A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
$114k-163k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Remote Principal Security Consultant & Pre-Sales Tech Lead
Reversinglabs 3.6
Remote job
A cybersecurity firm in Boston seeks a Principal Lead, Security Consultant with a strong background in threat detection and malware analysis. This role encompasses leading technical pre-sales efforts across various modules, conducting Proof-of-Value (POV) assessments, and managing security consultant teams. Ideal candidates should possess 8-10 years of experience in cybersecurity, proven communication skills, and deep technical knowledge. Join us in forging a transformative journey in enterprise cybersecurity.
#J-18808-Ljbffr
A leading data collaboration platform in San Francisco seeks a Senior Security Engineer to enhance threat detection and automation strategies. The role involves implementing detection logic, automating workflows, and developing scalable cloud solutions. Candidates should have a Bachelor's degree in a relevant field and strong skills in security automation and detection engineering. This position offers competitive compensation with a base range of $131,500 to $203,000.
#J-18808-Ljbffr
A leading security training provider is seeking a Senior Security Engineer for their content engineering team. This role supports security professionals, builds hands-on content, and integrates security into DevOps. Ideal candidates have over 5 years of experience in application security and are passionate about improving security practices. The position is remote-first with competitive compensation and benefits.
#J-18808-Ljbffr
$132k-184k yearly est. 5d ago
Security Analyst, Managed Detection & Response
Bay 4.7
Remote job
Why you should join our At-Bay Managed Detection and Response Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to introduce the SecurityAnalyst (MDR) role to the security team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
With At-Bay, our customers experience 5X fewer ransomware attacks. This is just the tip of the iceberg! Click here to learn more about what we're building.
SecurityAnalysts provide first-line security monitoring services to At-Bay's Managed Detection & Response customers with specific responsibilities including:
Operation and tuning of security monitoring tools including Endpoint Detection & Response (EDR), network monitoring, email security, Data Loss Prevention (DLP), Security Information and Event Management (SIEM), security automation tools, and others as needed
Identification and analysis of anomalous activity in customer technology environments
Triage of event data to identity potential indicators of compromise
Escalation of potentially malicious activity to engage incident responders where necessary
Participation in incident investigation, containment, remediation, and recovery activities where necessary
Developing and maintaining customer relationships to facilitate delivery of MDR services
Developing and delivering reports on identified activity to customer stakeholders as needed
Key skills:
Previous EDR, MDR, XDR, security monitoring, or incident response experience
Strong oral and written communications skills
Previous hands-on experience performing security operations including several of the following:
Security monitoring using a variety of endpoint and network tools
Deployment, tuning, and operation of security tools from vendors such as CrowdStrike, SentinelOne, and others
Deployment, tuning, and operation of SIEM or other tools used to aggregate and analyze security-relevant data
Triage and analysis of potential indicators of compromise
Performing rapid response to contain and/or remediate potentially malicious activity
Development and analysis of cyber threat intelligence
Participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Preferred candidates will have a mix of cybersecurity experience including either security operations or security engineering / architecture
Knowledge of cloud environments including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, nationwide
Our estimated base pay range for this role is $80,000-$110,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
$80k-110k yearly Auto-Apply 60d+ ago
Principal Security Analyst
Foresite 4.3
Remote job
Job Description
Foresite Cybersecurity, a global Google-first security partner, delivers cutting-edge managed security, cyber consulting, and compliance services. We empower businesses to navigate the evolving cloud threat landscape with robust security outcomes.
About the Role
Are you a seasoned cybersecurity professional ready to defend against global threats? Join Foresite's Cyber Fusion Center in Overland Park, KS. As a Principal SOC Analyst, you'll be on the front lines, monitoring real-time events, leveraging threat intelligence, and protecting our valued clients. If you possess a strong foundation in networking, system administration, and a passion for information security, we want you!
Responsibilities:
Real-time Threat Detection: Monitor SIEM (including Google Chronicle SIEM) to detect and analyze security events.
Incident Response: Investigate alerts, analyze incidents, and respond with precision.
Proactive Threat Hunting: Identify and mitigate emerging threats.
Security Analysis: Analyze events from Google Security Operations, EDR, and managed security systems.
Data & System Management: Manage customer data, inventories, and operational tickets.
Escalation & Resolution: Provide guidance, resolve complex issues, and escalate as needed.
Continuous Improvement: Contribute to enhancing security products and services.
Team Leadership: Serve as an escalation point and mentor team members.
Collaboration & Communication: Work with engineers, responders, and clients.
Documentation & Reporting: Document incidents, analyze patterns, and contribute to reports.
Continuous Learning: Stay updated on threats, vulnerabilities, and best practices.
Adapt & Thrive: Embrace the challenge of a fast-paced security environment.
Other duties as assigned
Qualifications:
Security Expertise: Solid understanding of security principles, attack vectors, and technologies.
3+ years dedicated cybersecurity experience.
Training in System Administration, Networking, and/or Security
SIEM Proficiency: Hands-on experience with SIEM (preferably Google Security Operations).
Analytical Skills: Strong analytical and problem-solving abilities.
Communication Prowess: Excellent written and verbal communication skills.
Teamwork & Collaboration: Ability to work effectively with colleagues and clients.
Passion for Security: Genuine desire to protect organizations from cyber threats.
CompTIA Security+ and Network+ certifications.
Advanced knowledge of firewalls, routing/switching, and security operations.
Experience with Google Security Operations, Google Cloud, Security Command Center, or Google Threat Intelligence.
Aptitude for network/system troubleshooting.
Critical thinking and logic skills.
Ability to stay calm under pressure.
Strong task and time management.
Experience mentoring securityanalysts
Skills:
Professional demeanor and strong work ethic.
Excellent written and verbal communication skills.
Ability to develop technical documentation and guidelines.
Strong collaboration skills with technical and non-technical stakeholders.
Grow with Foresite:
This is just the beginning. At Foresite, we're committed to your professional growth.
As a SOC Analyst, you'll have opportunities to explore diverse career paths in Security Engineering, Consulting, Solutions Architecting, and even Sales.
We offer a culture of mentorship, in-depth Google Cloud training and certification programs, and career planning resources to help you reach your full potential.
Benefits:
Location: This position is preferred in-person in our Kansas City office, offering the opportunity to collaborate closely with our dynamic SOC team.
(Foresite also offers a variety of fully remote positions.)
Shift Work: Be a part of our 24/7 Security Operations Center, contributing to a critical function that provides continuous protection for our clients.
Competitive Compensation and Benefits: We offer a comprehensive benefits package and competitive compensation to all our employees.
$61k-87k yearly est. 29d ago
Security Researcher
Prelude 3.8
Remote job
Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
$93k-129k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst
Military, Veterans and Diverse Job Seekers
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
$74k-100k yearly est. 60d+ ago
Remote Imperva Data Security SME
Wavestrong
Remote job
Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security consulting services. We pride ourselves on our best of breed security solutions and services that span a myriad of government, education and business verticals. Our staff is comprised of both certified technical and business professionals who can help you successfully navigate complexities of planning, design, implementation and management of securing data. Our approach is vendor agnostic giving our customers the freedom to choose the best customized security model for their business.
Requirements
We are looking for a Remote Imperva Data Security SME experienced with Imperva solutions to protect sensitive data across platforms. Key responsibilities include configuring and monitoring Imperva Data Security Fabric, managing data security controls, and collaborating to address vulnerabilities.
Qualifications:
Experience with Imperva Data Security Fabric (DSF), WAF and/or DAM
Knowledge of data protection regulations (e.g., GDPR, CCPA)
Proficiency in database security practices and security incident response.
Strong problem-solving and communication skills
$91k-128k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst - REMOTE
Jobgether
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber SecurityAnalyst - REMOTE. In this critical role, you'll be monitoring, investigating, and responding to security threats across various networks and environments. Your proactive threat hunting and analytics will play a vital role in strengthening the enterprise defenses. The analyst will also work on incident response and automation to effectively mitigate cyber risks and improve the overall security posture. Your contributions will significantly enhance the organization's ability to effectively manage and respond to cybersecurity challenges in an ever-evolving landscape.Accountabilities
Actively hunt for indicators of compromise (IOCs) and suspicious activities across environments.
Develop and execute KQL queries and create dashboards for telemetry analysis.
Automate detection, log analysis, and incident response workflows using scripting.
Monitor environments for potential breaches, escalating or remediating as necessary.
Collaborate cross-functionally to investigate incidents and implement corrective actions.
Identify and validate vulnerabilities, ensuring remediation and compliance.
Participate in red/blue team exercises and post-incident reviews.
Create and enhance security baselines, detection rules, and playbooks.
Prepare comprehensive reports and documentation on security incidents.
Ensure alignment with internal policies and industry standards.
Research and stay informed on emerging attack vectors and vulnerabilities.
Requirements
Hands-on experience using KQL for building queries and dashboards.
Experience with EDR/XDR, SIEM, and SOAR platforms.
Proficiency in Python or PowerShell scripting for automation.
Familiarity with threat intelligence and incident response methodologies.
Knowledge of common threat frameworks such as MITRE ATT&CK.
Understanding of cloud security operations across platforms like Azure and AWS.
Excellent analytical skills with a detail-oriented mindset.
Ability to work independently and collaboratively in a team environment.
Strong problem-solving skills and a self-motivated attitude.
Excellent communication skills and cross-departmental awareness.
Benefits
Medical, dental, and vision insurance.
Paid Time Off and Paid Holidays.
Life insurance and Short/Long Term Disability.
401k plan with matching contributions.
Paid Sick Time.
Pet Insurance.
Discount programs on travel, gyms, and other services.
Continuous learning opportunities and professional growth.
Work remotely from anywhere, particularly from the West Coast.
Why Apply Through Jobgether? We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best!Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time.#LI-CL1
$76k-102k yearly est. Auto-Apply 4d ago
IAM Epic Security Analyst 1
University of Washington 4.4
Remote job
UW MEDICINE IT SERVICES has an outstanding job opportunity for an IAM Epic SecurityAnalyst 1. WORK SCHEDULE * 100% FTE - 40 hours per week * Day Shift - UW MEDICINE ITS SERVICES CORE HOURS ARE 08:00 - 17:00 (PST), Monday-Friday DEPARTMENT DESCRIPTION UW Medicine IT Services (ITS) is a shared services organization that supports all of UW Medicine. UW Medicine is comprised of Harborview Medical Center (HMC), UW Medical Center-Montlake Campus (UWMC-Montlake), UW Medical Center-Northwest Campus (UWMC-NW), UW Medicine Primary Care (UWMPC), UW Physicians (UWP), UW School of Medicine (SOM), and Airlift Northwest (ALNW). ITS is responsible for the ongoing support and maintenance of the infrastructure and applications which support all these institutions, along with the implementation of new services and applications that are used to support and further the UW Medicine mission.
POSITION HIGHLIGHTS
* 100% remote opportunity
* 15 days of vacation your first year - Also, 12 days of sick time, 1 personal holiday, and 11 paid holidays each year
* 100% matching, 100% immediately vesting 403(b)
PRIMARY JOB RESPONSIBILITIES
* Using business and data analysis to independently troubleshoot and resolve complex Epic security related issues
* Performing user provisioning, integrations, audits, and other daily operations of the Epic Security team
* Ensuring compliance with HIPAA, other regulatory requirements, policies, and procedures are met
* Identifying risks and collaborating with Epic Security team on resolution and with ITS Leadership on recommendations for risk mitigation enhancements
* Managing on-going security roles and controls for Epic and interconnected applications, including:
* Development, implementation, and maintenance
* Collaborating with Epic application teams to create, monitor, and maintain operational configurations of Epic security for efficient and appropriate operations
* Managing access and authorization activities across the identity lifecycle
* Performing independent application testing, including:
* Independent activities for Epic security build, testing, and record creation processes
* Making appropriate access decisions in conjunction with application coordinators/analyst and operations
* Identifying and analyzing customer system requirements for continuous improvements
* Maintaining knowledge of vendor application architecture as it relates to the UW Medicine's systems environment as well as any new or modified vendor solutions that could benefit our organization
REQUIREMENTS
* Bachelor's degree in Computer Science, Information Technology, Business Administration, or related field or equivalent education and/or experience.
* 2+ years of experience to include:
* 2+ years of IT experience with demonstrated experience in systems analysis, administration, or support; preferably on mission-critical clinical information systems
* Demonstrated experience working with Epic or comparable EHR system
* Demonstrated experience independently gathering requirements for the creation of new or changes to existing roles in a healthcare application
* Demonstrated experience with database management, programming, or access
* Demonstrated experience independently creating and managing end user workflows
ABOUT UW MEDICINE - WHERE YOUR IMPACT GOES FURTHER
UW Medicine is Washington's only health system that includes a top-rated medical school and an internationally recognized research center. UW Medicine's mission is to improve the health of the public by advancing medical knowledge, providing outstanding primary and specialty care to the people of the region, and preparing tomorrow's physicians, scientists and other health professionals.
All across UW Medicine, our employees collaborate to perform the highest quality work with integrity and compassion and to create a respectful, welcoming environment where every patient, family, student and colleague is valued and honored. Nearly 29,000 healthcare professionals, researchers, and educators work in the UW Medicine family of organizations that includes: Harborview Medical Center, UW Medical Center - Montlake, UW Medical Center - Northwest, UW Medicine Primary Care, UW Physicians, UW School of Medicine, and Airlift Northwest.
Become part of our team. Join our mission to make life healthier for everyone in our community.
Compensation, Benefits and Position Details
Pay Range Minimum:
$75,000.00 annual
Pay Range Maximum:
$100,008.00 annual
Other Compensation:
* Benefits:
For information about benefits for this position, visit ******************************************************
Shift:
First Shift (United States of America)
Temporary or Regular?
This is a regular position
FTE (Full-Time Equivalent):
100.00%
Union/Bargaining Unit:
Not Applicable
About the UW
Working at the University of Washington provides a unique opportunity to change lives - on our campuses, in our state and around the world.
UW employees bring their boundless energy, creative problem-solving skills and dedication to building stronger minds and a healthier world. In return, they enjoy outstanding benefits, opportunities for professional growth and the chance to work in an environment known for its diversity, intellectual excitement, artistic pursuits and natural beauty.
Our Commitment
The University of Washington is committed to fostering an inclusive, respectful and welcoming community for all. As an equal opportunity employer, the University considers applicants for employment without regard to race, color, creed, religion, national origin, citizenship, sex, pregnancy, age, marital status, sexual orientation, gender identity or expression, genetic information, disability, or veteran status consistent with UW Executive Order No. 81.
To request disability accommodation in the application process, contact the Disability Services Office at ************ or **********.
Applicants considered for this position will be required to disclose if they are the subject of any substantiated findings or current investigations related to sexual misconduct at their current employment and past employment. Disclosure is required under Washington state law.
$75k-100k yearly 6d ago
Senior Security GRC Analyst
Lambda 4.2
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$93k-129k yearly est. Auto-Apply 60d+ ago
Global Cyber Wordings Analyst
Liberty Mutual 4.5
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
$76k-99k yearly est. Auto-Apply 14d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cyber security incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 5d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in information security, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and information security compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 5d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cyber security incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 4d ago
Remote Pre-Sales Security Systems Engineer - Access Control & CCTV
Kastle Systems 3.6
Remote job
Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
* Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
* Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
* Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
* Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
* Create solution design documentation (drawings, BOMs, solution design summaries).
* Provide technical support for in-office and on-site team members.
* Support management in the process of creating documentation for implementing new technology with new and existing customers.
* Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
* A minimum of 3-7 years previous experience in the industry.
* Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
* Experience in the design and planning of access control and video systems.
* Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
$100k-140k yearly est. Auto-Apply 6d ago
Staff Information Security Analyst
Playstation 4.8
Remote job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information SecurityAnalyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 11d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.