Product Security Architect
Security architect job in Palo Alto, CA
We are seeking an experienced Product Security Architect to join our Security Center of Excellence team and lead security initiatives across our cloud-based SaaS product portfolio. This role requires a unique blend of deep technical expertise, architectural vision, and collaborative leadership to ensure our products are built with security at their core. The ideal candidate will work at the intersection of security, development, and product design to create robust, secure solutions that protect our customers and their data.
Key Responsibilities
Security Architecture & Design
Design and implement comprehensive security architectures for cloud-based SaaS products, ensuring security is embedded throughout the product lifecycle
Conduct thorough threat modeling exercises for new and existing product features, identifying potential vulnerabilities and attack vectors
Define security requirements, patterns, and best practices for product development teams
Review and approve architectural designs from a security perspective, providing actionable guidance and recommendations
Product Security Assessment
Perform in-depth security assessments of products at the code, configuration, and architectural levels
Identify security vulnerabilities, weaknesses, and gaps in existing and proposed product implementations
Conduct code reviews with a focus on security, analyzing Java, Python, and React codebases for security flaws
Evaluate third-party integrations, APIs, and dependencies for security risks
Collaboration & Enablement
Partner closely with development teams to integrate security controls and best practices into the software development lifecycle
Work with QE teams to develop security test strategies, including penetration testing, vulnerability scanning, and security automation
Provide security guidance and mentorship to engineering teams, fostering a security-first culture
Translate complex security concepts into clear, actionable recommendations for technical and non-technicaål stakeholders
Cloud & Infrastructure Security
Design and implement security controls for cloud infrastructure and services (AWS, Azure, GCP)
Architect and implement IAM strategies including role-based access control (RBAC), attribute-based access control (ABAC), least privilege principles, and identity federation
Design secure network architectures including VPCs, security groups, network ACLs, microsegmentation, and zero-trust network access
Establish cloud configuration security standards and guardrails to prevent misconfigurations and ensure secure-by-default deployments
Ensure proper implementation of cloud security best practices including data encryption (at rest and in transit), secrets management, and compliance
Monitor and respond to emerging cloud security threats and vulnerabilities
Security Standards & Compliance
Establish and maintain security standards, policies, and procedures aligned with industry frameworks
Support compliance efforts including SOC 2, ISO 27001, GDPR, and other relevant standards
Stay current with evolving security threats, vulnerabilities, and industry best practices
Required Qualifications
Experience
8+ years of experience in information security, with at least 5 years specifically in product security architecture
Proven track record as a Product Security Architect in a SaaS or cloud-based company
Extensive experience with threat modeling methodologies (STRIDE, PASTA, or similar)
Hands-on experience identifying and remediating security vulnerabilities in production environments
Strong background working collaboratively with development and QE teams in agile environments
Technical Expertise
Deep understanding of secure coding practices and common vulnerability patterns (OWASP Top 10, CWE/SANS Top 25)
Proficiency in code-level security analysis across multiple languages, particularly Java, Python, and React/JavaScript
Strong knowledge of cloud security architectures and services (AWS, Azure, or GCP)
Expert-level knowledge of IAM principles and implementation including multi-factor authentication, single sign-on, privileged access management, service accounts, and identity lifecycle management
Deep understanding of network security including firewalls, IDS/IPS, VPN, TLS/SSL, DDoS protection, API gateways, and secure network segmentation
Extensive experience with cloud configuration security including infrastructure-as-code security, cloud security posture management, configuration drift detection, and automated compliance checking
Experience with authentication and authorization frameworks (OAuth 2.0, OpenID Connect, SAML, JWT, RBAC, ABAC)
Understanding of containerization and orchestration security (Docker, Kubernetes)
Knowledge of API security, microservices architecture, and distributed systems security
Familiarity with DevSecOps practices and security automation tools (SAST, DAST, SCA)
Certifications
CISSP (Certified Information Systems Security Professional) required
Additional relevant certifications valued:
Cloud security: CCSP, AWS Certified Security Specialty, Azure Security Engineer, Google Cloud Professional Security Engineer
Security architecture: CSSLP, SABSA
Penetration testing: CEH, OSCP, GPEN
Network security: CCNP Security, GIAC certifications
Preferred Qualifications
Experience with Infrastructure as Code (Terraform, CloudFormation) and security policy as code
Knowledge of zero-trust architecture principles and implementation
Experience with security incident response and vulnerability management programs
Background in software development or engineering
Experience with regulatory compliance frameworks and security audits
Published security research, conference presentations, or contributions to open-source security projects
Master's degree in Computer Science, Cybersecurity, or related field
Technical Skills
Programming & Scripting:
Java (enterprise application security)
Python (security automation, scripting)
JavaScript/React (frontend security)
Additional languages a plus (Go, Rust, C/C++)
Security Tools & Platforms:
SAST/DAST tools (Checkmarx, Fortify, Veracode, etc.)
Vulnerability scanners and penetration testing tools
Security information and event management (SIEM) platforms
Cloud security posture management (CSPM) tools
Cloud Platforms & Configuration:
AWS, Azure, or Google Cloud Platform
IAM services (AWS IAM, Azure AD, GCP IAM, identity federation)
Network security services (VPC, Security Groups, Network ACLs, WAF, Cloud Firewall)
Cloud configuration management and security scanning tools
Cloud-native security services and controls (GuardDuty, Security Hub, Azure Defender, Security Command Center)
Secrets management (AWS Secrets Manager, Azure Key Vault, HashiCorp Vault)
Serverless architecture security
Development & DevOps:
CI/CD pipelines and security integration
Version control systems (Git)
Containerization and orchestration
Agile/Scrum methodologies
Personal Attributes
Strong analytical and problem-solving skills with attention to detail
Excellent communication skills with the ability to influence and educate diverse audiences
Self-motivated with the ability to work independently and as part of a team
Passionate about security and staying ahead of emerging threats
Pragmatic approach to balancing security with business needs and user experience
What We Offer
Opportunity to shape security architecture for cutting-edge Cybersecurity SaaS products
Collaborative environment with highly talented engineering teams
Professional development and growth opportunities
Competitive compensation and benefits package
We are an equal opportunity employer and value diversity in our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Senior Security GRC Engineer
Security architect job in San Ramon, CA
At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are.
We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right!
Job Description
We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms.
Job Responsibilities:
Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001).
Perform risk assessments and develop mitigation strategies for identified security risks.
Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management.
Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind.
Monitor and report on compliance status, identifying gaps and proposing remediation strategies.
Oversee third-party vendor risk assessments and ensure adherence to security requirements.
Support internal and external audits by providing documentation, evidence, and responses to audit findings.
Conduct security awareness training programs and promote a culture of compliance within the organization.
Required Experience/Skills/Knowledge:
5+ years of experience in Governance, Risk, and Compliance roles or a related field.
Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards.
Proficiency in GRC tools such as SAI360 for compliance and risk management.
Experience with privileged access management tools like CyberArk.
Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT.
Excellent communication and collaboration skills to engage with technical and non-technical stakeholders.
Strong analytical and organizational skills with attention to detail.
This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure.
Required Education:
Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
Equivalent work experience may be considered in lieu of a degree.
Network and Security Architect
Security architect job in Fremont, CA
The requirements listed below are representative of the knowledge, skill, and/or ability required: Build the networks by taking into consideration various factors like, bandwidth requirements, infrastructure requirements and security. Responsible for estimating growth and plan for the network upgrade to meet future demands.
Ability to work on multiple priorities and/or projects simultaneously.
Excellent listening and communications skills, both verbal and written.
flexible in working hours to support global project and migration during non-business hours.
Ability to collaborate with multiple teams to achieve project goals.
Organized, detail oriented and self-motivated.
Ability to provide and maintain detailed documentation on each project.
Demonstrate knowledge in advanced networking and infra security domain.
Ability to successfully train the operation team on the new solution(s) implemented.
Problem-solving skills and abilities to meet reasonable deadlines.
Ability to work with little supervision and manage a team.
Identify opportunities and recommend solutions for improving the overall network health by assessing overall effectiveness and efficiency.
Stay current with existing, emerging, and evolving technologies and when appropriate, make recommendations as to how we may best harness a new technology or idea.
BS in Engineering, Computer Science, or related field, with 15+ years of work experience in networking domain Have completed minimum 3 significant network solution designs In-depth knowledge of the OSI network model Experience with different network types (i.
e.
LAN, WAN, WLAN) Network protocols and technologies, e.
g.
DNS, HTTP, SSL, 802.
1x, Load Balancing, WAN optimization, SD-WAN, VPN, PKI Cisco network products (Nexus and Catalyst switches, routers, WLC, ISE) Knowledge of Palo Alto Networks firewall and IPS configuration and troubleshooting Knowledge of F5 load balancer Knowledge of public cloud is highly desirable Knowledge of Zero-Trust networking is highly desirable CCNP certification CCIE certification PCNSE certification Azure Network Engineer Associate
Principal Security Architect
Security architect job in Palo Alto, CA
About the Hiring TeamTencent Overseas IT has the mission to empower Tencent's rapid global growth with future ready, global IT platforms, applications and services. We are chartered to lead the Overseas IT strategy, architecture, roadmap and execution. Satisfying our internal/external customers and becoming a world class global IT team are our top aspirations.What the Role Entails
Tencent Overseas IT is committed to accelerating Tencent's international business growth and enabling its success through the deployment of cutting-edge technology platforms in IT services, cloud, security, and DevOps. As leaders in IT technology, we are responsible for defining and executing on Tencent's Overseas IT strategy, architecture, and roadmap. Our primary focus is to deliver exceptional value to satisfy the diverse needs of our internal and external customers, while striving to build a world-class global IT team.
Responsibilities
We're seeking a Principal Security Architect to drive the overall security architecture of Tencent overseas business. This role will work closely with foundation IT and Business teams to ensure compliance with security best practices, regulatory requirements, and internal policies. Key responsibilities include:
Security Strategy and Planning: Defining and implementing the organization's security strategy, roadmaps, and long-term vision.
Security Architecture Design: Developing and maintaining the overall security architecture, including defining security frameworks, standards, and controls.
Incident Response: Participating in incident response activities, providing expertise in identifying, containing, and recovering from security incidents.
Risk Management: Identifying and assessing security risks, developing mitigation strategies, and ensuring alignment with business objectives.
Security Compliance: Ensuring compliance with relevant security regulations, industry standards (e.g., NIST, ISO 27001, HIPAA), and internal policies.
Who We Look For
Key Skills
• Security Architecture Design: Ability to design and implement secure and scalable architectures across various environments (e.g., cloud, containerized, on-premises), including developing and maintaining threat models and security reference architectures, with a strong emphasis on Zero Trust principles.
• Security Operations & Incident Response: Experience with Security Information & Event Management (SIEM) systems, vulnerability scanners, malware analysis, and handling security incidents. The ability to lead threat modeling activities and support penetration testing is also important.
• Networking: In-depth knowledge of networking principles, including routers, switches, firewalls, load balancers, and wireless devices, as well as network security protocols and technologies like VLANs, VPNs, IDS/IPS, and network segmentation.
• Cloud Security: Expertise in cloud security principles and technologies across major platforms like AWS, Azure, and GCP, including implementing security controls and best practices in cloud environments.
• Identity and Access Management (IAM): Strong understanding of enterprise IAM systems, including platforms like Okta, SailPoint, and Active Directory (AD), and the ability to implement and manage secure access controls based on the principle of least privilege.
• Data Protection: Knowledge of data protection methods like encryption, pseudonymization, and shuffling, and how to apply them effectively to safeguard against data corruption, compromise, and loss.
• Security Testing & Analysis: Experience in conducting penetration testing, vulnerability assessments, ethical hacking, and risk analysis to identify and mitigate security risks.
• Security Automation & DevSecOps: Hands-on experience with security automation tools and scripting languages (e.g., Python, Lambda, Terraform) to streamline security processes and embed security into CI/CD workflows and Infrastructure-as-Code (IaC) processes.
• Security Tools & Technologies: Proficiency in using various security tools and technologies, including SIEM platforms, XDR, cloud-native threat detection tools, vulnerability scanners, and encryption tools.
• Operating Systems: Experience with various operating systems, including Windows, Linux, and UNIX.
• Application Security: Experience in web application security, OWASP, API security, and secure design and testing.
• SaaS Security: Experience with SaaS permission management, experience with SSPM (SaaS Security Posture Management)
• AI for Security: real word experience with AI/LLM/Agentic for security, especially adopt LLM in SIEM rule, SOAR optimization.
• Scripting skills in Python, PowerShell or Bash
Qualifications
• Education: Typically, a master's degree in computer science, Information Security, or a related technical field is required.
• Minimum of 10-12+ years of progressive experience in cybersecurity, including at least 5-7 years in a security architecture or senior-level engineering role.
• Experience securing workspace and key enterprise systems, including IAM, e-mail, DevSecOps, SaaS, and back-office systems.
• Essential soft skills: Analytical Thinking; Problem-Solving; Risk Management; Adaptability & Continuous Learning;Attention to Detail
• Experience working with remote, globally distributed teams
• Previous experience in the gaming industry is a plus.
• Relevant certifications:
Certified Information Systems Security Professional (CISSP)
Certified Cloud Security Professional (CCSP)
Certified Information Security Manager (CISM)
AWS Certified Security - Specialty
Other certifications like AWS Certified SA, Certified Ethical Hacker (CEH), CompTIA Security+, and GIAC Security Essentials Certification (GSEC) can also be beneficial.
Location State(s)
US-California-Palo AltoThe expected base pay range for this position in the location(s) listed above is $141,200.00 to $328,400.00 per year. Actual pay may vary depending on job-related knowledge, skills, and experience. Employees hired for this position may be eligible for a sign on payment, relocation package, and restricted stock units, which will be evaluated on a case-by-case basis. Subject to the terms and conditions of the plans in effect, hired applicants are also eligible for medical, dental, vision, life and disability benefits, and participation in the Company's 401(k) plan. The Employee is also eligible for up to 15 to 25 days of vacation per year (depending on the employee's tenure), up to 13 days of holidays throughout the calendar year, and up to 10 days of paid sick leave per year. Your benefits may be adjusted to reflect your location, employment status, duration of employment with the company, and position level. Benefits may also be pro-rated for those who start working during the calendar year.Equal Employment Opportunity at Tencent
As an equal opportunity employer, we firmly believe that diverse voices fuel our innovation and allow us to better serve our users and the community. We foster an environment where every employee of Tencent feels supported and inspired to achieve individual and common goals.
Auto-ApplyQA Automation and Security Test Architect
Security architect job in Pleasanton, CA
QA Automation and Security Test Architect Job ID: 21-14390 Top must haves are: * 5+ years of experience as Automation Architect and doing web application security testing as per OWASP standards * 5+ years of experience designing, developing and executing Automation Scripts using Selenium
* Ability to provide application security risk assessment of technologies stack used in cloud or web applications.
TECHNICAL KNOWLEDGE AND SKILLS:
* 5+ years of experience as an Automation Architect and doing web application security testing as per OWASP standards
* 5+ years of experience designing, developing and executing Automation Scripts using Selenium
* Knowledge and experience in other Automation tools (like QTP, Rational Robot, AutoIT)
* Understanding and working knowledge with Data Driven, Keyword Driven and Hybrid frameworks
* Knowledge of Defect Management Tool (Quality Center, JIRA)
* Exploit application security flaws and vulnerabilities with attack simulations on multiple projects working against specific client-focused scopes of work.
* Ability to provide application security risk assessment of technologies stack used in cloud or web applications.
* Ability to perform application vulnerability assessments or application penetration testing, utilizing tools commercial and open source tools.
* Perform, review and analyze security vulnerability data to identify applicability and false positives.
* Create risk based security code reviews (Static, Dynamic and Interactive).
* Conduct application security testing in line with OWASP (Open Web application Security Project)
* Mentor junior engineers to build their skills and contribution levels
* Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment.
* Perform Proof of Concept testing and do evaluation of new security technologies and tools.
* Assist and support Security Test Analysts as they perform vulnerability, network and network security assessments.
* Experience DevOps tools like DynaTrace, Chef, Splunk and Vagrant.
* Experience with scripting languages (e.g. python, PERL, SQL) a plus
* Ability to perform below tasks:
o Dynamic Application Security Testing (DAST)
o Static Application Security Testing (SAST)
o Interactive Application Security Testing (IAST)
o Web Application Penetration Testing
o Product Security Testing
o Cloud Application Security Testing
o Web Services Security Testing
o Security Code Review
o Network Security Assessment
* Application Security Testing Tools: VeraCode, Synopsys, Contrast IAST, Burp Suite, Tamper Data, Live http Headers, Client Fortify, VeraCode, OWASP Top 10, N-Stealth, Hailstorm, Paros, SANS Top 20, Acunetix, Nessus
* Fast learning, problem solving and analytical skills
* Excellent communication, presentation, and interpersonal skills
* Track record of good time management
* Efficient in effort estimation, planning and prioritization
* Ability to understand Business Requirements and transform them to functional units
* Knowledge of SDLC and implementation
* Knowledge of SoapUI
* Proficiency in Java language
* Proficiency in SQL
* Job details
*
SAP Security Consultant
Security architect job in Sacramento, CA
We are seeking a seasoned SAP Security professional to join our team in supporting and enhancing enterprise security across a diverse SAP landscape. The ideal candidate will bring deep expertise in managing security roles, authorizations, and governance for a variety of SAP modules, including experience with modern S/4HANA environments.
Key Responsibilities:
Design, implement, and maintain SAP security roles and authorizations across multiple SAP platforms including ECC, BW, BPC, CRM, BusinessObjects (BOBJ), and Solution Manager.
Collaborate with functional and technical teams to assess access requirements and deliver secure, compliant solutions.
Participate in full lifecycle SAP implementations, providing hands-on security configuration and ensuring alignment with business and compliance requirements.
Support system audits and implement corrective actions related to access and compliance.
Assist in the development of security policies and best practices for SAP systems, including risk analysis and segregation of duties (SoD).
Contribute to S/4HANA migration planning and execution with a focus on securing new and transitioned environments.
Required Qualifications:
8+ years of hands-on experience in SAP Security administration across a variety of SAP applications (ECC, BW, BPC, CRM, BOBJ, and Solution Manager).
Demonstrated involvement in at least two full-cycle SAP implementations in a security-focused role.
Experience supporting a full end-to-end S/4HANA migration project, with an emphasis on security role design and transition.
Strong understanding of user provisioning, role-based access controls, GRC tools, and SoD principles.
Excellent communication skills and ability to work cross-functionally with both technical and business stakeholders.
Auto-ApplyPlatform Security Architect
Security architect job in San Jose, CA
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
F5 Distributed Cloud Platform is a world class, mission critical and highly reliable platform serving a global customer base. Our customers depend on us to keep their business highly available and secure around the planet.
We are rapidly expanding our platform in many dimensions - global footprint, infrastructure, performance, low latency etc., We are looking for a hands-on, driven, results oriented Architect in our Platform Security organization.
This organization is responsible for the build and life cycle management of Distributed Cloud platform with
Secure
first mindset. We build, engineer and evolve systems, tools and practices to ensure our Distributed Cloud is always protected from code to traffic.
Responsibilities
Design and implement a blueprint with Security First mindset for Distributed Cloud.
Work closely with product and development teams to ensure software and product architectures are developed in line with the vision and future direction of the company.
Drive architectural reviews, design validations, and threat models to ensure operational, security, and scalability concerns are addressed early.
Work closely with Engineers and Managers to drive the engineering and deployment and operationalization of Distributed Cloud platform.
Ensure the documenting and recording every aspect of Distributed Cloud.
Planning, tracking and scheduling software deliverables.
Ensure teams can identify problems within software systems and drive issues to resolution.
Developing good working relationships with other employees and senior leadership.
Engineer systems and tools to secure communication between On Prem and Public Clouds.
Evolve Distributed Cloud to meet federally regulated standards - FedRamp, IL5, HIPAA.
Build and Operate systems for data protection, identifying and mitigating threats from supply chains, external attacks.
Required Qualifications
Bachelor's degree in computer science or equivalent professional experience of 12+ years in architecture roles, with 5+ years in a Principal Architect capacity for a global SaaS or cloud platform in Security.
Experience building and operating Products serving in Federal regulatory customers - FedRamp, IL5, HIPAA etc.,
Proven experience designing and operating multi-tenant, multi-region, highly available SaaS services at global scale.
Deep technical expertise in CDN, edge computing, routing, load balancing, DDoS mitigation, and application layer security.
Understanding of containers and orchestration technologies.
Broad understanding of coding and programming languages.
Extensive knowledge of the software development process and corresponding technologies.
Excellent understanding of design patterns and architectural styles.
Proficient knowledge of the operation and development designs of agile software.
Strong soft skills, including attention to detail, problem-solving and communication skills.
#LI-ZB1
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
The annual base pay for this position is: $234,400.00 - $351,600.00
F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change.
You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link:
*******************************************
. F5 reserves the right to change or terminate any benefit plan without notice.
Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com).
Equal Employment Opportunity
It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Auto-ApplyUrgent Job Opening for a SAP Security Consultant in San Francisco, CA
Security architect job in San Francisco, CA
Hello, Greetings for the day, We have an urgent job opening for a SAP Security Consultant in San Francisco, CA. Please find the complete below and consultant information details below to the job description. Duration: 5Months+ Job Title: SAP Security
Duties:
Provides the technical guidance in development of security roles and authorizations to SAP projects and production support for R3, BW, EBP, SMP, PI, AII/OER systems Ensures development and maintenance of SAP roles and authorizations are aligned with enterprise security best practices and corporate standards Delivers and manages overall SAP security standards and designs Works closely with SAP functional and technical teams in the identification and resolution of gaps in the security authentication and authorization processes Provides day-to-day support for GRC 5.3 CUP, FireFighter Works closely with security and technical teams in architecting and implementing Identity and Security best practices in SAP environment; Partners with teams in support of internal and external auditing of SAP environment Performs annual SAP licensing for all the systems onsite Skills: Minimum of 5 years of experience implementing and delivering SAP Security Solutions; Must have strong demonstrated knowledge of SAP Security and experience with GRC Analysis and Administration. Experience in implementing/upgrading/managing SAP GRC Access Controls, Access Risk Analysis and Emergency Access Management a plus; Must have excellent troubleshooting and resolution skills; Strong attention to detail. Strong technical knowledge of SAP Security architecture and role based authorization models; Strong analytical, problem solving and conceptual. Strong oral and written communication skills, with an ability to express complex technical concepts; Strong understanding of data privacy concepts. Strong Security and Risk mitigation mindset.Understanding of process re-engineering, segregation of duties, application security implementation, security auditing techniques Keywords: Education: Bachelor's degree in Computer Science or related field, OR equivalent combination of education and/or experience Skills and Experience: Required Skills: AUDITING MITIGATION PROBLEM SOLVING SAP Security GRC Additional Skills: RE-ENGINEERING RISK ANALYSIS ARCHITECTURE SAP SECURITY SECURITY ARCHITECTURE SECURITY IMPLEMENTATION SOLUTIONS AUTHENTICATION EBP MAINTENANCE R3
Thanks & Regards,
Srikanth
************
800 W, Fifth Avenue, Suite 208A
Naperville, IL - 60563
"
A Certified MBE & Women's Business Enterprise Alliance (WBEA)"
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security
Security architect job in Pleasanton, CA
This job requires relocation to the United States, Silicon Valley, through the use of a TN visa. If selected for this job, the process of coming to the United States will be handled by Tech-Mex.
The Information Security Engineer maintains 24x7 support, responds to vendor security questionnaires, performs monitoring and maintenance of the security infrastructure and components, participates in project planning and deployment of new technologies and will be responsible for remediation of identified compliance and risk gaps. He/she works independently, operating under the defined guidelines established by the Director of Information Technology and Security.
ESSENTIAL Job Duties & Responsibilities
Monitor and advise on information security issues related to the systems and workflow to ensure the internal and external security controls for the company are appropriate and operating as intended
Documenting gaps between vendor requirements and National MIs infrastructure
Coordinate and execute IT security projects
Coordinate response to information security incidents
Conduct company-wide audits and manage remediation plans
Collaborate with other areas of IT to manage security vulnerabilities
Conduct research to keep abreast of latest security issues
Ensures that system documentation is accurate and updated as needed
Participates in disaster recovery (DR) exercises as directed
Logfile review and analysis
Install and maintain new systems
Prioritize remediation of gaps based on internal and external audits
Prepares compliance reports by collecting, analyzing, and summarizing data
Evaluates information to determine compliance with laws, regulations, or standards
MINIMUM QUALIFICATIONS
3-5 plus years related work experience
Vendor audit and compliance experience, preferably with the SIG framework
Strong technical skills in anti-virus, DLP, and PKI
Strong experience with the McAfee suite of products
Solid understanding of networking concepts and system administration
Experience with Nessus, RSA envision, RedHat Linux and database security
Knowledge of data compliance and privacy standards and regulations as they apply to insurance and banking industries
Knowledge of Information Security Standards (ISO27001, NIST, etc)
Self-motivated, self-directed and shows attention to detail while working
Ability to effectively prioritize and execute reporting tasks in a fast-paced, results-driven environment
Extensive experience working in a team-oriented, collaborative environment with a diverse team of business and IT staff
Bachelor's degree in Computer Science or Information Systems preferred; Professional certifications are an advantage
Essential Worker Competencies
The ability to function independently with minimal supervision.
Works ethically and with integrity supporting organizational goals and values
Displays commitment to excellence
Completes work in a timely manner and meets deadlines
Good verbal and written communication skills
Meets productivity standards and achieves key outcomes
Is dependable and keeps commitments
Contributes to building a positive team spirit and treats others with respect
Candidate will be relocated to the United States
Director of Information and Data Security
Security architect job in Santa Clara, CA
Role Purpose The Director of Information and Data Security will establish and lead Eltropy's IT and Cybersecurity function, responsible for developing foundational systems, processes, and governance across infrastructure, data protection, and compliance. This leader will drive
security maturity across the organization, balancing hands-on execution with long-term
strategic planning, and partnering with external GRC consultants to build a scalable security
and compliance framework aligned with industry standards (e.g., SOC 2, ISO 27001).
Key Responsibilities
IT and Infrastructure Security
* Oversee endpoint management, asset inventory, and identity and access management
(IAM).
* Establish standards for device hardening, patch management, and secure configuration.
* Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
* Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
* Lead threat detection, vulnerability management, and incident response operations.
* Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
* Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
* Conduct regular penetration testing, track remediation, and drive security awareness
programs.
* Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
* Partner with external GRC consultants to design and operationalize Eltropy's information
security and compliance framework.
* Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
* Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
* Maintain a centralized risk register and oversee remediation tracking.
* Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
* Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
* Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
* Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
* Establish and operationalize the company's Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
* Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
* Develop and implement a company-wide security awareness program.
* Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
* Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
* Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
* Define structure, roles, and hiring priorities aligned with the company's growth stage.
* Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
* Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
* Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
* Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
* Asset Visibility: 100% endpoint and asset inventory completeness.
* Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
* Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
* Independent, self-starter with strong ownership and execution bias.
* Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
* Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
* Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
* Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
* Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
* Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
* Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
* Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to: VP of Operations
Level: Senior Leadership
Direct Reports:
* IT Team
* Cybersecurity Engineer(s)
Director of Information and Data Security
Security architect job in Santa Clara, CA
Role Purpose The Director of Information and Data Security will establish and lead Eltropys IT and Cybersecurity function, responsible for developing foundational systems, processes, and
governance across infrastructure, data protection, and compliance. This leader will drive
security maturity across the organization, balancing hands-on execution with long-term
strategic planning, and partnering with external GRC consultants to build a scalable security
and compliance framework aligned with industry standards (e.g., SOC 2, ISO 27001).
Key Responsibilities
IT and Infrastructure Security
Oversee endpoint management, asset inventory, and identity and access management
(IAM).
Establish standards for device hardening, patch management, and secure configuration.
Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
Lead threat detection, vulnerability management, and incident response operations.
Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
Conduct regular penetration testing, track remediation, and drive security awareness
programs.
Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
Partner with external GRC consultants to design and operationalize Eltropys information
security and compliance framework.
Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
Maintain a centralized risk register and oversee remediation tracking.
Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
Establish and operationalize the companys Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
Develop and implement a company-wide security awareness program.
Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
Define structure, roles, and hiring priorities aligned with the companys growth stage.
Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
Asset Visibility: 100% endpoint and asset inventory completeness.
Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
Independent, self-starter with strong ownership and execution bias.
Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to: VP of Operations
Level: Senior Leadership
Direct Reports:
- IT Team
- Cybersecurity Engineer(s)
Chief Information Security Officer (0933 Manager V) - Department of Public Health
Security architect job in San Francisco, CA
The Department of Public Health prioritizes equitable and inclusive access to quality healthcare for its community and values the importance of diversity in its workforce. All employees at the Department of Public Health work to advance equity, inclusion, and diversity with a specific lens and focus on race, ethnicity, gender, sex, sexuality, disability, and immigration status.
This is a Position-Based Test conducted in accordance with CSC Rule 111A. Learn more about the City's hiring process here: *****************************************
* Application Opening: Friday, November 21, 2025
* Application Deadline: Application filing will close on or after Friday, January 9, 2026.
* Salary: $180,440 - $230,308 Annually (Range A)
* Appointment Type: Permanent Civil Service
* Recruitment ID: PBT-0933-160818
Becoming a City employee means being a part of a team that cares about making a difference. Your work will shape both the present and future of San Francisco. When you work for the City, you're choosing a job with purpose.
The mission of the San Francisco Department of Public Health (SFDPH) is to protect and promote the health of all San Franciscans. SFDPH strives to achieve its mission through the work of several divisions - the San Francisco Health Network, Population Health Division, Behavioral Health Services, and Central Administration. The San Francisco Health Network is the City's only complete system of care and has locations throughout the City, including Zuckerberg San Francisco General Hospital and Trauma Center, Laguna Honda Hospital and Rehabilitation Center, and over 15 primary care health centers. The Population Health Division (PHD) provides core public health services for the City and County of San Francisco: health protection, health promotion, disease and injury prevention, disease surveillance, and disaster preparedness and response. Behavioral Health Services operates in conjunction with SFHN and provides a range of mental health and substance use treatment services. Central Administration houses core support organizations, including Finance, Information Technology (IT), Human Resources, Privacy and Compliance, Business Office, Facilities Management, and Security Services.
Role description
The San Francisco Department of Public Health is seeking a dynamic and experienced cybersecurity professional to join its IT leadership team. As a key strategic leader, the Chief Information Security Officer (CISO) (0933 Manager V) will be responsible for developing and executing a comprehensive information security strategy that safeguards the department's systems, data, and services.
This role leads the implementation of an enterprise-wide security program that promotes collaboration, strengthens governance, and aligns cybersecurity initiatives with organizational goals. The CISO serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development. The CISO oversees a team of cybersecurity professionals within the SFDPH IT division and collaborates extensively with the CISO for the City and County of San Francisco.
We are looking for a visionary and collaborative leader who can balance innovation with risk mitigation, and who thrives in a complex, mission-driven environment. The CISO reports directly to the Chief Information Officer (CIO).
The Chief Information Security Officer (0933 Manager V) performs the following essential job functions:
* Provides strategic leadership in evaluating and mitigating information security threats across the organization using a structured, risk-based methodology. Advises executive leadership on identified risks and ensures timely execution of mitigation and remediation plans with integrity and discretion
* Directs the ongoing development of the department's information security program, including project portfolio management, incident response, policy frameworks, compliance activities, threat and vulnerability management, and third-party risk management
* Allocates and manages resources to support a robust security strategy. Identifies and advocates for strategic investments, oversees capital and operating budgets, and delivers ROI analyses and budget recommendations
* Partners with the Office of Compliance and Privacy Affairs to assess data security risks related to contracts, projects, artificial intelligence solutions, and other initiatives. Develops tools and interventions to mitigate risks, establishes performance metrics, and monitors compliance through audits and assessments
* Builds alignment and support for security goals and initiatives across internal and external stakeholders. Communicates effectively with leadership at all levels on trends, risks, and the overall effectiveness of the security program
* Promotes awareness and understanding of regulatory requirements across the organization. Leads or collaborates on testing and auditing activities to ensure ongoing compliance and successful certifications
* Analyzes security requirements and ensures compliance with industry standards such as HIPAA, NIST, and PCI-DSS
* Establishes and maintains comprehensive policies and procedures to support effective and sustainable security operations
* Serves as the department's representative in security-related matters with City agencies and partners
* Continuously monitors emerging trends, technologies, and best practices in cybersecurity to ensure the department's security posture remains current and effective
The Chief Information Security Officer (0933 Manager V) may perform other duties as assigned/required.
How to qualify
1. Education: Bachelor's degree from an accredited college or university; AND
2. Experience: Five (5) years of professional healthcare information systems security experience, of which three (3) years must include supervising IT professionals.
Education Substitution: Additional experience as described above may be substituted for the required degree on a year-for-year basis. One (1) year is equivalent to thirty (30) semester units / forty-five (45) quarter units.
Applicants must meet the minimum qualification requirements by the final filing date unless otherwise noted.
One-year full-time employment is equivalent to 2,000 hours (2,000 hours of qualifying work experience is based on a 40-hour work week).
Desirable Qualifications:
The stated desirable qualifications may be considered at the end of the selection process when candidates are referred for hiring:
* Possession of a Certified Information Systems Security Professional (CISSP) and/or Certified Information Security Manager (CISM) certification
Verification of Education and Experience:
Every application is reviewed to ensure that you meet the minimum qualifications as listed in the job ad. Review SF Careers Employment Applications for considerations taken when reviewing applications.
Applicants may be required to submit verification of qualifying education and experience at any point during the recruitment and selection process. If education verification is required, information on how to verify education requirements, including verifying foreign education credits or degree equivalency, can be found at *******************************************************
Note: Falsifying one's education, training, or work experience or attempted deception on the application may result in disqualification for this and future job opportunities with the City and County of San Francisco.
What else should I know?
Selection Procedures:
After application submission, candidates deemed qualified must complete all subsequent steps to advance in this selection process, which includes the following:
Supplemental Questionnaire (SQ) Examination (Weight: 100%)
Candidates that meet the minimum qualifications will be invited to participate in a Supplemental Questionnaire (SQ) examination that is designed to measure the knowledge, skills, and abilities in job related areas which may include but not be limited to: Knowledge of local, State and Federals laws and regulations relating to information security, including but not limited to HIPAA and HITECH; Knowledge of information security technology frameworks and standards, including but not limited to NIST, HITRUST, COBIT, ISO 27001, PCI-DSS or similar cyber security frameworks; Knowledge of technology relating to enterprise wide information security protection; Knowledge of structured systems analysis and design practices and techniques; common operating systems software and relational database systems; hospitals or community health network environments; Ability to apply principles and practices of management, administration, budgeting, training, and personnel management; Ability to manage, supervise, train and coordinate complex functional area of responsibility and groups of employees; Ability to analyze and report on activities, issues and problems and recommend appropriate solutions; Ability to communicate effectively orally; Ability to communicate effectively in writing; Ability to exercise judgement, decisiveness and creativity required in situations involving the direction, control and planning of a program(s); manage critical timelines effectively; Ability to establish and maintain good working relationships with department personnel, staff, vendors, peers, and management, and engage and influence a broad range of stakeholders (e.g. HR, IT, Legal, Compliance, senior management, etc.)
Candidates must achieve a passing score on the Supplemental Questionnaire exam in order to continue in the selection process and will be placed on the confidential eligible list in rank order according to their final score.
Additional selection processes may be conducted by the hiring department prior to making final hiring decisions.
Certification
The certification rule for the eligible list resulting from this examination will be the Rule of the List.
Eligible List/Score Report:
A confidential eligible list of applicant names that have passed the civil service examination process will be created and used for certification purposes only. An examination score report will be established, so applicants can view the ranks, final scores, and number of eligible candidates. Applicant information, including names of applicants on the eligible list, shall not be made public unless required by law. However, an eligible list shall be made available for public inspection, upon request, once the eligible list is exhausted or expired and referrals resolved. The eligible list/score report resulting from this civil service examination process is subject to change after adoption (e.g., as a result of appeals), as directed by the Human Resources Director or the Civil Service Commission.
The duration of the eligible list resulting from this examination process will be of six months and may be extended with the approval of the Human Resources Director.
To find Departments which use this classification, please see the city's Position Counts by Job Codes and Departments.
Terms of Announcement and Appeal Rights:
Applicants must be guided solely by the provisions of this announcement, including requirements, time periods and other particulars, except when superseded by federal, state or local laws, rules, or regulations. Clerical errors may be corrected by the posting the correction on the Department of Human Resources website at ************************
The terms of this announcement may be appealed under Civil Service Rule 111A.35.1. The standard for the review of such appeals is 'abuse of discretion' or 'no rational basis' for establishing the position description, the minimum qualifications and/or the certification rule. Appeals must include a written statement of the item(s) being contested and the specific reason(s) why the cited item(s) constitute(s) abuse of discretion by the Human Resources Director. Appeals must be submitted directly to the Executive Officer of the Civil Service Commission within five business days of the announcement issuance date.
Additional information regarding Employment with the City and County of San Francisco:
* Information about the Hiring Process
* Conviction History
* Employee Benefits Overview
* Equal Employment Opportunity
* Disaster Service Workers
* ADA Accommodation
* Right to Work
* Copies of Application Documents
* Diversity Statement
* Veterans Preference
* Seniority Credit in Promotional Exams
Where to Apply
All job applications for the City and County of San Francisco must be submitted through our online portal. Please visit *********************** to begin your application process.
Applicants may be contacted by email about this recruitment. Please consider using a personal email address that you check regularly rather than a work or school account.
Computers are available for the public (9:00 a.m. to 4:00 p.m. Monday through Friday) to file online applications in the lobby of the Dept. of Human Resources at 1 South Van Ness Avenue, 4th Floor and at the City Career Center at City Hall, 1 Dr. Carlton B. Goodlett Place, Room 110.
Ensure your application information is accurate, as changes may not be possible after submission. Your first and last name must match your legal ID for verification, and preferred names can be included in parentheses. Use your personal email address, not a shared or work email, to avoid unfixable issues.
Applicants will receive a confirmation email from ******************************** that their online application has been received in response to every announcement for which they file. Applicants should retain this confirmation email for their records. Failure to receive this email means that the online application was not submitted or received.
If you have any questions regarding this recruitment or application process, please contact the analyst, Marielle Saldajeno at **************************** or **************.
We may use text messaging to communicate with you on the phone number provided in your application. The first message will ask you to opt in to text messaging.
The City and County of San Francisco encourages women, minorities and persons with disabilities to apply. Applicants will be considered regardless of their sex, race, age, religion, color, national origin, ancestry, physical disability, mental disability, medical condition (associated with cancer, a history of cancer, or genetic characteristics), HIV/AIDS status, genetic information, marital status, sexual orientation, gender, gender identity, gender expression, military and veteran status, or other protected category under the law.
Easy ApplyInformation Security & Compliance, Manager (1 Year Contract)
Security architect job in Palo Alto, CA
Job Description
About us:
Lucence is a pioneering precision oncology company with a bold vision: a world where cancer is defeated through early detection and timely treatment. Our cutting-edge liquid biopsy tests use advanced molecular profiling to guide personalized cancer therapies, transforming how cancer is diagnosed and treated. At Lucence, we are shaping the future of precision medicine by capturing both genetic and cellular data from a single blood draw, bringing us closer to our mission of overcoming cancer.
We are looking for an Information Security & Compliance Manager to lead Lucence's SOC 2 compliance programmes. You will own our internal controls, audits, and security governance frameworks, ensuring the company meets the standards required for global diagnostics operations.
Key Responsibilities
Compliance Ownership
Own SOC 2 Type I/II, and build on HIPAA and cybersecurity certification roadmaps. Maintain documentation, evidence repositories, and ongoing readiness.
Internal Controls & Policies
Build, refine, and enforce security policies, risk registers, and access-control processes.
Audit Management
Partner with external auditors, coordinate internal contributors, drive remediation plans, and ensure timely closure of findings.
Vendor & Data Protection Reviews
Conduct security due diligence for vendors, manage DPAs, and ensure data-flow compliance for global partners.
Security Governance
Implement quarterly control testing, internal audits, DR/BCP drills, and continuous monitoring of compliance gaps.
Cross-Functional Partnering
Work closely with external vendors, Informatics, IT, Lab Ops, and Commercial teams to embed security into product and operational workflows.
Preferred Qualifications
Experience owning SOC 2 or ISO audit cycles end-to-end.
Familiarity with cloud environments (AWS/Azure/GCP) and modern security tooling.
Attention to detail to improve policies, controls, and audit documentation.
Certifications: ISO Lead Auditor, CISA, CISSP, or equivalent.
Information Security Manager
Security architect job in San Francisco, CA
ABOUT THE ROLE
You'll be our first dedicated security leader, owning the technical execution of our security and compliance program. You'll drive SOC 2 and PCI DSS compliance, manage our vulnerability program, and build security capabilities that enable our engineering teams to move fast while staying secure. This is a hands-on role-you'll design controls, write policies, respond to incidents, and work directly with auditors.
This is initially an individual contributor role with high impact and visibility. As our security program matures, you'll have the opportunity to build and lead a security team.
IN THIS ROLE, YOU WILL
Own Compliance
Lead SOC 2 Type II and PCI DSS programs through successful audit
Design and implement security controls without blocking velocity
Serve as primary technical contact for external auditors and assessors
Manage third-party vendor security assessments and ongoing monitoring
Build automated evidence collection and continuous compliance monitoring
Report security metrics and program status to executive leadership
Manage Security Operations
Establish vulnerability management program with defined SLAs and remediation workflows
Own end-to-end vulnerability management: identify, assess, prioritize, and drive remediation to completion across infrastructure and applications
Manage external penetration testing program with third-party vendors, including scoping, assessment review, and remediation tracking
Perform internal penetration testing and security assessments of applications, APIs, and infrastructure
Build SIEM detection rules, security dashboards, and alert triage processes
Develop and test incident response runbooks
Conduct threat modeling for critical systems and architectural changes
Lead security assessments of new technologies and third-party integrations
Enable & Collaborate
Partner with platform engineering to implement security roadmap: AWS landing zone design, PAM/JIT workflows, account segmentation, disaster recovery testing
Enforce enterprise security controls (SSO, secrets management, RBAC)
Build and deliver security awareness training program for all employees
Develop and maintain security policies, standards, and procedures
Translate compliance requirements into actionable engineering tasks and drive completion
YOU HAVE
Security & Compliance:
5+ years in information security, with 2+ years in fintech or highly regulated industry
CISSP certification (or actively pursuing - must obtain within 12 months of hire)
Hands-on experience leading SOC 2 and PCI DSS audits from start to finish
Strong incident response background-you've led real security incidents
Experience with vulnerability management platforms (Wiz, Snyk, Tenable)
Technical Skills:
Solid understanding of AWS security: IAM, Security Hub, GuardDuty, CloudTrail, KMS
Experience with SIEM platforms (Splunk, Datadog, Elastic)-you can write detection rules and build dashboards
Hands-on experience with vulnerability assessment and penetration testing tools (Burp Suite, Nessus, Qualys, or similar)
Ability to read code (Ruby, JavaScript, Python) and assess security implications
Knowledge of web application security, API security, and OWASP Top 10
Understanding of access control patterns (PAM, SSO, RBAC, least privilege)
Core Competencies:
Strong communication-you can explain risks to engineers and executives alike
Pragmatic risk management in fast-paced environments
Self-starter who builds programs from scratch
Collaborative mindset-security as enabler, not blocker
Ability to drive remediation to completion across teams
NICE TO HAVE
Additional certifications (CISM, CISA, CCSP, CEH, OSCP, CRISC)
Experience managing WAF deployments (Palo Alto, Cloudflare, AWS WAF)
Infrastructure-as-code experience (Pulumi, Terraform)
Kubernetes security knowledge
SOAR platform experience
DevSecOps or security automation background
Scripting skills (Python, Bash) for security tooling and automation
Kikoff: A FinTech Unicorn Powering Financial Progress with AI
At Kikoff, our mission is to provide radically affordable financial tools to help consumers achieve financial security. We're a profitable, high growth FinTech unicorn serving millions of people, many of whom are building credit or navigating life paycheck to paycheck. With innovative technology and AI, we simplify credit building, reduce debt, and expand access to financial opportunities to those who need them the most. Founded in 2019, Kikoff is headquartered in San Francisco and backed by top-tier VC investors and NBA star Stephen Curry.
Why Kikoff:
This is a consumer fintech startup, and you will be working with serial entrepreneurs who have built strong consumer brands and innovative products. We value extreme ownership, clear communication, a strong sense of craftsmanship, and the desire to create lasting work and work relationships. Yes, you can build an exciting business AND have real-life real-customer impact.
🏥 Medical, dental, and vision coverage - Kikoff covers the full cost of health insurance for the employee!
📈 Meaningful equity in the form of RSU's
🏝 Flexible vacation policy to help you recharge
💰 Competitive pay based on experience consisting of base + equity + benefits
Location: Hybrid, 3 days onsite in San Francisco, CA.
Visa sponsorship available: Kikoff is willing to provide sponsorship for H1-B visas and U.S. green cards for exceptional talent.
Equal Employment Opportunity Statement
Kikoff Inc. is an equal opportunity employer. We are committed to complying with all federal, state, and local laws providing equal employment opportunities and considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
Please reference the following for more information.
If you need reasonable accommodation for a job opening please connect with us at ***************** and describe the specific accommodation requested for a disability-related limitation. Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process.
San Francisco Fair Chance Ordinance: Pursuant to the San Francisco Fair Chance Ordinance, Kikoff will consider for employment qualified applicants with arrest and conviction records.
Auto-ApplySr. Security Portfolio TPM
Security architect job in San Francisco, CA
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
The Opportunity
The Adobe Security organization seeks a proactive force multiplier with experience skillfully leading multiple technical programs, running a healthy portfolio, working directly with leadership, and delighting stakeholders. Our ideal candidate has superb communication and relationship-building skills and a solid track record of driving business outcomes through managing large programs. In addition, familiarity with fundamentals in key security operations and related security compliance frameworks could help this candidate have an immediate impact. If you excel at navigating complexity with multiple internal customers, are a master planner who helps teams foresee challenges and risks and guides them through them, and are equipped with a diverse technical program management toolbox, we can't wait for you to join our Security PMO team!
What you'll Do
* Partner directly with security leadership to build a portfolio of key programs. Lead and monitor the health and execution of several key initiatives with insights into status, risks, dependencies, roadblocks, and budget across the organization's program portfolio.
* Ensure a healthy program portfolio in Adobe's Technology GRC (Governance, Risk, and Compliance) organization with a clearly defined roadmap.
* Bring together cross-functional teams to deliver business outcomes for high-priority programs through clear planning, execution, partnership, and communication.
* Make things easier for all collaborators of your program portfolio by driving simplicity, clarity, and efficiency in all aspects of your work.
* Reduce program risk by proactively identifying, communicating, and removing roadblocks.
* Build trust through visibility. Provide accurate and timely data-driven status reports for a broad audience and lead executive governance meetings.
* Effectively handle program financials, including driving accurate budget forecasts.
What you need to succeed
* Exceptional communication skills for effective engagement with both engineers and executives in meetings, presentations, and writing. Excel at building strong and trusted partner relationships.
* 7+ years as a program manager in the security domain with portfolio-level oversight experience. Demonstrate strong knowledge in the compliance field and have worked closely with the compliance teams on projects.
* Experience leading programs involving AI systems and workflows (e.g., MCP servers, RAG capabilities, LLM integrations, or related AI infrastructure).
* Established history of effectively managing programs from inception, prioritizing, and strategizing to implementation, reporting, and successful delivery of intricate projects with many significant internal customers.
* Demonstrated Agile practice experience in software projects and familiarity with Jira (including query and dashboarding), O365 Suite, MS Teams, SharePoint, MS Project, Excel, and Miro or equivalent experience
* Familiarity with compliance frameworks such as ISO 42001, SOC2, HIPAA, PCI DSS, ISO27001, ISO27017/18, ISO22301, and Geo-compliance programs.
* Preferred Certifications: CISSP, CISM, PMP, or equivalent credentials demonstrating expertise in cybersecurity and program leadership.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $124,300 -- $228,400 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process.
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
Security System Engineer
Security architect job in San Francisco, CA
Seeking a candidate with the ability to demonstrate expertise in both the practical implementation and the administration of noted tools. The basis of the work will be to backfill daily operations management as well as assess the current state implementation for completeness and currency. The candidate will also be responsible for the identification and execution of implementation improvement efforts that will allow for the transition of such tools to a managed service provider including the documentation of run books, incident response and remediation support, and developing continuity plans. Has demonstrated expertise in one or more of the following tools:
Qualys Vulnerability Scanner
LogRhythm
Tripwire
Essential Functions:
Manage and maintain key Information Security tools to help mature and improve the overall effectiveness of solutions across the organization to safeguard information systems, intellectual property assets and customer data.
Design, implement and support integration of information security solutions including security architectures, firewall analysis, and developing and coordinating security implementation plans to improve monitoring and compliance functions and drive automation and efficiencies.
Manage remediation of security issues with technology and business teams to ensure remediation is completed timely and effectively.
Analyze existing processes to identify improvement opportunities, recommend solutions and lead implementation.
Establish and implement a repeatable process for tracking, reporting and driving remediation of security issues.
Assist with the PCI DSS security compliance program including scoping, testing, and remediation activities.
Help train associates, contractors, alliance or other third parties on information security policies and -procedures.
Provide skill-set knowledge transfer that ensures necessary cross-training of other IT Security team members.
Monitors compliance with information security policies and procedures and monitors access control systems to assure appropriate access levels are maintained.
Develop, support and manage Security metrics & reporting.
Develop, maintain and enforce standardized, repeatable administrative and operational policies, processes and procedures.
Serves as enterprise information security consultant, conduct information security risk assessments.
Lead computer forensic analysis, cyber-crime investigation, incident emergency response and investigations.
Perform other responsibilities and duties as assigned.
Additional expertise in the following tools is a plus;
Imperva DB Monitoring
Ingrian HSM
LogRhythm
McAfee IDS/IPS
McAfee Solid Core
NETIQ
PGP Desktop, WDE, Netshare
PGP Universal Server & KMS
Qwest Password Manager
RedSeal
RSA Authentication Manager
RSA Envision
Symantec DLP
Varonis Data Privilege & DWebsense
websense
Manager, Information Security - Detection Engineering
Security architect job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. This role may be remote or hybrid. At LinkedIn, hybrid roles are performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. Remote roles are performed from the designated home work location upon time of hire, and any changes to this home work location requires a review of remote status and approval.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Engineering Manager to lead the Detection Engineering team in the US and to be an integral part of our Information Security organization. The Detection Engineering team is responsible for developing and maintaining threat detection capabilities, security monitoring systems, and detection rules to protect our infrastructure, applications, and, most importantly, our members. This is a key role in supporting and growing our security detection and monitoring capabilities.
Responsibilities:
Leadership and Team Management
+ Lead and manage the detection engineering team, including hiring, training, and mentoring team members.
+ Develop and maintain detection engineering policies, procedures, infrastructure, and guidelines.
+ Coordinate and oversee all activities of the detection engineering team during threat detection development and implementation.
Detection Development and Management
+ Serve as the primary point of contact for all threat detection development and enhancement initiatives.
+ Ensure timely development, testing, and deployment of detection rules and monitoring capabilities.
+ Conduct post-deployment analysis and create detailed reports on detection effectiveness with KPIs, including tuning recommendations and optimization strategies.
Communication and Coordination
+ Communicate detection development status, updates, metrics and reporting, and capabilities to senior management, stakeholders, and security teams regularly.
+ Coordinate with internal and external teams, including security operations, defense infrastructure, incident response, and product engineering teams to develop and maintain effective detection capabilities.
+ Develop and maintain an effective detection engineering communication plan.
Continuous Improvement
+ Continuously evaluate and improve detection engineering processes, tools, and capabilities.
+ Conduct and report on regular detection testing and validation exercises to test and refine detection rules and monitoring systems.
+ Stay current with emerging threats, attack techniques, and detection technologies to enhance the detection engineering program.
Reporting and Documentation
+ Maintain comprehensive documentation of all detection rules, including development rationale, testing results, and performance metrics.
+ Prepare and present detection engineering reports and metrics to senior leadership and stakeholders.
+ Ensure compliance with regulatory requirements and industry standards related to threat detection and monitoring.
Training and Awareness
+ Develop and deliver detection engineering training programs for team members and other relevant personnel.
+ Promote security detection awareness and best practices across the organization.
+ Ensure the detection engineering team is up-to-date with the latest tools, techniques, and procedures.
Budget and Resource Management
+ Manage the detection engineering budget and allocate resources effectively.
+ Evaluate and recommend tools, technologies, and services to enhance the detection engineering program.
+ Ensure the team has the necessary resources and support to perform their duties effectively.
Basic Qualifications:
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related technical discipline, or equivalent practical experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 7+ years of experience in cybersecurity, with a focus on detection engineering, security monitoring, threat intelligence, incident response, or related security roles.
+ Experience leading or managing a cybersecurity, incident response, or detection engineering team.
+ Experience in cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK, OCSF).
+ Experience in detection engineering tools and technologies (e.g., Query Languages, CI/CD, YARA, Sigma rules, threat intelligence platforms).
+ Experience with threat analysis, detection rule development, automation engineering, and security monitoring optimization.
+ Project management experience with managing budgets and resources.
Preferred Qualifications:
+ Master's degree in Cybersecurity, Information Assurance, or a related field.
+ 10+ years of experience in cybersecurity, with significant experience in detection engineering, threat intelligence, or incident response.
+ 3+ years of management experience in building small to medium-sized teams, demonstrating growth and a track record of successful deliveries.
+ Ability to work under pressure and manage multiple detection development projects simultaneously as well as managing an oncall team.
+ Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, SANS).
+ Experience in developing and delivering detection engineering training and awareness programs.
+ Strong proficiency in Kusto Query Language (KQL) and SQL.
+ Proficiency in programming or scripting languages (e.g., Python, Go, etc.) for automating detection development and testing processes.
+ Experience with cloud security and detection engineering in cloud environments especially Azure.
+ Knowledge of advanced threat detection techniques, including threat hunting and behavioral analysis as well as applied threat intelligence.
+ Familiarity with detection engineering frameworks and best practices (e.g., Sigma, YARA, STIX/TAXII, OCSF).
+ Strong communication skills, both written and verbal, with the ability to convey complex technical information to non-technical stakeholders.
Suggested Skills :
+ Security Information and Event Management (SIEM)
+ Query languages (KQL, SPL, SQL, Elastic, etc.)
+ Detection Rule Development (YARA, Sigma)
+ Scripting and Automation (e.g., Python, PowerShell, SQL)
+ Threat Intelligence Integration
+ Cloud Security (e.g., Azure, GCP)
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
**Equal Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
**Global Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
Distributed Systems Engineer: Secure Sandboxes
Security architect job in San Francisco, CA
Magic's mission is to build safe AGI that accelerates humanity's progress on the world's most important problems. We believe the most promising path to safe AGI lies in automating research and code generation to improve models and solve alignment more reliably than humans can alone. Our approach combines frontier-scale pre-training, domain-specific RL, ultra-long context, and inference-time compute to achieve this goal.
About the role
As a Software Engineer on the Supercomputing Platforms and Infrastructure team, you will build the next generation systems that power large scale AI research and deployment. You will focus on sandboxed execution environments, distributed systems orchestration, and performance optimized compute workflows. You will work closely with ML and Research teams and infrastructure teams to deliver both high throughput, scale, and strong isolation guarantees in a cluster environment.
What you might work on
Build highly scalable, highly performant, software that facilitates arbitrary code execution with strong isolation guarantees.
Design and build systems that allow our AI models to interface with machines in various modes, interactive terminal, GUI applications, etc.
Provision and operate high density compute and storage nodes (NVMe, high IOPS SSDs, high bandwidth networks), and build software that performs efficient load balancing, and resource utilization across them.
Instrument and optimize end to end performance including storage IO, network bandwidth, CPU, memory, and endurance constraints.
Develop APIs, self service platforms, and automation and tools so researchers and engineers can deploy and monitor workloads at scale.
Troubleshoot complex infrastructure issues across OS, drivers, hardware, storage systems (local NVMe, block storage, NFS), networking, namespace isolation, and cloud or hybrid environments.
Produce clean, documented code and developer workflows, and collaborate with SRE and security teams to ensure safe, reliable, and self serviceable compute offerings.
What we are looking for
Strong software engineering background (C, C++, Go, Rust, or similar systems languages).
Experience designing or operating sandboxed or isolated execution environments (namespaces, cgroups, container runtime internals), or strong interest in this area.
Experience building or operating distributed systems or parallel processing frameworks (scatter aggregate processing, worker pools, multi thread and multi process coordination, shared memory, atomics, merging strategies).
Solid understanding of storage and IO subsystems (NVMe, SSD endurance, write amplification), network performance, CPU and memory resource constraints in high performance compute clusters.
Comfortable working on low level systems (OS, threading, memory management, synchronization) as well as higher level orchestration or automation.
Experience with cloud infrastructure (GCP, AWS, Azure, etc.) including IaC tools such as OpenTofu, Terraform, Pulumi, or CDK is a plus.
Intellectual curiosity, strong ownership, and the ability to make tradeoffs in ambiguous environments such as latency versus throughput and isolation versus performance.
Nice to haves
Prior experience with GPU scheduling, RDMA networking, or bare metal HPC clusters
Contributions to open source container runtimes or sandboxing frameworks
Experience with kernel internals, device drivers, or SSD and NVMe endurance modeling
Familiarity with Rust for systems programming or Go for infrastructure orchestration
Why join us
You will work at the cutting edge of AI infrastructure including large compute clusters, advanced metrics engines, and next generation sandboxing systems for untrusted workloads.
The problems you solve will be foundational, for example how to securely and efficiently run arbitrary research code across thousands of GPUs or high end SSDs.
You will join a collaborative and hands-on team where you are building rather than only modeling.
Excellent compensation and equity, generous benefits, and high impact.
Our culture:
Integrity. Words and actions should be aligned
Hands-on. At Magic, everyone is building
Teamwork. We move as one team, not
N
individuals
Focus. Safely deploy AGI. Everything else is noise
Quality. Magic should feel like magic
Compensation and benefits (US)
Annual salary range: 225,000 USD to 550,000 USD depending on seniority
Significant equity component
401(k) with matching, comprehensive health, dental, and vision insurance, unlimited paid time off, visa sponsorship and relocation support
Fast paced, mission driven environment focused on safely advancing AGI for humanity
Auto-ApplySecurity Engineer, Operating Systems
Security architect job in San Francisco, CA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Build secure network stacks with appropriate isolation and segmentation
Create OS-level attestation and integrity monitoring systems
Develop security patches, custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyCAD Security Systems Engineer
Security architect job in Sunnyvale, CA
JOB FUNCTION/PURPOSE:
The CAD Security Systems Engineer is responsible for the design, engineering, and implementation of physical security systems across client and internal projects. This role works closely with Pre-Construction and Operations teams to interpret project specifications and drawings, determine optimal system layout, and develop detailed installation drawings to support successful project execution. The Engineer will design and layout electronic security systems including access control, video surveillance (CCTV), intrusion detection and may also assist with intercom, nurse call, paging, and A/V systems. Utilizing deep system knowledge, AutoCAD, and other design tools, the Security Systems Engineer plays a critical role in ensuring a seamless transition from engineering to operations. The role supports effective collaboration between Pre-Construction, Solutions Management, and Engineering teams to deliver reliable, compliant, and high-performing integrated security solutions for awarded projects.
KEY ACCOUNTABILITIES:
Conduct detailed site assessments to identify security risks, environmental considerations, and operational requirements.
Develop comprehensive physical security system designs, including CCTV, access control, intrusion detection, intercom, duress, and perimeter protection.
Create system layouts, riser diagrams, wiring schematics, device placement plans, and bills of material using CAD or similar tools.
Specify appropriate hardware and technologies, including camera types and placement, access control devices (readers, locks, credentials), and network components.
Design systems that are scalable, integratable with third-party platforms, and aligned with IT infrastructure and cybersecurity best practices.
Ensure all designs comply with applicable codes, standards, and regulations (e.g., NFPA 731, UL 294, NEC, ADA, FIPS 201).
Coordinate closely with architects, general contractors, and other trades to integrate systems into building designs and construction timelines.
Perform technical evaluations of manufacturers, products, and designs to ensure optimal performance and value.
Prepare technical documentation for bidding, permitting, construction, and client approval, including scopes of work and installation details.
Support peer reviews and participate in design workshops to validate concepts and identify improvement opportunities.
Build and maintain subcontractor relationships.
Collaborate with project managers, general contractors, IT teams, and vendors to align project scope, timelines, and milestones.
Participate in design reviews and construction planning sessions.
Maintain accurate and complete system documentation including as-builts, configuration records, and asset tags.
Assist with on boarding of new employees.
OPERATE AS ONE TEAM:
Build strong win-win relationships with other departments within Beacon.
JOB QUALIFICATIONS:
Knowledge:
In-depth understanding of physical security systems including access control, CCTV, intrusion detection, intercom, and related technologies.
Familiarity with industry standards and codes such as UL 294, NFPA 731, NEC, ADA, and NIST.
Working knowledge of low-voltage systems.
Knowledge of building construction, system integration practices, and coordination with other trades.
Experience with major security platforms (e.g., Lenel, Avigilon, Software House) is highly preferred.
Skills and Abilities
Proficient in AutoCAD, Revit, Bluebeam, or other design/drafting software for producing system layouts and construction drawings.
Strong analytical and problem-solving skills with a detail-oriented mindset.
Ability to interpret technical drawings, project specifications, and floorplans.
Effective communication skills, both written and verbal, for coordination with internal teams, vendors, and clients.
Ability to manage multiple tasks and projects under tight deadlines.
Collaborative mindset with the ability to work across engineering, pre-construction, and operations teams.
Comfortable working in both office and construction site environments.
Must understand implicit instructions and react favorably in all work situations.
Capable of producing accurate documentation including BOMs, riser diagrams, and installation packages.
Must be able to communicate providing verbal feedback in a professional manner.
Education:
Bachelors degree in electrical engineering, Security Engineering, or a related field; equivalent work experience may be considered.
37 years of experience in security systems engineering or low-voltage design.
Certifications on low voltage systems.
WORK ENVIRONMENT:
This position is a hybrid role after the initial onboarding phase has been completed. Must be in the office three times a week, with one of the days being Monday or Friday.
A work environment can be an office environment, medical facility, educational facility, or a customer site under construction, renovation, or warehouse space.
Job sites will have a variety of environmental factors including but not limited to noise, dust, and temperature changes.
Candidates must have the capability to transfer job sites, as necessary.
ESSENTIAL FUNCTIONS:
Requires prolonged sitting, standing, some bending, stooping, and stretching. Requires manual dexterity and eye-hand coordination for data input.
Occasionally lift and carry items weighing up to fifty pounds.
Must maintain a clear background check to satisfy customer job site badging requirements.
Must be willing to submit to all vaccinations and screening tests required for customer jobsite badging protocol.
Maintain a clear drug and alcohol screening protocol.
This does not list all the duties of the job. Supervisors or management may ask you to perform other instructions and duties. You will be evaluated in part based upon your performance of the tasks listed in this .
Management has the right to revise this description at any time. The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason as outlined in the employee manual or other written agreement.
An Equal Opportunity Employer
We do not discriminate based on race, color, religion, national origin, sex, age, disability, genetic information, or any other status protected by law or regulation. It is our intention that all qualified applicants are given equal opportunity and that selection decisions be based on job-related factors.