 years in mentoring others in a leadership role
+ 1 - 3 years in Staff Management
+ 1 - 3 years in developing and executing strategic plans to realize business objectives
**Preferred**
+ 10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology
+ Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework
+ Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits
+ Experience establishing budgets and meeting fiduciary goals
+ Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.)
**LICENSES AND CERTIFICATIONS**
**Required**
+ None
**Preferred**
+ Certified Information Systems Security Professional (CISSP) **OR**
+ Certified Information Security Manager (CISM) **OR**
+ Certified in Risk and Information Systems Controls (CRISC) **OR**
+ Information Technology Infrastructure Library (ITIL)
**SKILLS**
+ Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
+ Strong teamwork and interpersonal skills
+ Experience in leading process improvement initiatives
+ Ability to motivate high performance, multi-discipline teams
+ Demonstrated competency in project execution
+ Demonstrated abilities in relationship management
**Languages (Other than English)**
None
**Travel Requirement**
0% - 25%
**PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS**
**Position Type**
Office-Based
Teaches/Trains others regularly
Frequently
Travels regularly from the office to various work sites or from site-to-site
Occasionally
Works primarily out-of-the office selling products/services (Sales employees)
Does Not Apply
Physical Work Site Required
Yes
Lifting: up to 10 pounds
Does Not Apply
Lifting: 10 to 25 pounds
Does Not Apply
Lifting: 25 to 50 pounds
Does Not Apply
**_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._
**_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._
_As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._
_Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._
**Pay Range Minimum:**
$108,000.00
**Pay Range Maximum:**
$201,800.00
_Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets._
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
Req ID: J269753
Info Security Analyst II / IS - Information Security / Full-time
Los Angeles, CA jobs
**NATIONAL LEADERS IN PEDIATRIC CARE** Ranked among the top 10 pediatric hospitals in the nation, Children's Hospital Los Angeles (CHLA) provides the best care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each year. From primary to complex critical care, more than 350 programs and services are offered, each one specially designed for children.
The CHLA of the future is brighter than can be imagined. Investments in technology, research and innovation will create care that is personal, convenient and empowering. Our scientists will work with clinical experts to take laboratory discoveries and create treatments that are a perfect match for every patient. And together, CHLA team members will turn health care into health transformation.
Join a hospital where the work you do will matter-to you, to your colleagues, and above all, to our patients and families. The work will be challenging, but always rewarding.
**It's Work That Matters.**
**Overview**
**PLEASE NOTE: This is a remote position. In accordance with CHLA policy, candidates must establish primary residency in California prior to their start date.**
**Purpose Statement/Position Summary:** The Information Security Analyst II is responsible for monitoring and addressing information security alerts, improving detection and response capabilities, and participating in efforts to streamline processes and improve efficiency. They will also be responsible for conducting security training and awareness campaigns, reporting on results, and conducting remedial training. The analyst will contribute to information security policies and standards as they are developed and maintained, in accordance with NIST CSF and HIPAA. They will be a mentor for Information Security Analyst I and peers.
**Minimum Qualifications/Work Experience:**
_Required:_ 5 years of progressive experience in computing and information security, including experience with information security operations, utilization of multiple security tools to conduct investigations, and security training, preferably in a healthcare environment.
· Management of information security tools.
· Knowledge of vulnerability resolution.
· Skills in risk analysis and hands-on issue resolution.
· General awareness of NIST CSF and HIPAA security rule.
· Experience analyzing security incidents utilizing multiple security tools for discovery.
· Strong analytical and problem-solving skills
**Education/Licensure/Certification:**
_Required:_ Associate degree in a related field or equivalent combination of education and experience may be considered.
**Certifications in two of the following required:**
· ISACA
· CompTIA
· EC-Council
· Azure Security
· AWS Security
· Cisco
· (ISC)²
· GIAC
**Pay Scale Information**
$75,712.00-$124,384.00
CHLA values the contribution each Team Member brings to our organization. Final determination of a successful candidate's starting pay will vary based on a number of factors, including, but not limited to education and experience within the job or the industry. The pay scale listed for this position is generally for candidates that meet the specified qualifications and requirements listed on this specific job description. Additional pay may be determined for those candidates that exceed these specified qualifications and requirements. We provide a competitive compensation package that recognizes your experience, credentials, and education alongside a robust benefits program to meet your needs. CHLA looks forward to introducing you to our world-class organization where we create hope and build healthier futures.
Children's Hospital Los Angeles (CHLA) is a leader in pediatric and adolescent health both here and across the globe. As a premier Magnet teaching hospital, you'll find an environment that's alive with learning, rooted in care and compassion, and home to thought leadership and unwavering support. CHLA is dedicated to creating hope and building healthier futures - for our patients, as well as for you and your career!
CHLA has been affiliated with the Keck School of Medicine of the University of Southern California since 1932.
At Children's Hospital Los Angeles, our work matters. And so do each and every one of our valued team members. CHLA is an Equal Employment Opportunity employer. We consider qualified applicants for all positions without regard to race, color, religion, creed, national origin, sex, gender identity, age, physical or mental disability, sexual orientation, marital status, veteran or military status, genetic information or any other legally protected basis under federal, state or local laws, regulations or ordinances. We will also consider for employment qualified applicants with criminal history, in a manner consistent with the requirements of state and local laws, including the LA City Fair Chance Ordinance and SF Fair Chance Ordinance.
Qualified Applicants with disabilities are entitled to reasonable accommodation under the California Fair Employment and Housing Act and the Americans with Disabilities Act. Please contact CHLA Human Resources if you need assistance completing the application process.
Our various experiences, perspectives and backgrounds allow us to better serve our patients and create a strong community at CHLA.
Information Security
Info Security Analyst II / IS - Information Security / Full-time
Los Angeles, CA jobs
NATIONAL LEADERS IN PEDIATRIC CARE Ranked among the top 10 pediatric hospitals in the nation, Children's Hospital Los Angeles (CHLA) provides the best care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each year. From primary to complex critical care, more than 350 programs and services are offered, each one specially designed for children.
The CHLA of the future is brighter than can be imagined. Investments in technology, research and innovation will create care that is personal, convenient and empowering. Our scientists will work with clinical experts to take laboratory discoveries and create treatments that are a perfect match for every patient. And together, CHLA team members will turn health care into health transformation.
Join a hospital where the work you do will matter-to you, to your colleagues, and above all, to our patients and families. The work will be challenging, but always rewarding.
It's Work That Matters.
Overview
PLEASE NOTE: This is a remote position. In accordance with CHLA policy, candidates must establish primary residency in California prior to their start date.
Purpose Statement/Position Summary: The Information Security Analyst II is responsible for monitoring and addressing information security alerts, improving detection and response capabilities, and participating in efforts to streamline processes and improve efficiency. They will also be responsible for conducting security training and awareness campaigns, reporting on results, and conducting remedial training. The analyst will contribute to information security policies and standards as they are developed and maintained, in accordance with NIST CSF and HIPAA. They will be a mentor for Information Security Analyst I and peers.
Minimum Qualifications/Work Experience:
Required: 5 years of progressive experience in computing and information security, including experience with information security operations, utilization of multiple security tools to conduct investigations, and security training, preferably in a healthcare environment.
* Management of information security tools.
* Knowledge of vulnerability resolution.
* Skills in risk analysis and hands-on issue resolution.
* General awareness of NIST CSF and HIPAA security rule.
* Experience analyzing security incidents utilizing multiple security tools for discovery.
* Strong analytical and problem-solving skills
Education/Licensure/Certification:
Required: Associate degree in a related field or equivalent combination of education and experience may be considered.
Certifications in two of the following required:
* ISACA
* CompTIA
* EC-Council
* Azure Security
* AWS Security
* Cisco
* (ISC)²
* GIAC
Pay Scale Information
$75,712.00-$124,384.00
CHLA values the contribution each Team Member brings to our organization. Final determination of a successful candidate's starting pay will vary based on a number of factors, including, but not limited to education and experience within the job or the industry. The pay scale listed for this position is generally for candidates that meet the specified qualifications and requirements listed on this specific job description. Additional pay may be determined for those candidates that exceed these specified qualifications and requirements. We provide a competitive compensation package that recognizes your experience, credentials, and education alongside a robust benefits program to meet your needs. CHLA looks forward to introducing you to our world-class organization where we create hope and build healthier futures.
Children's Hospital Los Angeles (CHLA) is a leader in pediatric and adolescent health both here and across the globe. As a premier Magnet teaching hospital, you'll find an environment that's alive with learning, rooted in care and compassion, and home to thought leadership and unwavering support. CHLA is dedicated to creating hope and building healthier futures - for our patients, as well as for you and your career!
CHLA has been affiliated with the Keck School of Medicine of the University of Southern California since 1932.
At Children's Hospital Los Angeles, our work matters. And so do each and every one of our valued team members. CHLA is an Equal Employment Opportunity employer. We consider qualified applicants for all positions without regard to race, color, religion, creed, national origin, sex, gender identity, age, physical or mental disability, sexual orientation, marital status, veteran or military status, genetic information or any other legally protected basis under federal, state or local laws, regulations or ordinances. We will also consider for employment qualified applicants with criminal history, in a manner consistent with the requirements of state and local laws, including the LA City Fair Chance Ordinance and SF Fair Chance Ordinance.
Qualified Applicants with disabilities are entitled to reasonable accommodation under the California Fair Employment and Housing Act and the Americans with Disabilities Act. Please contact CHLA Human Resources if you need assistance completing the application process.
Our various experiences, perspectives and backgrounds allow us to better serve our patients and create a strong community at CHLA.
Information Security
Cyber Security Analyst
Menlo Park, CA jobs
Hello Heart is on a mission to change the way people care for their hearts. The company provides the first app and connected heart monitor to help people track and manage their heart health. With Hello Heart, users take steps to control their risk of heart attacks and stroke - the leading cause of death in the United States. Peer-reviewed studies have shown that high-risk users of Hello Heart have seen meaningful drops in blood pressure, cholesterol and even weight. Recognized as the digital leader in preventive heart health, Hello Heart is trusted by more than 130 leading Fortune 500 and government employers, national health plans, and labor organizations. Founded in 2013, Hello Heart has raised more than $138 million from top venture firms and is a best-in-class solution on the American Heart Association's Innovators' Network and CVS Health Point Solutions Management platform. Visit ****************** for more information.
About the Role
We are seeking a Cyber Security Analyst to strengthen our security operations and compliance posture. Reporting into our Information Security Officer, you will play a key role in protecting sensitive data, ensuring regulatory compliance, and supporting the secure adoption of new technologies such as AI. You will work cross-functionally with IT, Engineering, Compliance, and HR to build and maintain secure, resilient processes across the organization.
Responsibilities
Support secure access lifecycle processes, including provisioning, deprovisioning, role-based access, and MFA/SSO management
Conduct periodic access reviews and ensure identity data quality
Perform vulnerability scans across systems and applications, track remediation progress, and partner with teams to prioritize risk-based fixes
Assist with security assessments of cloud systems and applications, aligning with HIPAA, HITECH, NIST, and HITRUST frameworks
Support internal and external audit preparation and execution
Enforce encryption, access controls, and data loss prevention strategies for sensitive data
Conduct third-party vendor risk assessments and oversee remediation efforts
Support secure adoption of AI tools by monitoring for risks such as data leakage and prompt injection, establishing governance guardrails, and delivering awareness training
Participate in endpoint security monitoring, disaster recovery exercises, tabletop simulations, and awareness training initiatives
Contribute to ongoing security operations, risk management efforts, and special security projects
Qualifications
3+ years of experience in IAM, IAM operations, or security analyst roles (healthcare technology or other regulated environments preferred)
Hands-on experience with identity platforms such as Okta, Azure AD, or Google IdP, plus SCIM, SAML/OIDC/OAuth, directory services, group policy, and conditional access
Experience with vulnerability management platforms (Tenable, Qualys, Rapid7, AWS Inspect, Kandji) and patch orchestration workflows
Working knowledge of HIPAA, HITECH, NIST CSF/800-66, and CIS Controls (familiarity with HITRUST CSF is a plus)
Knowledge of cloud security basics (AWS, Azure, GCP), least-privilege IAM, and networking fundamentals (TCP/IP, DNS, HTTP, VPN, segmentation)
Familiarity with endpoint security solutions (CrowdStrike Falcon, Cynet, SentinelOne) and DLP tools
Familiarity with GenAI, keeping up to date with innovative security programs and artificial intelligence systems
Proactive communication and documentation skills, with the ability to collaborate across technical and non-technical teams globally
The US base salary range for this full-time position is $130,000.00 to $145,000.00. Salary ranges are determined by role and level. Compensation is determined by additional factors, including job-related skills, experience, and relevant education or training. Please note that the compensation details listed in US role postings reflect the salary only, and do not include equity or benefits.
#LI-DNP
Hello Heart has a positive, diverse, and supportive culture - we look for people who are collaborative, creative, and courageous. Oh, and if you want to see some recent evidence of the fun things we do at Hello Heart, check out our Instagram page.
Auto-ApplyInformation Security & Systems Analyst
Dublin, OH jobs
Join a team dedicated to making a real difference in the lives of our community. Our Mission at Friendship Village of Dublin is
“To care for, engage, and inspire our community to reimagine and maximize quality of life at every age”
.
At Friendship Village our Values Drive us to RISE to any Occasion
Values:
Respect
Integrity and Innovation
Stewardship
Excellence
We are seeking a Information Security & Systems Analyst to contribute to our mission by:
The Entry to Mid-Level System Analyst performs security, compliance and administration of systems and is responsible for the design, installation and management, configuration and reliable operation of security/compliance mechanisms, systems and policies that protect the computer network and information systems against cyber events. Participate in research and development to continuously improve and keep up with the IT business needs of the organization. Actively resolve problems and issues with computer and server systems to limit work disruptions within the company.
Essential Duties:
Design, install and manage security mechanisms that protect the computer network and information systems against threats including but not limited to hackers, breaches, viruses and spyware.
Educate and provide awareness to users regarding security policies and procedures as well as threats.
Develop and maintain security policies and guidelines around information classification, system integrity, incident response and user access.
Monitor, audit and review systems for and identify violations or attempted violations of security procedures, processes and access.
Plan and implement appropriate measures to safeguard data from accidental or unauthorized modification, destruction or disclosure.
Respond to incidents, investigate potential incidents and recommend enhancements to close potential security gaps and serve as a backup to other members of the Technology department.
Responsible for post breach/data loss activities including but not limited preservation of evidence, review of data to determine scope and support of legal and other processes.
Participate in supporting efforts, making sure all networks, systems, applications, servers, technology tools and related equipment problems are resolved in a timely manner with limited disruptions.
Monitor performance and maintain systems according to requirements.
Ensure security through access controls, backups and firewalls.
Recommend when to upgrade systems with new releases and models.
Timely completion of IT Projects.
All other duties as assigned.
Information Security & Systems Analyst Responsibilities:
Safeguard and help prevent cyber-attacks:
Implement industry best practices for cyber security.
Be up to date about the latest security trends and newest security technology.
Assist other technical support staff in identifying and implementing appropriate security safeguards, including patch applications and anti-malware strategies.
Operate, administer and monitor network and host-based intrusion detection/prevention systems.
Ensure ongoing compliance with industry standards for information security:
Participating in risk assessments to identify potential security threats
Conducting employee training on security policies and responsibilities
Auditing IT systems to ensure compliance with regulations.
Reporting security breaches to management for prompt resolution.
Collaborating with vendors to ensure proper data handling security measures.
Monitoring compliance with state and federal data privacy and security regulations.
Developing policies and procedures for maintaining data security.
Monitor and report on devices and networks including:
Maintain, configure, secure and provide reliable operation of computers systems, network servers, and virtualization.
Network switch and firewall health
Internet traffic and usage metrics
Design and install network devices and systems (including maintaining current software versions on all network equipment) Demonstrates ability to independently troubleshoot and diagnose network, telephone, Internet, Wi-Fi, network.
Assists with work order requests:
Helps the IT Team meet service levels of quality and responsiveness:
Satisfaction goal of 90%
2-business-day response time (resolution time dependent on issue SLA)
Creates, updates and closes tickets in incident management system.
Qualifications:
• Bachelor's degree in computer science, programming, or a related field or equivalent industry experience.
• 2-4 Years of Security or Systems Analyst experience
REQUIRED NON TECHNICAL QUALIFICATIONS
• Must have the ability to work under pressure, without constant direction and to react in a positive and spontaneous manner to the needs of residents, staff, visitors, and vendors.
• Must be able to independently handle multiple simultaneous tasks, following specific instructions carefully and general instructions completely.
• Excellent communication skills
• Resourcefulness and problem-solving aptitude
• Self-starter mentality willing to make constant improvements in the technical support process.
• Takes pride and ownership of the support role.
• Excellent customer service and communication skills
• Ability to assess resident and staff complaints and resolve disputes in a friendly professional manner.
REQUIRED TECHNICAL QULAIFICATION
• Strong understanding of cybersecurity tools, concepts and best practices.
• Knowledge of information security frameworks (e.g.,HIPAA, NIST) and relevant regulations.
• Knowledge of Windows Operating Systems - Desktop (10 and 11) and Server (2016+)
• Windows desktop device configuration, management, and operation.
• IOS Device configuration, management, and operation.
• Networking Concepts and basic troubleshooting (DNS, DHCP, IP Addressing).
• Switching and Routing Concepts (basic troubleshooting and configuration).
• Meraki Network and Camera Equipment
• VOIP/PBX
• Demonstrated working in a helpdesk ticketing environment.
Senior Security Engineer
New York, NY jobs
About the Senior Security Engineer at Headspace:
At Headspace, we're pushing boundaries with cutting-edge innovations and a relentless focus on security posture and purpose-driven impact. As a Senior Security Engineer, you will be at the forefront of automating response playbooks, seamlessly integrating our security tooling, and crafting innovative detection strategies. Join us in transforming the way we approach cloud solutions while advancing your career in a dynamic and meaningful environment where your expertise truly makes a difference.
You will support our efforts to bring innovative features to life, leverage cutting-edge technologies, and ensure our platform's security for over 65 million users. A big goal needs talented leadership, so come join us and give your career a sense of purpose!
Location: We are currently hiring this role in San Francisco (hybrid), Los Angeles (remote), New York City (remote) and Seattle (remote). Candidates must permanently reside in the US full-time and be based in these cities.
For candidates with a primary residence in the greater SF and LA areas, this role will follow our hybrid model. You'll work 3 days per week from our office, allowing for impactful in-office collaboration and connection, while enjoying the flexibility of remote work for the rest of the week. Your recruiter will share more details about our hybrid model.
What you will do:
Implement, manage, and maintain critical security tools and infrastructure.
Lead and respond to security incidents.
Design and implement automated security investigation, response, and operational workflows.
Integrate diverse security platforms such as SIEM, SOAR, EDR for a unified defense.
Conduct proactive threat modeling to identify risks in systems and processes.
Develop and maintain advanced threat detection rules and analytics.
Collaborate with partner teams to embed security best practices.
Research emerging cybersecurity threats, vulnerabilities, and innovative defense strategies.
Analyze security data to identify trends, measure control effectiveness, and provide reports.
Participate in security incident response and post-incident reviews
Contribute to the development of detection strategies and automation playbooks
What you will bring:
5+ years of relevant work experience.
Bachelor's Degree in Computer Science or Engineering or equivalent.
Experience in developing and tuning threat detection rules and signatures.
Understanding of incident response procedures and forensic techniques.
Proficiency in a scripting language for automation.
Strong understanding of threat modeling.
Knowledge of networking, operating systems internals, and cloud (AWS, Azure, GCP) security.
Excellent analytical, problem-solving, and verbal and written communication skills.
Experience maintaining procedure documentation for internal and external stakeholders.
Preferred Skills:
Experience in healthcare
Pay & Benefits:
The anticipated new hire base salary range for this full-time position is
$122,400-$195,500
+ equity + benefits.
Our salary ranges are based on the job, level, and location, and reflect the lowest to highest geographic markets where we are hiring for this role within the United States. Within this range, individual compensation is determined by a candidate's location as well as a range of factors including but not limited to: unique relevant experience, job-related skills, and education or training.
Your recruiter will provide more details on the specific salary range for your location during the hiring process.
At Headspace, base salary is but one component of our Total Rewards package. We're proud of our robust package inclusive of: base salary, stock awards, comprehensive healthcare coverage, monthly wellness stipend, retirement savings match, lifetime Headspace membership, generous parental leave, and more. Additional details about our Total Rewards package will be provided during the recruitment process.
About Headspace
Headspace exists to provide every person access to lifelong mental health support. We combine evidence-based content, clinical care, and innovative technology to help millions of members around the world get support that's effective, personalized, and truly accessible whenever and wherever they need it.
At Headspace, our values aren't just what we believe, they're how we work, grow, and make an impact together. We live them daily: Make the Mission Matter, Iterate to Great, Own the Outcome, and Connect with Courage. These values shape our decisions, guide our collaborations, and define our culture. They're our shared commitment to building a more connected, human-centered team-one that's redefining how mental health care supports people today and for generations to come.
Why You'll Love Working Here:
A mission that matters-with impact you can see and feel
A culture that's collaborative, inclusive, and grounded in our values
The chance to shape what mental health care looks like next
Competitive pay and benefits that support your whole self
How we feel about Diversity, Equity, Inclusion and Belonging:
Headspace is committed to bringing together humans from different backgrounds and perspectives, providing employees with a safe and welcoming work environment free of discrimination and harassment. We strive to create a diverse & inclusive environment where everyone can thrive, feel a sense of belonging, and do impactful work together.
As an equal opportunity employer, we prohibit any unlawful discrimination against a job applicant on the basis of their race, color, religion, gender, gender identity, gender expression, sexual orientation, national origin, family or parental status, disability*, age, veteran status, or any other status protected by the laws or regulations in the locations where we operate. We respect the laws enforced by the EEOC and are dedicated to going above and beyond in fostering diversity across our workplace.
*Applicants with disabilities may be entitled to reasonable accommodation under the terms of the Americans with Disabilities Act and certain state or local laws. A reasonable accommodation is a change in the way things are normally done which will ensure an equal employment opportunity without imposing undue hardship on Headspace.
Please inform our Talent team by filling out
this form
if you need any assistance completing any forms or to otherwise participate in the application or interview process.
Headspace participates in the
E-Verify Program
.
Privacy Statement
All member records are protected according to our . Further, while employees of Headspace (formerly Ginger) cannot access Headspace products/services, they will be offered benefits according to the company's benefit plan. To ensure we are adhering to best practice and ethical guidelines in the field of mental health, we take care to avoid dual relationships. A dual relationship occurs when a mental health care provider has a second, significantly different relationship with their client in addition to the traditional client-therapist relationship-including, for example, a managerial relationship.
As such, Headspace requests that individuals who have received coaching or clinical services at Headspace wait until their care with Headspace is complete before applying for a position. If someone with a Headspace account is hired for a position, please note their account will be deactivated and they will not be able to use Headspace services for the duration of their employment.
Further, if Headspace cannot find a role that fails to resolve an ethical issue associated with a dual relationship, Headspace may need to take steps to ensure ethical obligations are being adhered to, including a delayed start date or a potential leave of absence. Such steps would be taken to protect both the former member, as well as any relevant individuals from their care team, from impairment, risk of exploitation, or harm.
For how how we will use the personal information you provide as part of the application process, please see: ******************************************
Auto-ApplyComputer Network Defense Analyst
Bluffdale, UT jobs
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Utah, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Job Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyLead Information Security Analyst
Portland, ME jobs
Join Martin's Point Health Care - an innovative, not-for-profit health care organization offering care and coverage to the people of Maine and beyond. As a joined force of "people caring for people," Martin's Point employees are on a mission to transform our health care system while creating a healthier community. Martin's Point employees enjoy an organizational culture of trust and respect, where our values - taking care of ourselves and others, continuous learning, helping each other, and having fun - are brought to life every day. Join us and find out for yourself why Martin's Point has been certified as a "Great Place to Work" since 2015.
Position Summary
The Lead Information Security Analyst assists in the development and implementation of the Information Security program and is a key contributor in developing security policies, monitoring and analyzing traffic and logs, and assisting in protecting the organization's IT systems and software from malicious activity and technology breaches. The Lead Analyst participates and leads security risk assessments, performs and analyzes vulnerability scans, and works with others in IT and the business to remediate and eliminate risks. The Lead Information Security Analyst is responsible for providing expert technical knowledge, standards development, program development, risk assessment, reporting, and awareness education related to information security.
Job Description:
* Assist in leading monitoring SIEM, IDS/IPS, endpoint protections, and identity management solutions.
* Lead technical efforts of administering and engineering the security infrastructure including the single sign-on, multi-factor authentication, business continuity, and GRC tools.
* Assist in leading designs of security solutions.
* Assist in leading efforts in monitoring and auditing information systems, networks, and databases to identify and isolate occurrences of unauthorized activity; prepares and coordinates corrective actions.
* Assist in leading and conducting security assessments and audits, penetration testing, IT forensic investigations and incident management.
* Perform and/or coordinate regular security assessments of existing or new infrastructure or applications.
* Assist in leading and coordinating response to information security incidents and threats
* Assess, manage, and coordinate information and cyber vulnerabilities throughout the organization.
* Develops, defines, reviews and enforces information security policy, standards and guidelines for business operations and technology implementations.
* Proactively identifies information and IT security risks including IT technical implementations or business processes.
* Coordinates group-wide and company-wide information security matters such as incident response, intrusion detection management, and cyber security advisories.
Requirements:
* Bachelor's degree in CIS, CS, Business Administration, or similar, or combination of equivalent education and experience.
* 6+ years of experience with information security technologies, security monitoring, incident response, open-source technologies, and various operating systems.
* Experience with Networking standards, Microsoft AD, Endpoint Support (Windows / iOS ), Server Administration Linux/Windows, Security protocols and monitoring tools.
Knowledge, Skills, & Abilities:
* Understands how organizational workflows affect data meaning and use.
* Proven mentor to other team members
* Strong troubleshooting skills
* Senior level understanding of SIEMs, incident response, disaster recovery, contingency planning, encryption technologies, intrusion detection/prevention systems, and/or vulnerability management
* Able to communicate effectively and clearly to all levels of the IT organization and business when addressing a challenge or identified opportunity - take ownership.
* Can plan/scope several inter-related activities to create efficiencies.
* Creates processes and mentors staff (Internal and External) on best practices
* Manages multiple deliverables and communicates updates effectively to all departments and stakeholders
This position is not eligible for immigration sponsorship.
We are an equal opportunity/affirmative action employer.
Do you have a question about careers at Martin's Point Health Care? Contact us at: *****************************
Auto-ApplySr. Information Security Analyst
Fort Worth, TX jobs
Who We Are JPS Health Network is a $950 million, tax-supported healthcare system in North Texas. Licensed for 582 beds, the network features over 25 locations across Tarrant County, with John Peter Smith Hospital a Level I Trauma Center, Tarrant County's only psychiatric emergency center, and the largest hospital-based family medical residency program in the nation. The health network employs more than 7,200 people.
Acclaim Multispecialty Group is the medical practice group featuring over 300 providers serving JPS Health Network. Specialties range from primary care to general surgery and trauma. The Acclaim Multispecialty Group formed around a common set of incentives and expectations supporting the operational, financial, and clinical performance
outcomes of the network. Our goal is to provide high quality, compassionate clinical care for every patient, every time.
Why JPS?
We're more than a hospital. We're 7,200 of the most dedicated people you could ever meet. Our goal is to make sure the people of our community get the care they need and deserve. As community stewards, we abide by three Rules of the Road:
1. Own it. Everyone who wears the JPS badge contributes to our journey to excellence.
2. Seek joy. Every day, every shift, we celebrate our patients, smile, and emphasize positivity.
3. Don't be a jerk. Everyone is treated with courtesy and respect. Smiling, laughter, compassion - key components of our everyday experience at JPS.
When working here, you're surrounded by passion, diversity, and dedication. We look forward to meeting you!
For more information, visit *********************
To view all job vacancies, visit ********************* ***************************** or ********************
Job Title:
Sr. Information Security Analyst
Requisition Number:
42367
Employment Type:
Full Time
Division:
IT TECHNICAL SERVICES & SECURITY
Compensation Type:
Salaried
Job Category:
Information Technology
Hours Worked:
Location:
JPOC 1350
Shift Worked:
:
Job Summary: Under direction from the Chief Information Security Officer and Manager - Information Security Operations, the Senior Information Security Analyst assists with the planning, implementation, and maintenance of the District's information security program including security administration, security operations, risk management, education, policy/procedure development, and other required duties.
Essential Job Functions & Accountabilities:
* Controls the addition and modification of user identifiers, user credentials, or other object identifiers. Perform access reviews of network and application user accounts.
* Performs tests on backup media for information integrity, as necessary.
* Coordinates cybersecurity incident response activities with interested personnel and affected parties. Responds to triage alerts from security systems in a timely manner. Periodically test the cybersecurity incident response plan and related procedures.
* Compiles event logs from Security Incident Event Manager (SIEM) and other components into a system-wide, time-correlated audit trail. Establish and maintain logging and monitoring operations. Identify potential cybersecurity events in SIEM and audit logs. Include incident alert thresholds in continuous security alert monitoring procedures. Monitor systems for inappropriate usage and other security violations. Review SIEM event logs, Intrusion Detection System reports, security incident tracking reports, vulnerability scan reports, and other security logs regularly.
* Establishes and maintains a data security awareness program. Evaluates the effectiveness of end-user information security training via email phishing and other campaigns. Provide end-user information security training via multiple platforms (newsletters, videos, in-person discussion, et. al.). Conduct periodic phishing simulations of the workforce.
* Develops and monitors key performance indicators (KPIs) to ensure the effectiveness of the information security program. Develops, implements, and maintains information security standards, policies, and procedures in accordance with established information security governance frameworks and regulations (NIST, HIPAA, et. al.).
* Job description is not an all-inclusive list of duties and may be subject to change with or without notice. Staff are expected to perform other duties as assigned.
* Must be able to complete all job duties and functions of the role with or without assistive/adaptive devices, and/or reasonable accommodations.
* Work environments may differ based on job functions and location. Work is subject to schedule changes and/or variable work hours.
Qualifications:
Required Qualifications:
* Bachelor's Degree from an accredited college or university.
AND
* Three (3) years working as a privacy-security compliance specialist, information security specialist, or information technology auditor.
OR
* Seven (7) years working as a privacy-security compliance specialist, information security specialist, or information technology auditor.
Preferred Qualifications:
* Bachelor's Degree in Information Technology, Information Security, or related field(s) of study from an accredited college or university; and
* Two (2) years working as a privacy-security compliance specialist, information security specialist, or information technology auditor in a healthcare environment.
* One (1) year in a senior or team lead role.
* One (or more) of the following certifications:
* Certified Information Systems Security Professional (CISSP)
* Certified Information Security Manager (CISM)
* CompTIA Security+
* CompTIA Cybersecurity Analyst (CySA+)
* CompTIA Advanced Security Practitioner (CASP+)
* SANS GIAC Security Essentials (GSEC)
* Certified in Risk and Information Security Controls (CRISC)
Location Address:
1350 S. Main Street
Fort Worth, Texas, 76104
United States
Information Security GRC Specialist
Dallas, TX jobs
We're not just a workplace - we're a Great Place to Work certified employer!
Proudly certified as a Great Place to Work, we are dedicated to creating a supportive and inclusive environment. At Sonic Healthcare USA, we emphasize teamwork and innovation. Check out our job openings and advance your career with a company that values its team members!
Position Summary
The Information Security GRC Specialist supports Sonic Healthcare USA's Cybersecurity program by implementing and maintaining governance, risk, and compliance (GRC) practices that protect sensitive data and ensure regulatory alignment. This role leads internal audits, risk assessments, and policy development efforts, while serving as a technical resource across departments and external partners. The ideal candidate brings a strategic mindset, strong working knowledge of security frameworks, and a collaborative approach to problem-solving.
Key Responsibilities
Implement and monitor security controls aligned with HIPAA, ISO27001:2022, and NIST CSF
Conduct internal and third-party risk assessments; support remediation and audit readiness
Develop and maintain cybersecurity policies, procedures, and awareness training programs
Respond to vendor security assessments and manage documentation for external audits
Maintain GRC tools, dashboards, and evidence artifacts; define control ownership and track corrective actions
Provide cross-functional guidance on compliance requirements and stay current with regulatory changes
Qualifications
Bachelor's degree in Computer Information Systems or related field (preferred)
4+ years of experience in cybersecurity risk assessments, audits, policy development, and compliance
Familiarity with HIPAA, ISO27001:2022, and NIST CSF v2.0 frameworks
Certifications such as CISA, CISSP, CISM, or CRISC (preferred)
Core Competencies
Strong understanding of security governance, compliance frameworks, and regulatory requirements
Familiarity with IT infrastructure, data architecture, and cybersecurity technologies
Skilled in GRC strategy development, data analysis, reporting, and maintaining technical standards
Ability to communicate complex technical concepts clearly to varied audiences, including senior leadership
Proven capacity to apply risk-based approaches to audits and assessments
Comfortable working independently and collaboratively across teams and geographies
Adaptable in fast-paced environments with shifting priorities
Scheduled Weekly Hours:
40
Work Shift:
Job Category:
Information Technology
Company:
Sonic Healthcare USA, Inc
Sonic Healthcare USA is an equal opportunity employer that celebrates diversity and is committed to an inclusive workplace for all employees. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, age, national origin, disability, genetics, veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Auto-ApplySECURITY SYSTEMS ANALYST II
Tampa, FL jobs
At Moffitt Cancer Center, we strive to be the leader in understanding the complexity of cancer and applying these insights to contribute to the prevention and cure of cancer. Our diverse team of over 9,000 are dedicated to serving our patients and creating a workspace where every individual is recognized and appreciated. For this reason, Moffitt has been recognized on the 2023 Forbes list of America's Best Large Employers and America's Best Employers for Women, Computerworld magazine's list of 100 Best Places to Work in Information Technology, DiversityInc Top Hospitals & Health Systems and continually named one of the Tampa Bay Time's Top Workplace. Additionally, Moffitt is proud to have earned the prestigious Magnet designation in recognition of its nursing excellence. Moffitt is a National Cancer Institute-designated Comprehensive Cancer Center based in Florida, and the leading cancer hospital in both Florida and the Southeast. We are a top 10 nationally ranked cancer center by Newsweek and have been nationally ranked by U.S. News & World Report since 1999.
Working at Moffitt is both a career and a mission: to contribute to the prevention and cure of cancer. Join our committed team and help shape the future we envision.
Summary
Security Systems Analyst II
Position Highlights:
* The Security Systems Analyst II, will maintain the architecture of security controls for applications of systems, such as infrastructure and web application firewalls.
* The Security Systems Analyst II reviews alerts and data from network and server infrastructure and documents formal, technical incident reports.
* Works with Security Systems Engineer on foundational technology security reviews and assessments.
* The Security Systems Analyst II will also administer and maintain an organizational SIEM and log solution in concert with organizational monitoring platforms.
* This position leverages experience with PKI and certificates and will also deliver XDR across the organization.
Responsibilities:
* Performs maintenance and management of security systems and applications, including firewalls, PKI and certificates, network security appliances and host-based security systems
* This includes infrastructure and web applications firewalls, including physical and virtual firewalls, including day to day maintenance of firewall rules. Investigates and documents issues or incidents involving the enterprise firewall.
* Participates in infrastructure projects to develop, plan and implement specifications for network and distributed system security technologies in support of key information systems
* Assists remediation required by audits, and document exceptions as necessary
Education and Experience:
* High School Diploma/GED
* Minimum of 5 years of experience in an IT support environment which could include experience in more than one of the following IT disciplines:
* Complex IT Portfolio environment including large scale systems, servers, storage and networking.
* High availability application layer and/or stateful inspection based firewalls.
* VPN gateways & remote access clients.
* Public key Infrastructures including Certificate Authority (CA), Registration Authority (RA) and Certificate Repository.
* Securing Internet access, Intranet, and Extranet.
* Technology background in systems, networking and/or data storage design, engineering and support.
Plus
* Experience delivering XDR across the organization.
* Experience with PKI and certificates
Share:
Director, Information Security
Aliso Viejo, CA jobs
Are you a hands-on security leader ready to make a measurable impact in a mission-driven organization? We're looking for a Director of Information Security to lead and scale our security operations, incident response, and engineering efforts. In this role, you'll oversee our security ecosystem - from real-time monitoring to proactive threat hunting - and help shape the future of enterprise security at a growing company.
This is a highly collaborative position where you'll work cross-functionally with teams across the business to protect our information assets, infrastructure, and services - especially within a SaaS and life sciences environment.
What will you do?
Shape and drive the enterprise security operations strategy in alignment with broader company goals.
Serve as a trusted advisor to senior leadership on all things security.
Manage our Security Operations Center (SOC), ensuring rapid incident detection, triage, and response.
Oversee threat intelligence, vulnerability management, and operational risk mitigation initiatives.
Partner with IT and engineering teams to deploy, tune, and optimize tools like SIEM, SOAR, EDR, and DLP.
Implement automation and integrations that improve speed and efficiency.
Lead cyber incident response efforts and continuously test and improve our disaster recovery and response plans.
Coordinate cross-functional teams (e.g., Legal, HR, Communications) during major security events.
Lead, mentor, and grow a high-performing team of security and infrastructure professionals.
Support the development of a resilient, inclusive, and learning-driven culture across the department.
Align programs with regulatory standards (HIPAA, SOX, GDPR, PCI-DSS) and frameworks (NIST, MITRE ATT&CK).
Support audits and ensure documentation is ready and accurate.
How will you get there?
Bachelor's degree in Computer Science, Information Security, or related field (Master's a plus).
12+ years of relevant experience, including 4+ years leading teams in complex enterprise environments.
Hands-on expertise in SOC management, incident response, and threat intelligence.
Experience in the Medical Device, Life Sciences, or highly regulated industries preferred.
Professional certifications such as CISSP, CISM, GIAC, or CEH.
Proficiency with security tools including SIEM, EDR, SOAR, IDS/IPS, and vulnerability management platforms.
Strong knowledge of cloud (AWS, Azure, GCP), Windows/Linux systems, and network protocols.
Familiarity with security frameworks and standards (NIST, MITRE, ISO 27001).
Proven ability to build, lead, and retain high-performing technical teams.
A proactive, solutions-oriented mindset with excellent communication and collaboration skills.
#GKOSUS
Auto-ApplyComputer Network Defense Analyst
Dayton, OH jobs
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyComputer Network Defense Analyst
Dayton, OH jobs
Job DescriptionPrime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email ******************************* with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Senior Information Security Engineer
Boston, MA jobs
At WHOOP, we're on a mission to unlock human performance. WHOOP empowers members to perform at a higher level through a deeper understanding of their bodies and daily lives. WHOOP is seeking a Senior Information Security Engineer to serve as a technical leader in our Security team reporting to our Information Security Manager. In this role, you will drive the deployment and continuous enhancement of controls that protect millions of users' biometric and health data, build scalable defenses across our infrastructure and applications, and lead incident response efforts with visibility across the business. This is an opportunity to have direct impact at scale, working alongside engineers, product teams, and executives to drive forward-looking security strategies. RESPONSIBILITIES:
Implement and enhance security controls by leading the deployment, integration, and tuning of solutions such as CNAPP, SIEM, CASB, EDR, DLP, and MDM to maximize effectiveness.
Support security design decisions by providing subject matter expertise on cloud and SaaS security best practices while influencing architecture led by the Security Architect role.
Lead incident response and investigations by guiding containment, remediation, root cause analysis, and post-incident improvements.
Strengthen application security by overseeing secure development practices and managing SAST, SCA, and DAST tooling.
Advance identity and access management by supporting IAM policy enforcement, SSO, MFA, SCIM, RBAC, and user lifecycle governance.
Secure AI systems and integrations by assessing and protecting embedded APIs and organizational AI tool usage to ensure resilience, privacy, and compliance.
Collaborate cross-functionally by working with Engineering, IT, and GRC teams to embed security into systems and workflows.
Mentor and influence by providing technical guidance, reviewing work, and promoting security-first thinking across the organization.
Stay ahead of threats and regulations by tracking emerging risks, technologies, and compliance requirements to inform forward-looking strategies.
Participate in and help improve the on-call rotation by providing guidance, escalation support, and driving improvements in response processes.
QUALIFICATIONS:
Bachelor's degree in Computer Science, Information Security, or a related technical field and/or advanced certifications (CISSP, CISM, AWS Security Specialty, SANS, etc.).
8+ years of hands-on experience in Information Security, IT Security, or a related role, including at least 2 years in a senior or lead capacity.
Proven track record implementing and managing advanced security technologies (e.g., CASB, CNAPP, CSPM, SIEM, SOAR, DLP, SWG).
Experience securing AI/ML systems or APIs, including governance of third-party AI integrations and organizational use of AI tools.
Strong understanding of modern cloud security architecture (AWS, Azure, GCP) and experience performing threat modeling and risk assessments on cloud-based systems.
Hands-on experience with application security tooling (SAST, SCA, DAST) and embedding secure development practices.
Demonstrated leadership in security incident response, investigations, and root cause analysis.
Effective communicator with the ability to influence stakeholders and explain security concepts to technical and non-technical audiences.
Strong project management skills and the ability to drive initiatives to completion in a fast-paced environment.
Experience mentoring engineers and setting operational standards.
Familiarity with compliance and risk frameworks relevant to health and AI (SOC 2, ISO 27001, PCI, GDPR, FTC guidance, HIPAA-adjacent state laws) is a plus.
Interested in the role, but don't meet every qualification? We encourage you to still apply! At WHOOP, we believe there is much more to a candidate than what is written on paper, and we value character as much as experience. As we continue to build a diverse and inclusive environment, we encourage anyone who is interested in this role to apply.
WHOOP is an Equal Opportunity Employer and participates in E-verify to determine employment eligibility. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
The WHOOP compensation philosophy is designed to attract, motivate, and retain exceptional talent by offering competitive base salaries, meaningful equity, and consistent pay practices that reflect our mission and core values.
At WHOOP, we view total compensation as the combination of base salary, equity, and benefits, with equity serving as a key differentiator that aligns our employees with the long-term success of the company and allows every member of our corporate team to own part of WHOOP and share in the company's long-term growth and success.
The U.S. base salary range for this full-time position is $150,000 - $190,000. Salary ranges are determined by role, level, and location. Within each range, individual pay is based on factors such as job-related skills, experience, performance, and relevant education or training. In addition to the base salary, the successful candidate will also receive benefits and a generous equity package.
These ranges may be modified in the future to reflect evolving market conditions and organizational needs. While most offers will typically fall toward the starting point of the range, total compensation will depend on the candidate's specific qualifications, expertise, and alignment with the role's requirements.
Learn more about WHOOP.
Auto-ApplyInformation Security Associate or Specialist
Alpharetta, GA jobs
The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff.
Role Description.
Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance.
Essential Duties and Responsibilities
-Monitoring and maintaining computer systems and networks
-Responding in a timely manner to service issues and requests
-Providing technical support across the company
-Support equipment repair and replacement service
-Testing Benchmarking new technology
-Maintain and execute IT Training program for new employs
-Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity
-Reporting of daily system issues.
-Analyze and propose system improvements.
-Documentation related to IT/IS policies, issues, and procedures.
-Participation and active analyst, designer, and developer in IT projects.
-Monitoring of IT/IS infrastructure-related expenses.
-Other duties as assigned.
Requirements
Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position:
Education and Work Experience:
-Vocational or undergraduate degree in information systems and computer science or related field.
-One (1) to three (3) years of information systems, computer science and/or IT-related experience.
Knowledge and Skills:
-PC and Server management
-IT Hardware and Software installation
-Initiative skills
-Problem-solving skills
-Understanding of IT infrastructure and application architectures
-Great Social and Communication Skills
-Great Oral and Written Communication Skills
-System process analysis and design capabilities/experience
-Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris)
-Antivirus, NAC, DLP, MDM and other IS Solutions
-IS Related definition and policies (ex. ISO 27001)
-Networking (Cisco/HP) and network devices (Routers and Switch)
-VPN
-TCP/IP, UDP, Network standards
-LDAP, Active Directory and Exchange
-Access Control
-Security Cameras
-Firewall, Web Filter and other network security appliance solutions
-Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus)
-MS Office skills (especially Excel skills)
Physical Demands:
-Position requires sitting at a desk working on a computer for at least 2/3 of time.
-Position requires regular and reliable attendance.
-Position requires local travel up to 10% of the time.
Computer Network Defense Analyst
Aurora, CO jobs
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Colorado, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Job Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
$115,000 - $260,000 a year Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyComputer Network Defense Analyst
Aurora, CO jobs
Job DescriptionPrime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Colorado, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Job Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email ******************************* with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Computer Network Defense Analyst
Annapolis, MD jobs
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Maryland, to support our team. We have varying levels of CNDAs, depending on years of experience and education.ESSENTIAL JOB DUTIES
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
REQUIRED QUALIFICATIONS
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
DESIRED QUALIFICATIONS
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyInformation Security Manager/Senior Manager
Rancho Santa Margarita, CA jobs
Applied Medical is a new generation medical device company with a proven business model and commitment to innovation fueled by rapid business growth and expansion. Our company has been developing and manufacturing advanced surgical technologies for over 35 years and has earned a strong reputation for excellence in the healthcare field. Our unique business model, combined with our dedication to delivering the highest quality products, enables team members to contribute in a larger capacity than is possible in typical positions.
Position Description
The Information Security Manager / Senior Manager leads the advancement of Applied Medical's global information security program. This role develops and implements strategies that protect organizational data, systems, and infrastructure while ensuring alignment with business objectives, regulatory standards, and frameworks such as the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and International Organization for Standardization (ISO) 27001.
The Information Security Manager / Senior Manager directs a team of security professionals in a collaborative environment, overseeing operations, risk management, and incident response. This position requires a proven leader who combines technical expertise with strategic vision, fosters cross-functional alignment, mentors high-performing teams, and promotes a strong culture of security awareness across the organization.
Key Responsibilities
* Lead and mentor a team of information security analysts to ensure effective daily operations across areas such as network security, endpoint protection, and identity and access management (IAM).
* Oversee threat detection, incident response, and vulnerability management processes, ensuring timely investigation and resolution of security events.
* Develop and implement security strategies that align with business objectives, compliance standards, and recognized frameworks including NIST CSF, ISO 27001, and SOC 2.
* Collaborate with global IT, engineering, and application development teams to integrate security controls into infrastructure, cloud environments, and software systems.
* Evaluate and manage third-party vendor risk, ensuring adherence to Applied Medical's information security standards and regulatory requirements.
* Lead the review and continuous improvement of information security policies, procedures, and documentation.
* Develop and deliver organization-wide security awareness and training programs that promote a proactive security culture.
* Monitor industry trends, emerging threats, and new technologies to strengthen Applied Medical's security posture and resilience.
Success in This Role Looks Like
* Leads a cohesive and motivated information security team that demonstrates accountability, collaboration, and continuous improvement.
* Aligns information security initiatives with business goals and ensures compliance with internal and external standards.
* Builds trust and alignment across departments by communicating complex security concepts in clear, practical terms.
* Anticipates evolving risks and proactively enhances the organization's ability to prevent, detect, and respond to security threats.
* Demonstrates strong partnership with executive and technical teams to advance Applied Medical's long-term security strategy.
Position Requirements
This position requires the following skills and attributes
* Bachelor's degree in information technology, computer science, or a related field.
* Five or more years of information security experience, including at least three years in a leadership or management role.
* Proven experience managing security operations, including oversight of a Security Operations Center (SOC) and related functions.
* Strong understanding of cybersecurity principles, including network and cloud security, endpoint protection, identity and access management (IAM), and data protection.
* Knowledge of security frameworks and regulations such as NIST CSF, ISO 27001, General Data Protection Regulation (GDPR), and Health Insurance Portability and Accountability Act (HIPAA).
* Demonstrated ability to lead cross-functional teams, communicate effectively with non-technical stakeholders, and influence decision-making across levels.
* Experience making risk-based decisions that balance security needs with business objectives.
* Excellent analytical, organizational, and problem-solving skills.
Preferred
The following skills and attributes are preferred
* Master's degree in information security, cybersecurity, or a related field.
* Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Cloud Security Professional (CCSP).
* Experience managing information security programs within a regulated industry such as medical device, healthcare, or manufacturing.
* Familiarity with Lean Six Sigma or other continuous improvement methodologies.
* Strong understanding of budgeting, cost-benefit analysis, and security investment planning.
Benefits
* Competitive compensation range: $100000 - $150000 / year (California).
* Comprehensive benefits package.
* Training and mentorship opportunities.
* On-campus wellness activities.
* Education reimbursement program.
* 401(k) program with discretionary employer match.
* Generous vacation accrual and paid holiday schedule.
Please note that the compensation range may be based on factors such as relevant education, qualifications, experience. The compensation range may be adjusted in the future, and special discretionary bonus or incentive compensation plans may apply.
Our total reward package reflects our commitment to team member growth and well-being, as we invest in your development and offer a range of benefits designed to enhance your career and life.
Equal Opportunity Employer
Applied Medical is an Equal Employment Opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, disability (mental and physical), exercising the right to family care and medical leave, gender, gender expression, gender identity, genetic information, marital status, medical condition, military or veteran status, national origin, political affiliation, race, religious creed, sex (including pregnancy, childbirth, breastfeeding and related medical conditions), or sexual orientation, or any other basis protected by federal, state or local laws in the locations where Applied Medical operates.
Auto-Apply