Principal Security Analyst
Remote job
Job Description
Foresite Cybersecurity, a global Google-first security partner, delivers cutting-edge managed security, cyber consulting, and compliance services. We empower businesses to navigate the evolving cloud threat landscape with robust security outcomes.
About the Role
Are you a seasoned cybersecurity professional ready to defend against global threats? Join Foresite's Cyber Fusion Center in Overland Park, KS. As a Principal SOC Analyst, you'll be on the front lines, monitoring real-time events, leveraging threat intelligence, and protecting our valued clients. If you possess a strong foundation in networking, system administration, and a passion for information security, we want you!
Responsibilities:
Real-time Threat Detection: Monitor SIEM (including Google Chronicle SIEM) to detect and analyze security events.
Incident Response: Investigate alerts, analyze incidents, and respond with precision.
Proactive Threat Hunting: Identify and mitigate emerging threats.
Security Analysis: Analyze events from Google Security Operations, EDR, and managed security systems.
Data & System Management: Manage customer data, inventories, and operational tickets.
Escalation & Resolution: Provide guidance, resolve complex issues, and escalate as needed.
Continuous Improvement: Contribute to enhancing security products and services.
Team Leadership: Serve as an escalation point and mentor team members.
Collaboration & Communication: Work with engineers, responders, and clients.
Documentation & Reporting: Document incidents, analyze patterns, and contribute to reports.
Continuous Learning: Stay updated on threats, vulnerabilities, and best practices.
Adapt & Thrive: Embrace the challenge of a fast-paced security environment.
Other duties as assigned
Qualifications:
Security Expertise: Solid understanding of security principles, attack vectors, and technologies.
3+ years dedicated cybersecurity experience.
Training in System Administration, Networking, and/or Security
SIEM Proficiency: Hands-on experience with SIEM (preferably Google Security Operations).
Analytical Skills: Strong analytical and problem-solving abilities.
Communication Prowess: Excellent written and verbal communication skills.
Teamwork & Collaboration: Ability to work effectively with colleagues and clients.
Passion for Security: Genuine desire to protect organizations from cyber threats.
CompTIA Security+ and Network+ certifications.
Advanced knowledge of firewalls, routing/switching, and security operations.
Experience with Google Security Operations, Google Cloud, Security Command Center, or Google Threat Intelligence.
Aptitude for network/system troubleshooting.
Critical thinking and logic skills.
Ability to stay calm under pressure.
Strong task and time management.
Experience mentoring security analysts
Skills:
Professional demeanor and strong work ethic.
Excellent written and verbal communication skills.
Ability to develop technical documentation and guidelines.
Strong collaboration skills with technical and non-technical stakeholders.
Grow with Foresite:
This is just the beginning. At Foresite, we're committed to your professional growth.
As a SOC Analyst, you'll have opportunities to explore diverse career paths in Security Engineering, Consulting, Solutions Architecting, and even Sales.
We offer a culture of mentorship, in-depth Google Cloud training and certification programs, and career planning resources to help you reach your full potential.
Benefits:
Location: This position is preferred in-person in our Kansas City office, offering the opportunity to collaborate closely with our dynamic SOC team.
(Foresite also offers a variety of fully remote positions.)
Shift Work: Be a part of our 24/7 Security Operations Center, contributing to a critical function that provides continuous protection for our clients.
Competitive Compensation and Benefits: We offer a comprehensive benefits package and competitive compensation to all our employees.
Cloud Security Analyst (Remote)
Remote job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 12/30/2025.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
Auto-ApplyCyber Insider Threat Analyst (Remote)
Remote job
Country:
United States of America Remote
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract.
Security Clearance:
None/Not Required
RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA.
The following position is to join our RTX Enterprise Services team:
Role Overview:
Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats.
What You Will Do:
Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns.
Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers.
Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats.
Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models.
Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts.
Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions.
Work independently and with teams to define and complete analysis activities.
Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers.
Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape.
Assist in building processes, procedures and training for the insider threat team.
Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes.
Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies.
Perform other duties as assigned and as required to continuously drive process excellence.
Qualifications You Must Have:
Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience.
Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions.
Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise.
The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Qualifications We Prefer:
Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE).
Industry certifications in information security or technology such as, CISSP, CISM, CGEIT.
Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR).
Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms.
Demonstrate critical thinking and problem-solving skills.
What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care.
Learn More & Apply Now!
Work Location: Remote
Please consider the following role type definition as you apply for this role:
Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed.
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplySenior Security Researcher
Remote job
About Us
Endor Labs is building the Application Security platform for the software development revolution. Modern software is complex and dependency-rich, making it increasingly difficult to pinpoint the risks that truly matter. Endor Labs solves this challenge by building a call graph of your entire software estate-enabling teams to clearly identify, prioritize, and fix critical risks faster.
Trusted by companies that are one or one hundred years old, Endor Labs secures code whether it was written by humans or AI, and whether it's 40-year old C++ code or cutting edge Bazel Monorepos. Endor Labs was founded by serial entrepreneurs Varun Badhwar and Dimitri Stiliadis, and is backed by leading VC firms such as Dell Technology Capital, Lightspeed, and Sierra Ventures.
About the Role
We are looking for a Senior Security Researcher to lead our offensive security research efforts in the domain of software supply chain security. This is a unique opportunity to work at the forefront of secure SDLC and software supply chain security, identifying zero-day vulnerabilities in software artifacts and CI/CD systems, analyzing attack trends, and influencing the next generation of security capabilities in our products.
This role requires deep technical expertise in vulnerability research, application security, reverse engineering, and offensive security techniques. The ideal candidate will also play a key role in publishing groundbreaking research through blogs, white papers, and speaking engagements at top security conferences.
How You'll Make an Impact
Conduct offensive security research on software supply chain threats, identifying and analyzing zero-day vulnerabilities.
Develop and refine exploit techniques to understand modern attack vectors targeting software supply chain through malicious code, 3rd party libraries, and CI/CD systems.
Work closely with Product Management to translate research findings into innovative security capabilities within Endor Labs' products.
Publish research findings through technical blogs, white papers, and industry-leading security conferences.
Collaborate with security engineers and developers to prototype and implement detection and mitigation strategies for emerging threats.
Contribute to the security community by developing open-source tools, methodologies, or frameworks that enhance software supply chain security.
Stay ahead of the latest threats, attacker methodologies, and evolving security trends to continuously refine our research efforts.
What You Bring to the Table
5+ years of experience in security research, vulnerability discovery, and offensive security.
Deep expertise in reverse engineering, exploit development, and software vulnerability analysis.
Strong understanding of software supply chain security, including package management systems, CI/CD pipelines, and dependency analysis.
Experience discovering and responsibly disclosing zero-day vulnerabilities.
Proven track record of publishing high-quality research or presenting at top security conferences (e.g., Black Hat, DEF CON, RSAC, BSides).
Proficiency in programming languages such as Python, Rust, or Go.
Strong analytical skills and the ability to conduct complex security research autonomously.
Excellent communication skills, both written and verbal, to convey technical concepts to diverse audiences.
Why Endor Labs
We're building at the intersection of developer productivity and security - one of the fastest-growing spaces in software. Our dev-loved platform has real ROI, strong momentum, and customers who care about doing things right. You get to work with a world-class team dedicated to pushing the boundaries of security research and directly influence the security of modern software supply chains.
At Endor Labs, we think big, start small, and learn fast. We take ownership, move with purpose, and always start with the customer's success. We debate with data, make the complex simple, and challenge each other with kindness and candor. We celebrate wins, learn from misses, and have fun along the way - because when our customers win, we all win.
Endor Labs is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. Even if you don't fit every requirement above, we believe in the power of diverse perspectives and experiences, so we encourage all talented individuals to apply-there's no one-size-fits-all here.
Auto-ApplyStaff Security Researcher
Remote job
BeyondTrust is a place where you can bring your purpose to life through the work that you do, creating a safer world through our cybersecurity SaaS portfolio.
Our culture of flexibility, trust, and continual learning means you will be recognized for your growth, and for the impact you make on our success. You will be surrounded by people who challenge, support, and inspire you to be the best version of yourself.
The Role
As a Staff Research Engineer, you'll drive the evolution of our identity security platform by combining cutting-edge security research with robust engineering practices. You'll work at the intersection of security domain expertise and software development, translating novel research findings into production-ready systems that protect our customers from sophisticated identity-based threats. This role offers the opportunity to shape the future of identity security through innovative research, scalable engineering solutions, and thought leadership in the security community.
Please check out our page on X - *************************** - for an overview of our recent projects. This will help you determine if we're a good fit for you.
What You'll Do
Research & Innovation
Conduct original security research to identify emerging identity attack vectors and develop novel detection methodologies
Design and implement advanced analytics including rule-based systems, behavioral analysis, and machine learning models for threat detection
Expand and optimize our large-scale entitlement graph systems that map privilege escalation paths across customer environments
Develop proactive recommendation engines that identify security misconfigurations before they become attack vectors
Engineering & Implementation
Build production-grade security systems with emphasis on scalability, reliability, and performance optimization
Implement and maintain detection pipelines using PySpark, Spark SQL, and distributed computing frameworks
Design custom data representations (graphs, time-series, etc.) to support advanced analytical capabilities
Establish engineering best practices including comprehensive unit testing, automation, and CI/CD pipelines
Data Analysis & Optimization
Explore large-scale customer datasets using Spark and Databricks to validate detection hypotheses and uncover new threat patterns
Continuously monitor and tune detection algorithms based on real-world telemetry and performance metrics
Collaborate with data science teams to integrate machine learning models into production detection systems
Optimize system performance to handle massive data volumes efficiently
Leadership & Knowledge Sharing
Provide technical leadership and mentorship to product and engineering teams
Present research findings at industry conferences and security forums
Publish technical blogs and research papers to establish thought leadership
Collaborate with cross-functional teams to translate research insights into product roadmap priorities
What You'll Bring
Required Qualifications
Strong engineering background with proven experience developing and maintaining production security systems
Strong Python programming skills with experience in large-scale data processing
Proficiency in SQL and database optimization techniques
Experience working with SIEM tools, log analysis platforms, or similar security data systems
Knowledge of adversarial tactics, techniques, and procedures (TTPs) and corresponding defensive strategies
Experience in engineering event detection and response systems with focus on tuning and optimization
Preferred Qualifications
Big data processing experience with Apache Spark, Databricks, or similar distributed computing platforms
Background in security research with published findings or conference presentations
Knowledge of cloud security, containerization, and modern infrastructure technologies
Experience with graph databases and network analysis techniques
Familiarity with machine learning applications in cybersecurity
Track record of speaking at technical conferences or contributing to security research publications
Technologies You Should Know
Required
Python
SQL and database technologies
Distributed data processing frameworks
Preferred
Apache Spark / PySpark
Databricks platform
Graph databases and analysis tools
Cloud platforms (AWS, Azure, GCP)
Containerization technologies (Docker, Kubernetes)
Machine learning frameworks and libraries
What Makes This Role Unique
This position offers a rare opportunity to work at the cutting edge of identity security research while building systems that protect organizations worldwide. You'll have the freedom to pursue novel research directions, the resources to implement your ideas at scale, and the platform to share your expertise with the broader security community. We're looking for someone who thrives on solving hard problems, values engineering excellence, and wants to make a meaningful impact on the future of cybersecurity.
Better Together
Diversity. Inclusion. They're more than just words for us. They are the guiding values of how we build our teams, cultivate leaders, and create a culture where people feel connected.
We take care of our employees so they can take care of our customers. Customers who come from all walks of life just like us. We hire incredible people from diverse backgrounds because when we are different together, we are stronger together.
About Us
BeyondTrust is the global identity security leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.
Learn more at ********************
#LI-BS1
Auto-ApplySecurity Researcher
Remote job
Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
Auto-ApplyCyber Security Analyst
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
Cyber Analyst, Digital Forensics Incident Response
Remote job
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Fully Remote
Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
Auto-ApplyRemote Imperva Data Security SME
Remote job
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security consulting services. We pride ourselves on our best of breed security solutions and services that span a myriad of government, education and business verticals. Our staff is comprised of both certified technical and business professionals who can help you successfully navigate complexities of planning, design, implementation and management of securing data. Our approach is vendor agnostic giving our customers the freedom to choose the best customized security model for their business.
Requirements
We are looking for a Remote Imperva Data Security SME experienced with Imperva solutions to protect sensitive data across platforms. Key responsibilities include configuring and monitoring Imperva Data Security Fabric, managing data security controls, and collaborating to address vulnerabilities.
Qualifications:
Experience with Imperva Data Security Fabric (DSF), WAF and/or DAM
Knowledge of data protection regulations (e.g., GDPR, CCPA)
Proficiency in database security practices and security incident response.
Strong problem-solving and communication skills
Auto-ApplyCyber Security Analyst II (Remote)
Remote job
is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions.
KEY RESPONSIBILITIES:
* Act as the primary point of escalation for Cyber Security Analyst I technicians
* Provides coaching to Cyber Security Analyst I employees on how to perform their duties
* Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats
* Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole
* Performs all of the following functions of a Cyber Security Analyst I, with proficiency
* Monitor computer networks for security issues and respond accordingly, including:
* Creating/Managing firewall rules
* Managing anti-virus endpoint tools
* Performing event correlation analysis on potential threats identified through our SIEM
* Configuring/Managing log management
* Configuring/Managing file integrity monitoring
* Performing vulnerability scans and remediation of identified risks
* The methodology & analysis of identifying compromised servers
* Performing rule tuning in our SIEM for improved detection capabilities
* Interact with customers by phone, chat, or trouble ticket on any customer facing security issues
* Investigate, document and assess security breaches and other cyber security incidents
* Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
* Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives
* Identify and fix detected vulnerabilities to maintain a high-security standard
* Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities
* May be relied upon as a technical point of contact during Escalated Events relating to security
* Review, investigate and respond to any external "abuse" complaints coming from our IP space
* Develop best practices for IT security
* Research security enhancements and make recommendations to management
* Handle escalated internal or customer security issues from support or another operations team
* Takes part in any security-oriented projects or critical initiatives
* Stay up to date on information technology & security news, trends and standards
* Deliver an exceptional customer experience every day
* Other duties as identified or assigned
DESIRED ROLE OUTCOMES:
* Keep us and our customers free from security incidents but respond capably when one occurs
* Our detection of security threats is continually improving
* Provide valuable insights and visibility around security incidents to our customers
* Have a staff of customer focused, energetic and security savvy team members
REQUIRED SKILLS:
* A minimum of 2 years' experience in a security analyst role
* Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred
* Must have experience in a Security Operations Center (SOC)
* Must have technical troubleshooting and problem-solving skills
* Understanding of network management principles
* Experience in systems administration of Windows and Linux based operating systems
* Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies
* Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts
* Ability to identify and mitigate network vulnerabilities and explain how to avoid them
* Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
* Ability to learn and communicate technical information to non-technical people
* Must have excellent written & oral communication skills, and strong interpersonal skills
* Must emulate the Ntirety Values in all that they do
Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA).
Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law.
Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
Senior Security GRC Analyst
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplyGlobal Cyber Wordings Analyst
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplySenior Information Security Risk Specialist (GRC)
Remote job
About Us
At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you.
What are we looking for?
We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively.
What will you do?
Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders.
Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth.
Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate.
Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities.
Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002.
Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance.
Help support internal/external audits and evidence collection via a GRC tool.
Document new and update existing policies, procedures, standards and resources
Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities.
Help support customer security reviews, RFPs and external security and privacy inquiries.
Participate in defining, collecting and tracking various Security Metrics.
What skills and experience should you bring?
5+ years of experience working in information security, risk or compliance.
Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc.
Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST.
Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk.
Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines.
Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization.
Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers.
Experience working with both technical and non-technical teams.
Ability and desire to understand the intent of requirements and provide effective recommendations.
Ability to prioritize in a highly dynamic work environment.
Our Preferred Qualifications:
Advanced degree in computer science, Information Technology, Information Security or related field.
Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks.
Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.)
Ability to assess and pragmatically define scope and relevant controls.
Strong desire to learn and continuously develop and deepen technical skills.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events, including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000-$138,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
Auto-ApplyInformation Security Support Analyst, Contract
Remote job
Overview of 66degrees
66degrees is a leading consulting and professional services company specializing in developing AI-focused, data-led solutions leveraging the latest advancements in cloud technology. With our unmatched engineering capabilities and vast industry experience, we help the world's leading brands transform their business challenges into opportunities and shape the future of work.
At 66degrees, we believe in embracing the challenge and winning together. These values not only guide us in achieving our goals as a company but also for our people. We are dedicated to creating a significant impact for our employees by fostering a culture that sparks innovation and supports professional and personal growth along the way.
Overview of Role
A client of 66degrees' is seeking a junior contractor to engage on a 8+-month remote contract with the potential to extend/convert into a permanent role with the client. Interested candidates should have the following required skills and the ability to work independently as well as within a team environment.
The Information Security Support Contractor will function as a member of the Security Support team and help support day-to-day operations. This role will focus on frontline duties and interact with technical and business units. This role requires strong teamwork and initiative, along with the ability to build and maintain relationships across technical and business units. Excellent communication skills are essential.
Responsibilities
Provide level 1 support for incident and request tickets escalated from other technical teams.
Contribute to protecting the integrity and confidentiality of client data and infrastructure while enabling business functionality in all systems and environments by learning to support applicable security solutions.
Learn about the security tools and solutions implemented within the organization.
Assist in improving processes, identify efficiencies, and recommend solution enhancements to improve service-level delivery.
Support the client Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews.
Assist in supporting the Identity Access Management team.
Gather and report on key organizational information security metrics.
Qualifications
1-3 years of experience as an Information Security Analyst or experience in an IT support capacity.
Required experience working with:
Active Directory/Azure
File Share Permissions
Email security understanding
Mimecast or a similar solution
Keeper - Nice to have
zScaler - Nice to have
Strong communication, good customer service experience and flexibility with change are all required.
Eagerness to work in a collaborative environment.
66degrees is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to actual or perceived race, color, religion, sex, gender, gender identity, national origin, age, weight, height, marital status, sexual orientation, veteran status, disability status or other legally protected class.
Auto-ApplySenior Information Security Specialist-SECRET CLEARANCE REQUIRED
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
Auto-ApplySecurity Systems Engineer (Remote)
Remote job
The application window is expected to close on 12/08/2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. **AI at Cisco** With Cisco, you're not just embracing the future - you're helping create it! We are focused on integrating AI into our solutions to transform collaboration, security, networking, observability, and more. We are innovating ethical AI products and infrastructure that enable our customers to stay ahead of cyberattacks, predict and prevent network outages, and make team meetings more productive. Our extensive data sets and broad customer reach means limitless possibilities for you to build impactful AI solutions that solve a wide array of real-world problems. Join us at Cisco where you will innovate with top AI experts and be a part of our mission to power an inclusive future for all.
**AI in the Business Unit**
The Cisco Security group includes such industry leading security suites and products as Hypershield, Cisco Secure Access, Identity Intelligence, Duo, XDR, Cisco Security AI, Talos, and more. We are using machine learning and GenAI across our products to simplify security, prevent sophisticated attacks, and ensure the secure use of large language models (LLMs).
In Security, we are building AI-enhanced cybersecurity for better outcomes, combining AI with the breadth of Cisco telemetry across the network, private and public cloud infrastructure, applications, internet, email, and endpoints. With Security AI, we make it simple to use natural language instruction and interact with GenAI - from deploying and managing firewall policies to streamlining incident response. With Duo, we are creating extensive machine learning and analytics to detect and block suspicious users. We are harnessing our rich security expertise in conjunction with AIML to transform the way we assist, augment, and automate security efforts for our customers! We need your help to tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors.
**Meet the Team**
You will be a part of our Cisco Security Innovation team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will bring your expertise in deep learning and large transformer models conduct research, design and development of state-of-the-art ML/AI techniques applicable to threat detection, including anomaly detection, behavioral analysis, signature generation, and predictive modeling. The techniques are focused toward realtime efficacy and evaluating scalable architectures.
**Your Impact**
+ Leverage modern AI/ML techniques to improve the accuracy of threat detection solutions and automate/accelerate manual analysis processes.
+ Develop and implement advanced machine learning models across different hardware environments (including cloud and network edge); models may include adapting neural network architectures or creating novel ones to address challenges.
+ Develop methods to identify performance metrics and efficacy of the models especially of the hardware accelerated models.
+ Analyze and extract significant patterns in high-dimensional data spaces using advanced techniques.
+ Implement robust software systems for integrating and maintaining machine learning models.
+ Collaborate with software engineering teams to design primary deployment strategies for machine learning models into security systems.
+ Establish and maintain best practices for machine learning and security operations, including clear documentation of models and procedures.
**Minimum Qualifications:**
+ Bachelor's degree or higher in Computer Science or related field
+ 5+ years of related security experience, specifically in the areas of network security environments
+ Experience with multi-threaded environments
+ Experience with Linux operating systems and embedded Linux environments
**Preferred Qualifications:**
+ Master's or PhD degree in Computer Science, Computer Engineering, or a related field
+ Experience with state-of-the art machine learning techniques and libraries
+ Debugging skills in complex hardware/software
+ Coding experience with Python, C/C++, etc.
+ Experience with software development environments and version control systems (e.g. Git)
+ A strategic problem solver in the areas of threat detection and analysis
+ Experience optimizing machine learning or deep learning models for specific hardware
+ Familiarity with hardware acceleration libraries (e.g., Morpheus, cu DNN, TensorRT, OpenVINO).
+ Experience with containerization technologies (e.g., Docker, Kubernetes) in the context of hardware-specific deployments
+ Knowledge of cybersecurity concepts and threat detection methodologies
+ Low-level Kernel coding experience
**Why Cisco?**
At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
**Message to applicants applying to work in the U.S. and/or Canada:**
The starting salary range posted for this position is $165,000.00 to $241,400.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco's policies:
+ 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
+ 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
+ Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
+ Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
+ 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
+ Additional paid time away may be requested to deal with critical or emergency issues for family members
+ Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
+ .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
+ 1.5% of incentive target for each 1% of attainment between 50% and 75%;
+ 1% of incentive target for each 1% of attainment between 75% and 100%; and
+ Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$165,000.00 - $277,600.00
Non-Metro New York state & Washington state:
$146,700.00 - $247,000.00
* For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.
Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
Remote Pre-Sales Security Systems Engineer - Access Control & CCTV (REVIT /AUTOCAD Specific)
Remote job
Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
* This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
* Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
* Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
* Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
* Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
* Create solution design documentation (drawings, BOMs, solution design summaries).
* Provide technical support for in-office and on-site team members.
* Support management in the process of creating documentation for implementing new technology with new and existing customers.
* Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
* A minimum of 3-7 years previous experience in the industry.
* Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
* Experience in the design and planning of access control and video systems.
* Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
* This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
Auto-ApplyPre-Sales Security Systems Engineer - Access Control & CCTV
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Remote Pre-Sales Security Systems Engineer - Access Control & CCTV (REVIT/AUTOCAD Specific) in United States.
This role offers the opportunity to work on advanced electronic security and life safety solutions for a variety of clients. The engineer will provide design, technical support, and pre-sales assistance for projects involving access control, CCTV, intrusion detection, and other security systems. This position requires proficiency in Revit and CAD (AutoCAD) to develop accurate system designs and documentation. You will collaborate with internal teams, external partners, clients, and subcontractors to ensure project success. The role is highly technical, involving the review of architectural and engineering plans, developing solution documentation, and supporting on-site implementations. This is a remote position with opportunities to contribute to high-value security projects and learn emerging technologies in the field.
Accountabilities:
Design, develop, and implement solutions for security system installations, upgrades, and conversions.
Review architectural, electrical, telecommunication, and security engineering plans, riser drawings, device schedules, and detail drawings.
Provide Revit-based system designs, CAD support, and create technical documentation including drawings, BOMs, and solution summaries.
Support internal and on-site team members with technical guidance and troubleshooting.
Assist in preparing responses to RFIs/RFPs and contribute to project planning and client solutions.
Stay current on emerging electronic security technologies and industry-leading vendors.
Requirements
3-7 years of relevant experience in electronic security design, installation, or engineering.
Associate or Bachelor's degree in a related field preferred, or equivalent industry experience.
Proficiency in Revit with CAD (AutoCAD) for supporting system designs.
Strong understanding of access control, CCTV, intrusion detection, and related security technologies.
Professional certifications or training preferred (Lenel, Genetec, C-Cure, Avigilon, Axis, Bosch, Milestone, etc.).
Strong organizational, analytical, and problem-solving skills.
Excellent verbal, written, and presentation communication skills.
Experience with Microsoft Office, Microsoft Project, Visio, BlueBeam, and other design software preferred.
Ability to manage multiple tasks independently and prioritize effectively.
Benefits
Competitive compensation based on experience and qualifications.
Remote work flexibility with potential project-based travel.
Professional development and exposure to cutting-edge security technologies.
Opportunity to work with cross-functional teams on high-value projects.
Comprehensive benefits package depending on eligibility (medical, dental, vision, etc.).
Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching.
When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly:
🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements.
📊 It compares your profile to the job's core requirements and past success factors to determine your match score.
🎯 The top 3 candidates with the highest match are automatically shortlisted.
🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.
The process is transparent, skills-based, and free of bias - focusing solely on your fit for the role. Once shortlisted, your profile is shared with the hiring company, who will manage interviews and next steps.
Thank you for your interest!
#LI-CL1
Auto-ApplyInformation Security Controls Analyst
Remote job
About the Role:
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do:
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Participate in required compliance training and support internal/external audit activities.
What We're Looking For:
• Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
• Education:
Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
• Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
• Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Travel:
Up to 5% travel required.
Supervisory Responsibility:
This position does not have direct supervisory responsibilities.
Conditions of Employment:
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Non-Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Auto-ApplyConsultant - Cyber Security Analyst (Fractional/Contract Role)
Remote job
Join our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices.
Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young.
Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office.
What You'll Do
Best practice reviews.
Developing realistic and effective action plans.
Breaking apart goals into actionable steps.
Advising on vendor selection and oversight.
Creating and implementing policies, procedures, and control measures.
Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices.
Special projects or other areas of need.
Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security.
Protect sensitive information by installing and configuring security software like firewalls and encryption programs.
Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents.
Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps.
Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats.
Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster.
Assesses new security technologies to determine potential value for the firm.
Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur.
Review, investigate, and respond to real-time alerts within the environment.
Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations.
Qualifications
A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record.
One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications.
5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office.
Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar.
Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems.
In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events.
Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO.
Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff.
Job Status
Contractor
Hours are based on the needs of the assigned client (0-40 hours per week).
Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join!
For more information, visit us at Arootah.com.
Auto-Apply