Personnel Security Specialist
Security architect job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Personnel Security Specialist II to join our team in El Segundo, CA.
The Personnel Security Specialist's primary function is to handle personnel security functions in support of the customer's facility and organization. The position will provide “day-today” PERSEC services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Responsibilities include but are not limited to:
Build and Maintain tracking spreadsheets/databases for customer PERSEC activities.
Provide support for the security awareness and education programs.
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Government Security Representative.
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions.
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access.
Perform data entry and record checks in the Joint Access Database (JADE) and maintain all customer sponsored personnel access information.
Receive and/or transmit classified visit requests as necessary to meet customer needs.
Minimum Qualifications:
Bachelor's degree; an additional 4 years of experience may be considered in lieu of degree.
6 + years of related experience.
4 + years of relevant SCI experience.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Preferred Qualifications:
2+ years of SAP-related experience.
Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Information System Security Engineer (ISSE)
Security architect job in Vandenberg Air Force Base, CA
GovCIO is currently hiring for an Information System Security Engineer (ISSE) to support the 2ROPS accreditation process for small classified mobile systems to renew the current Authority to Operate (ATO) and provide ongoing cybersecurity sustainment support. This position will be located at Vandenberg Space Force Base, California and will be an onsite position with some flexibility for remote work with 2ROPS leadership approval.
Responsibilities:
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counterespionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Assesses and mitigates system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis. Establishes system security designs. Implements security designs in hardware, software, data, and procedures. Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Supports secure systems operations and maintenance.
Participates with the client in the strategic design process to translate security and business requirements into technical designs.
Configures and validates secure systems and tests security products and systems to detect security weakness; performs network scanning and vulnerability analysis.
Ensures that the appropriate security features and safeguards have been implemented on all information systems as required by DoD/IC policy and directives, and industry best practices.
Performs defense device system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of all implemented, maintained, and deployed systems.
Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, customer support and provides guidance on security issues.
Qualifications:
High School with 9+ years (or commensurate experience)
Clearance Required: Secret
Required Skills and Experience
5 years of experience as security engineer for hardware and software
Linux (Red Hat/CentOS) system administration experience
Experience configuring Assured Compliance Assessment Solution (ACAS) and performing scans
Security+ Certification (or equivalent) required
#D#DSGP L
#CJ
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $120,000.00 - USD $140,000.00 /Yr.
Product Security Architect
Security architect job in Palo Alto, CA
We are seeking an experienced Product Security Architect to join our Security Center of Excellence team and lead security initiatives across our cloud-based SaaS product portfolio. This role requires a unique blend of deep technical expertise, architectural vision, and collaborative leadership to ensure our products are built with security at their core. The ideal candidate will work at the intersection of security, development, and product design to create robust, secure solutions that protect our customers and their data.
Key Responsibilities
Security Architecture & Design
Design and implement comprehensive security architectures for cloud-based SaaS products, ensuring security is embedded throughout the product lifecycle
Conduct thorough threat modeling exercises for new and existing product features, identifying potential vulnerabilities and attack vectors
Define security requirements, patterns, and best practices for product development teams
Review and approve architectural designs from a security perspective, providing actionable guidance and recommendations
Product Security Assessment
Perform in-depth security assessments of products at the code, configuration, and architectural levels
Identify security vulnerabilities, weaknesses, and gaps in existing and proposed product implementations
Conduct code reviews with a focus on security, analyzing Java, Python, and React codebases for security flaws
Evaluate third-party integrations, APIs, and dependencies for security risks
Collaboration & Enablement
Partner closely with development teams to integrate security controls and best practices into the software development lifecycle
Work with QE teams to develop security test strategies, including penetration testing, vulnerability scanning, and security automation
Provide security guidance and mentorship to engineering teams, fostering a security-first culture
Translate complex security concepts into clear, actionable recommendations for technical and non-technicaål stakeholders
Cloud & Infrastructure Security
Design and implement security controls for cloud infrastructure and services (AWS, Azure, GCP)
Architect and implement IAM strategies including role-based access control (RBAC), attribute-based access control (ABAC), least privilege principles, and identity federation
Design secure network architectures including VPCs, security groups, network ACLs, microsegmentation, and zero-trust network access
Establish cloud configuration security standards and guardrails to prevent misconfigurations and ensure secure-by-default deployments
Ensure proper implementation of cloud security best practices including data encryption (at rest and in transit), secrets management, and compliance
Monitor and respond to emerging cloud security threats and vulnerabilities
Security Standards & Compliance
Establish and maintain security standards, policies, and procedures aligned with industry frameworks
Support compliance efforts including SOC 2, ISO 27001, GDPR, and other relevant standards
Stay current with evolving security threats, vulnerabilities, and industry best practices
Required Qualifications
Experience
8+ years of experience in information security, with at least 5 years specifically in product security architecture
Proven track record as a Product Security Architect in a SaaS or cloud-based company
Extensive experience with threat modeling methodologies (STRIDE, PASTA, or similar)
Hands-on experience identifying and remediating security vulnerabilities in production environments
Strong background working collaboratively with development and QE teams in agile environments
Technical Expertise
Deep understanding of secure coding practices and common vulnerability patterns (OWASP Top 10, CWE/SANS Top 25)
Proficiency in code-level security analysis across multiple languages, particularly Java, Python, and React/JavaScript
Strong knowledge of cloud security architectures and services (AWS, Azure, or GCP)
Expert-level knowledge of IAM principles and implementation including multi-factor authentication, single sign-on, privileged access management, service accounts, and identity lifecycle management
Deep understanding of network security including firewalls, IDS/IPS, VPN, TLS/SSL, DDoS protection, API gateways, and secure network segmentation
Extensive experience with cloud configuration security including infrastructure-as-code security, cloud security posture management, configuration drift detection, and automated compliance checking
Experience with authentication and authorization frameworks (OAuth 2.0, OpenID Connect, SAML, JWT, RBAC, ABAC)
Understanding of containerization and orchestration security (Docker, Kubernetes)
Knowledge of API security, microservices architecture, and distributed systems security
Familiarity with DevSecOps practices and security automation tools (SAST, DAST, SCA)
Certifications
CISSP (Certified Information Systems Security Professional) required
Additional relevant certifications valued:
Cloud security: CCSP, AWS Certified Security Specialty, Azure Security Engineer, Google Cloud Professional Security Engineer
Security architecture: CSSLP, SABSA
Penetration testing: CEH, OSCP, GPEN
Network security: CCNP Security, GIAC certifications
Preferred Qualifications
Experience with Infrastructure as Code (Terraform, CloudFormation) and security policy as code
Knowledge of zero-trust architecture principles and implementation
Experience with security incident response and vulnerability management programs
Background in software development or engineering
Experience with regulatory compliance frameworks and security audits
Published security research, conference presentations, or contributions to open-source security projects
Master's degree in Computer Science, Cybersecurity, or related field
Technical Skills
Programming & Scripting:
Java (enterprise application security)
Python (security automation, scripting)
JavaScript/React (frontend security)
Additional languages a plus (Go, Rust, C/C++)
Security Tools & Platforms:
SAST/DAST tools (Checkmarx, Fortify, Veracode, etc.)
Vulnerability scanners and penetration testing tools
Security information and event management (SIEM) platforms
Cloud security posture management (CSPM) tools
Cloud Platforms & Configuration:
AWS, Azure, or Google Cloud Platform
IAM services (AWS IAM, Azure AD, GCP IAM, identity federation)
Network security services (VPC, Security Groups, Network ACLs, WAF, Cloud Firewall)
Cloud configuration management and security scanning tools
Cloud-native security services and controls (GuardDuty, Security Hub, Azure Defender, Security Command Center)
Secrets management (AWS Secrets Manager, Azure Key Vault, HashiCorp Vault)
Serverless architecture security
Development & DevOps:
CI/CD pipelines and security integration
Version control systems (Git)
Containerization and orchestration
Agile/Scrum methodologies
Personal Attributes
Strong analytical and problem-solving skills with attention to detail
Excellent communication skills with the ability to influence and educate diverse audiences
Self-motivated with the ability to work independently and as part of a team
Passionate about security and staying ahead of emerging threats
Pragmatic approach to balancing security with business needs and user experience
What We Offer
Opportunity to shape security architecture for cutting-edge Cybersecurity SaaS products
Collaborative environment with highly talented engineering teams
Professional development and growth opportunities
Competitive compensation and benefits package
We are an equal opportunity employer and value diversity in our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Senior Security GRC Engineer
Security architect job in San Ramon, CA
At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are.
We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right!
Job Description
We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms.
Job Responsibilities:
Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001).
Perform risk assessments and develop mitigation strategies for identified security risks.
Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management.
Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind.
Monitor and report on compliance status, identifying gaps and proposing remediation strategies.
Oversee third-party vendor risk assessments and ensure adherence to security requirements.
Support internal and external audits by providing documentation, evidence, and responses to audit findings.
Conduct security awareness training programs and promote a culture of compliance within the organization.
Required Experience/Skills/Knowledge:
5+ years of experience in Governance, Risk, and Compliance roles or a related field.
Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards.
Proficiency in GRC tools such as SAI360 for compliance and risk management.
Experience with privileged access management tools like CyberArk.
Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT.
Excellent communication and collaboration skills to engage with technical and non-technical stakeholders.
Strong analytical and organizational skills with attention to detail.
This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure.
Required Education:
Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
Equivalent work experience may be considered in lieu of a degree.
Application Security Engineer
Security architect job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Security Engineer
Security architect job in Irvine, CA
At Balance Staffing, we're obsessed with your success!
The Workstation Security Engineer I is an individual contributor who will participate in and manage all aspects of information and network security, including intrusion detection, incident response, vulnerability assessment, application security, and compliance with the corporate information security policy for all Client Device endpoints. This person Will primarily be responsible for designing, implementing, administrating, operating, and improving security technologies, including but not limited to Client device endpoints, Azure Microsoft Defender, Al Security tools, Network Access Control, End Point Protection, Two Factor Authentication, and their procedures and processes.
ESSENTIAL FUNCTIONS
Workstations Security Engineering -
Design, build, test and deploy new security technologies, which include the development of the operational manual and run books
Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement
Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure
Participate in technical risk assessments and security exposure analyses of systems, networks and business applications
Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness
Responsible for conducting vulnerability assessments and penetration testing, analyzing vulnerability data and prioritizing remediation efforts, and developing vulnerability policies and procedures with the collaboration of GRC.
Oversees the installation, configuration, and supportive processes of security technologies
Participate in or lead the Incident Response activities
Interacts With internal and external clients on security operations requirements, identifies security process and develops strategies/solutions to security issues
Keeps fully abreast of trends and changing technologies as they relate to IT and Network
Engineering and Information Security fields
Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders
Security Operations / Administration -
Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems
Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures
Evaluate, implement, tune, and operate security solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
Monitor and recommend improvements of security technologies and their various reports
Risk Management / Security Audit/Assessment Support / Ad-hoc support -
Support security audit/assessment related activities and compliance reviews
Performs other tasks, duties and projects as assigned
Provide Ad-hoc support as required
REQUIREMENTS
Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience
Minimum 3 years of IT relevant experience or equivalent combination of experience plus at least
1 year of experience performing Security Engineering / Planning / Operations
Experience in medium to complex computing environments, with advanced knowledge in security technologies and services
Hands-on experience with at least two or more of the following Enterprise Security Technologies:
Network Intrusion Prevention / Detection
Virtual private Networks; SSL, IPSec and Site-to-Site
Enterprise Class Stateful Inspection Firewalls
Network Access Controls in context to Identity management
Windows server OS & Desktop OS
Network Packet Inspection
Directory Services including LDAP, AD and Secure Authentication Technologies
Experience in implementing Information Security technologies and/or processes required.
Experience in defining Information Security strategies and frameworks
Experience integrating security technologies into corporate operations frameworks.
Ability to communicate effectively with client staff at all levels, from technical to executive
Multi-task oriented in a team environment
Demonstrated ability to pay close attention to detail
Knowledge of Information security risk assessment methodologies and standards
Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers
Ability to work independently, undertaking and completing project tasks on schedule with minimal supervision
Balance Staffing is proud to be an equal-opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, Veteran status, or any other characteristic protected by federal or state law.
Network and Security Architect
Security architect job in Fremont, CA
The requirements listed below are representative of the knowledge, skill, and/or ability required: Build the networks by taking into consideration various factors like, bandwidth requirements, infrastructure requirements and security. Responsible for estimating growth and plan for the network upgrade to meet future demands.
Ability to work on multiple priorities and/or projects simultaneously.
Excellent listening and communications skills, both verbal and written.
flexible in working hours to support global project and migration during non-business hours.
Ability to collaborate with multiple teams to achieve project goals.
Organized, detail oriented and self-motivated.
Ability to provide and maintain detailed documentation on each project.
Demonstrate knowledge in advanced networking and infra security domain.
Ability to successfully train the operation team on the new solution(s) implemented.
Problem-solving skills and abilities to meet reasonable deadlines.
Ability to work with little supervision and manage a team.
Identify opportunities and recommend solutions for improving the overall network health by assessing overall effectiveness and efficiency.
Stay current with existing, emerging, and evolving technologies and when appropriate, make recommendations as to how we may best harness a new technology or idea.
BS in Engineering, Computer Science, or related field, with 15+ years of work experience in networking domain Have completed minimum 3 significant network solution designs In-depth knowledge of the OSI network model Experience with different network types (i.
e.
LAN, WAN, WLAN) Network protocols and technologies, e.
g.
DNS, HTTP, SSL, 802.
1x, Load Balancing, WAN optimization, SD-WAN, VPN, PKI Cisco network products (Nexus and Catalyst switches, routers, WLC, ISE) Knowledge of Palo Alto Networks firewall and IPS configuration and troubleshooting Knowledge of F5 load balancer Knowledge of public cloud is highly desirable Knowledge of Zero-Trust networking is highly desirable CCNP certification CCIE certification PCNSE certification Azure Network Engineer Associate
SAP Security Consultant
Security architect job in Sacramento, CA
We are seeking a seasoned SAP Security professional to join our team in supporting and enhancing enterprise security across a diverse SAP landscape. The ideal candidate will bring deep expertise in managing security roles, authorizations, and governance for a variety of SAP modules, including experience with modern S/4HANA environments.
Key Responsibilities:
Design, implement, and maintain SAP security roles and authorizations across multiple SAP platforms including ECC, BW, BPC, CRM, BusinessObjects (BOBJ), and Solution Manager.
Collaborate with functional and technical teams to assess access requirements and deliver secure, compliant solutions.
Participate in full lifecycle SAP implementations, providing hands-on security configuration and ensuring alignment with business and compliance requirements.
Support system audits and implement corrective actions related to access and compliance.
Assist in the development of security policies and best practices for SAP systems, including risk analysis and segregation of duties (SoD).
Contribute to S/4HANA migration planning and execution with a focus on securing new and transitioned environments.
Required Qualifications:
8+ years of hands-on experience in SAP Security administration across a variety of SAP applications (ECC, BW, BPC, CRM, BOBJ, and Solution Manager).
Demonstrated involvement in at least two full-cycle SAP implementations in a security-focused role.
Experience supporting a full end-to-end S/4HANA migration project, with an emphasis on security role design and transition.
Strong understanding of user provisioning, role-based access controls, GRC tools, and SoD principles.
Excellent communication skills and ability to work cross-functionally with both technical and business stakeholders.
Auto-ApplyUrgent Job Opening for a SAP Security Consultant in San Francisco, CA
Security architect job in San Francisco, CA
Hello, Greetings for the day, We have an urgent job opening for a SAP Security Consultant in San Francisco, CA. Please find the complete below and consultant information details below to the job description. Duration: 5Months+ Job Title: SAP Security
Duties:
Provides the technical guidance in development of security roles and authorizations to SAP projects and production support for R3, BW, EBP, SMP, PI, AII/OER systems Ensures development and maintenance of SAP roles and authorizations are aligned with enterprise security best practices and corporate standards Delivers and manages overall SAP security standards and designs Works closely with SAP functional and technical teams in the identification and resolution of gaps in the security authentication and authorization processes Provides day-to-day support for GRC 5.3 CUP, FireFighter Works closely with security and technical teams in architecting and implementing Identity and Security best practices in SAP environment; Partners with teams in support of internal and external auditing of SAP environment Performs annual SAP licensing for all the systems onsite Skills: Minimum of 5 years of experience implementing and delivering SAP Security Solutions; Must have strong demonstrated knowledge of SAP Security and experience with GRC Analysis and Administration. Experience in implementing/upgrading/managing SAP GRC Access Controls, Access Risk Analysis and Emergency Access Management a plus; Must have excellent troubleshooting and resolution skills; Strong attention to detail. Strong technical knowledge of SAP Security architecture and role based authorization models; Strong analytical, problem solving and conceptual. Strong oral and written communication skills, with an ability to express complex technical concepts; Strong understanding of data privacy concepts. Strong Security and Risk mitigation mindset.Understanding of process re-engineering, segregation of duties, application security implementation, security auditing techniques Keywords: Education: Bachelor's degree in Computer Science or related field, OR equivalent combination of education and/or experience Skills and Experience: Required Skills: AUDITING MITIGATION PROBLEM SOLVING SAP Security GRC Additional Skills: RE-ENGINEERING RISK ANALYSIS ARCHITECTURE SAP SECURITY SECURITY ARCHITECTURE SECURITY IMPLEMENTATION SOLUTIONS AUTHENTICATION EBP MAINTENANCE R3
Thanks & Regards,
Srikanth
************
800 W, Fifth Avenue, Suite 208A
Naperville, IL - 60563
"
A Certified MBE & Women's Business Enterprise Alliance (WBEA)"
Additional Information
All your information will be kept confidential according to EEO guidelines.
Chief Information Security Officer (0933 Manager V) - Department of Public Health
Security architect job in San Francisco, CA
The Department of Public Health prioritizes equitable and inclusive access to quality healthcare for its community and values the importance of diversity in its workforce. All employees at the Department of Public Health work to advance equity, inclusion, and diversity with a specific lens and focus on race, ethnicity, gender, sex, sexuality, disability, and immigration status.
This is a Position-Based Test conducted in accordance with CSC Rule 111A. Learn more about the City's hiring process here: *****************************************
* Application Opening: Friday, November 21, 2025
* Application Deadline: Application filing will close on or after Friday, January 9, 2026.
* Salary: $180,440 - $230,308 Annually (Range A)
* Appointment Type: Permanent Civil Service
* Recruitment ID: PBT-0933-160818
Becoming a City employee means being a part of a team that cares about making a difference. Your work will shape both the present and future of San Francisco. When you work for the City, you're choosing a job with purpose.
The mission of the San Francisco Department of Public Health (SFDPH) is to protect and promote the health of all San Franciscans. SFDPH strives to achieve its mission through the work of several divisions - the San Francisco Health Network, Population Health Division, Behavioral Health Services, and Central Administration. The San Francisco Health Network is the City's only complete system of care and has locations throughout the City, including Zuckerberg San Francisco General Hospital and Trauma Center, Laguna Honda Hospital and Rehabilitation Center, and over 15 primary care health centers. The Population Health Division (PHD) provides core public health services for the City and County of San Francisco: health protection, health promotion, disease and injury prevention, disease surveillance, and disaster preparedness and response. Behavioral Health Services operates in conjunction with SFHN and provides a range of mental health and substance use treatment services. Central Administration houses core support organizations, including Finance, Information Technology (IT), Human Resources, Privacy and Compliance, Business Office, Facilities Management, and Security Services.
Role description
The San Francisco Department of Public Health is seeking a dynamic and experienced cybersecurity professional to join its IT leadership team. As a key strategic leader, the Chief Information Security Officer (CISO) (0933 Manager V) will be responsible for developing and executing a comprehensive information security strategy that safeguards the department's systems, data, and services.
This role leads the implementation of an enterprise-wide security program that promotes collaboration, strengthens governance, and aligns cybersecurity initiatives with organizational goals. The CISO serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development. The CISO oversees a team of cybersecurity professionals within the SFDPH IT division and collaborates extensively with the CISO for the City and County of San Francisco.
We are looking for a visionary and collaborative leader who can balance innovation with risk mitigation, and who thrives in a complex, mission-driven environment. The CISO reports directly to the Chief Information Officer (CIO).
The Chief Information Security Officer (0933 Manager V) performs the following essential job functions:
* Provides strategic leadership in evaluating and mitigating information security threats across the organization using a structured, risk-based methodology. Advises executive leadership on identified risks and ensures timely execution of mitigation and remediation plans with integrity and discretion
* Directs the ongoing development of the department's information security program, including project portfolio management, incident response, policy frameworks, compliance activities, threat and vulnerability management, and third-party risk management
* Allocates and manages resources to support a robust security strategy. Identifies and advocates for strategic investments, oversees capital and operating budgets, and delivers ROI analyses and budget recommendations
* Partners with the Office of Compliance and Privacy Affairs to assess data security risks related to contracts, projects, artificial intelligence solutions, and other initiatives. Develops tools and interventions to mitigate risks, establishes performance metrics, and monitors compliance through audits and assessments
* Builds alignment and support for security goals and initiatives across internal and external stakeholders. Communicates effectively with leadership at all levels on trends, risks, and the overall effectiveness of the security program
* Promotes awareness and understanding of regulatory requirements across the organization. Leads or collaborates on testing and auditing activities to ensure ongoing compliance and successful certifications
* Analyzes security requirements and ensures compliance with industry standards such as HIPAA, NIST, and PCI-DSS
* Establishes and maintains comprehensive policies and procedures to support effective and sustainable security operations
* Serves as the department's representative in security-related matters with City agencies and partners
* Continuously monitors emerging trends, technologies, and best practices in cybersecurity to ensure the department's security posture remains current and effective
The Chief Information Security Officer (0933 Manager V) may perform other duties as assigned/required.
How to qualify
1. Education: Bachelor's degree from an accredited college or university; AND
2. Experience: Five (5) years of professional healthcare information systems security experience, of which three (3) years must include supervising IT professionals.
Education Substitution: Additional experience as described above may be substituted for the required degree on a year-for-year basis. One (1) year is equivalent to thirty (30) semester units / forty-five (45) quarter units.
Applicants must meet the minimum qualification requirements by the final filing date unless otherwise noted.
One-year full-time employment is equivalent to 2,000 hours (2,000 hours of qualifying work experience is based on a 40-hour work week).
Desirable Qualifications:
The stated desirable qualifications may be considered at the end of the selection process when candidates are referred for hiring:
* Possession of a Certified Information Systems Security Professional (CISSP) and/or Certified Information Security Manager (CISM) certification
Verification of Education and Experience:
Every application is reviewed to ensure that you meet the minimum qualifications as listed in the job ad. Review SF Careers Employment Applications for considerations taken when reviewing applications.
Applicants may be required to submit verification of qualifying education and experience at any point during the recruitment and selection process. If education verification is required, information on how to verify education requirements, including verifying foreign education credits or degree equivalency, can be found at *******************************************************
Note: Falsifying one's education, training, or work experience or attempted deception on the application may result in disqualification for this and future job opportunities with the City and County of San Francisco.
What else should I know?
Selection Procedures:
After application submission, candidates deemed qualified must complete all subsequent steps to advance in this selection process, which includes the following:
Supplemental Questionnaire (SQ) Examination (Weight: 100%)
Candidates that meet the minimum qualifications will be invited to participate in a Supplemental Questionnaire (SQ) examination that is designed to measure the knowledge, skills, and abilities in job related areas which may include but not be limited to: Knowledge of local, State and Federals laws and regulations relating to information security, including but not limited to HIPAA and HITECH; Knowledge of information security technology frameworks and standards, including but not limited to NIST, HITRUST, COBIT, ISO 27001, PCI-DSS or similar cyber security frameworks; Knowledge of technology relating to enterprise wide information security protection; Knowledge of structured systems analysis and design practices and techniques; common operating systems software and relational database systems; hospitals or community health network environments; Ability to apply principles and practices of management, administration, budgeting, training, and personnel management; Ability to manage, supervise, train and coordinate complex functional area of responsibility and groups of employees; Ability to analyze and report on activities, issues and problems and recommend appropriate solutions; Ability to communicate effectively orally; Ability to communicate effectively in writing; Ability to exercise judgement, decisiveness and creativity required in situations involving the direction, control and planning of a program(s); manage critical timelines effectively; Ability to establish and maintain good working relationships with department personnel, staff, vendors, peers, and management, and engage and influence a broad range of stakeholders (e.g. HR, IT, Legal, Compliance, senior management, etc.)
Candidates must achieve a passing score on the Supplemental Questionnaire exam in order to continue in the selection process and will be placed on the confidential eligible list in rank order according to their final score.
Additional selection processes may be conducted by the hiring department prior to making final hiring decisions.
Certification
The certification rule for the eligible list resulting from this examination will be the Rule of the List.
Eligible List/Score Report:
A confidential eligible list of applicant names that have passed the civil service examination process will be created and used for certification purposes only. An examination score report will be established, so applicants can view the ranks, final scores, and number of eligible candidates. Applicant information, including names of applicants on the eligible list, shall not be made public unless required by law. However, an eligible list shall be made available for public inspection, upon request, once the eligible list is exhausted or expired and referrals resolved. The eligible list/score report resulting from this civil service examination process is subject to change after adoption (e.g., as a result of appeals), as directed by the Human Resources Director or the Civil Service Commission.
The duration of the eligible list resulting from this examination process will be of six months and may be extended with the approval of the Human Resources Director.
To find Departments which use this classification, please see the city's Position Counts by Job Codes and Departments.
Terms of Announcement and Appeal Rights:
Applicants must be guided solely by the provisions of this announcement, including requirements, time periods and other particulars, except when superseded by federal, state or local laws, rules, or regulations. Clerical errors may be corrected by the posting the correction on the Department of Human Resources website at ************************
The terms of this announcement may be appealed under Civil Service Rule 111A.35.1. The standard for the review of such appeals is 'abuse of discretion' or 'no rational basis' for establishing the position description, the minimum qualifications and/or the certification rule. Appeals must include a written statement of the item(s) being contested and the specific reason(s) why the cited item(s) constitute(s) abuse of discretion by the Human Resources Director. Appeals must be submitted directly to the Executive Officer of the Civil Service Commission within five business days of the announcement issuance date.
Additional information regarding Employment with the City and County of San Francisco:
* Information about the Hiring Process
* Conviction History
* Employee Benefits Overview
* Equal Employment Opportunity
* Disaster Service Workers
* ADA Accommodation
* Right to Work
* Copies of Application Documents
* Diversity Statement
* Veterans Preference
* Seniority Credit in Promotional Exams
Where to Apply
All job applications for the City and County of San Francisco must be submitted through our online portal. Please visit *********************** to begin your application process.
Applicants may be contacted by email about this recruitment. Please consider using a personal email address that you check regularly rather than a work or school account.
Computers are available for the public (9:00 a.m. to 4:00 p.m. Monday through Friday) to file online applications in the lobby of the Dept. of Human Resources at 1 South Van Ness Avenue, 4th Floor and at the City Career Center at City Hall, 1 Dr. Carlton B. Goodlett Place, Room 110.
Ensure your application information is accurate, as changes may not be possible after submission. Your first and last name must match your legal ID for verification, and preferred names can be included in parentheses. Use your personal email address, not a shared or work email, to avoid unfixable issues.
Applicants will receive a confirmation email from ******************************** that their online application has been received in response to every announcement for which they file. Applicants should retain this confirmation email for their records. Failure to receive this email means that the online application was not submitted or received.
If you have any questions regarding this recruitment or application process, please contact the analyst, Marielle Saldajeno at **************************** or **************.
We may use text messaging to communicate with you on the phone number provided in your application. The first message will ask you to opt in to text messaging.
The City and County of San Francisco encourages women, minorities and persons with disabilities to apply. Applicants will be considered regardless of their sex, race, age, religion, color, national origin, ancestry, physical disability, mental disability, medical condition (associated with cancer, a history of cancer, or genetic characteristics), HIV/AIDS status, genetic information, marital status, sexual orientation, gender, gender identity, gender expression, military and veteran status, or other protected category under the law.
Easy ApplyDirector, Information Security
Security architect job in Aliso Viejo, CA
Are you a hands-on security leader ready to make a measurable impact in a mission-driven organization? We're looking for a Director of Information Security to lead and scale our security operations, incident response, and engineering efforts. In this role, you'll oversee our security ecosystem - from real-time monitoring to proactive threat hunting - and help shape the future of enterprise security at a growing company.
This is a highly collaborative position where you'll work cross-functionally with teams across the business to protect our information assets, infrastructure, and services - especially within a SaaS and life sciences environment.
What will you do?
Shape and drive the enterprise security operations strategy in alignment with broader company goals.
Serve as a trusted advisor to senior leadership on all things security.
Manage our Security Operations Center (SOC), ensuring rapid incident detection, triage, and response.
Oversee threat intelligence, vulnerability management, and operational risk mitigation initiatives.
Partner with IT and engineering teams to deploy, tune, and optimize tools like SIEM, SOAR, EDR, and DLP.
Implement automation and integrations that improve speed and efficiency.
Lead cyber incident response efforts and continuously test and improve our disaster recovery and response plans.
Coordinate cross-functional teams (e.g., Legal, HR, Communications) during major security events.
Lead, mentor, and grow a high-performing team of security and infrastructure professionals.
Support the development of a resilient, inclusive, and learning-driven culture across the department.
Align programs with regulatory standards (HIPAA, SOX, GDPR, PCI-DSS) and frameworks (NIST, MITRE ATT&CK).
Support audits and ensure documentation is ready and accurate.
How will you get there?
Bachelor's degree in Computer Science, Information Security, or related field (Master's a plus).
12+ years of relevant experience, including 4+ years leading teams in complex enterprise environments.
Hands-on expertise in SOC management, incident response, and threat intelligence.
Experience in the Medical Device, Life Sciences, or highly regulated industries preferred.
Professional certifications such as CISSP, CISM, GIAC, or CEH.
Proficiency with security tools including SIEM, EDR, SOAR, IDS/IPS, and vulnerability management platforms.
Strong knowledge of cloud (AWS, Azure, GCP), Windows/Linux systems, and network protocols.
Familiarity with security frameworks and standards (NIST, MITRE, ISO 27001).
Proven ability to build, lead, and retain high-performing technical teams.
A proactive, solutions-oriented mindset with excellent communication and collaboration skills.
#GKOSUS
Auto-ApplyInformation Security & Compliance, Manager (1 Year Contract)
Security architect job in Palo Alto, CA
Job Description
About us:
Lucence is a pioneering precision oncology company with a bold vision: a world where cancer is defeated through early detection and timely treatment. Our cutting-edge liquid biopsy tests use advanced molecular profiling to guide personalized cancer therapies, transforming how cancer is diagnosed and treated. At Lucence, we are shaping the future of precision medicine by capturing both genetic and cellular data from a single blood draw, bringing us closer to our mission of overcoming cancer.
We are looking for an Information Security & Compliance Manager to lead Lucence's SOC 2 compliance programmes. You will own our internal controls, audits, and security governance frameworks, ensuring the company meets the standards required for global diagnostics operations.
Key Responsibilities
Compliance Ownership
Own SOC 2 Type I/II, and build on HIPAA and cybersecurity certification roadmaps. Maintain documentation, evidence repositories, and ongoing readiness.
Internal Controls & Policies
Build, refine, and enforce security policies, risk registers, and access-control processes.
Audit Management
Partner with external auditors, coordinate internal contributors, drive remediation plans, and ensure timely closure of findings.
Vendor & Data Protection Reviews
Conduct security due diligence for vendors, manage DPAs, and ensure data-flow compliance for global partners.
Security Governance
Implement quarterly control testing, internal audits, DR/BCP drills, and continuous monitoring of compliance gaps.
Cross-Functional Partnering
Work closely with external vendors, Informatics, IT, Lab Ops, and Commercial teams to embed security into product and operational workflows.
Preferred Qualifications
Experience owning SOC 2 or ISO audit cycles end-to-end.
Familiarity with cloud environments (AWS/Azure/GCP) and modern security tooling.
Attention to detail to improve policies, controls, and audit documentation.
Certifications: ISO Lead Auditor, CISA, CISSP, or equivalent.
Information Security Manager
Security architect job in San Francisco, CA
ABOUT THE ROLE
You'll be our first dedicated security leader, owning the technical execution of our security and compliance program. You'll drive SOC 2 and PCI DSS compliance, manage our vulnerability program, and build security capabilities that enable our engineering teams to move fast while staying secure. This is a hands-on role-you'll design controls, write policies, respond to incidents, and work directly with auditors.
This is initially an individual contributor role with high impact and visibility. As our security program matures, you'll have the opportunity to build and lead a security team.
IN THIS ROLE, YOU WILL
Own Compliance
Lead SOC 2 Type II and PCI DSS programs through successful audit
Design and implement security controls without blocking velocity
Serve as primary technical contact for external auditors and assessors
Manage third-party vendor security assessments and ongoing monitoring
Build automated evidence collection and continuous compliance monitoring
Report security metrics and program status to executive leadership
Manage Security Operations
Establish vulnerability management program with defined SLAs and remediation workflows
Own end-to-end vulnerability management: identify, assess, prioritize, and drive remediation to completion across infrastructure and applications
Manage external penetration testing program with third-party vendors, including scoping, assessment review, and remediation tracking
Perform internal penetration testing and security assessments of applications, APIs, and infrastructure
Build SIEM detection rules, security dashboards, and alert triage processes
Develop and test incident response runbooks
Conduct threat modeling for critical systems and architectural changes
Lead security assessments of new technologies and third-party integrations
Enable & Collaborate
Partner with platform engineering to implement security roadmap: AWS landing zone design, PAM/JIT workflows, account segmentation, disaster recovery testing
Enforce enterprise security controls (SSO, secrets management, RBAC)
Build and deliver security awareness training program for all employees
Develop and maintain security policies, standards, and procedures
Translate compliance requirements into actionable engineering tasks and drive completion
YOU HAVE
Security & Compliance:
5+ years in information security, with 2+ years in fintech or highly regulated industry
CISSP certification (or actively pursuing - must obtain within 12 months of hire)
Hands-on experience leading SOC 2 and PCI DSS audits from start to finish
Strong incident response background-you've led real security incidents
Experience with vulnerability management platforms (Wiz, Snyk, Tenable)
Technical Skills:
Solid understanding of AWS security: IAM, Security Hub, GuardDuty, CloudTrail, KMS
Experience with SIEM platforms (Splunk, Datadog, Elastic)-you can write detection rules and build dashboards
Hands-on experience with vulnerability assessment and penetration testing tools (Burp Suite, Nessus, Qualys, or similar)
Ability to read code (Ruby, JavaScript, Python) and assess security implications
Knowledge of web application security, API security, and OWASP Top 10
Understanding of access control patterns (PAM, SSO, RBAC, least privilege)
Core Competencies:
Strong communication-you can explain risks to engineers and executives alike
Pragmatic risk management in fast-paced environments
Self-starter who builds programs from scratch
Collaborative mindset-security as enabler, not blocker
Ability to drive remediation to completion across teams
NICE TO HAVE
Additional certifications (CISM, CISA, CCSP, CEH, OSCP, CRISC)
Experience managing WAF deployments (Palo Alto, Cloudflare, AWS WAF)
Infrastructure-as-code experience (Pulumi, Terraform)
Kubernetes security knowledge
SOAR platform experience
DevSecOps or security automation background
Scripting skills (Python, Bash) for security tooling and automation
Kikoff: A FinTech Unicorn Powering Financial Progress with AI
At Kikoff, our mission is to provide radically affordable financial tools to help consumers achieve financial security. We're a profitable, high growth FinTech unicorn serving millions of people, many of whom are building credit or navigating life paycheck to paycheck. With innovative technology and AI, we simplify credit building, reduce debt, and expand access to financial opportunities to those who need them the most. Founded in 2019, Kikoff is headquartered in San Francisco and backed by top-tier VC investors and NBA star Stephen Curry.
Why Kikoff:
This is a consumer fintech startup, and you will be working with serial entrepreneurs who have built strong consumer brands and innovative products. We value extreme ownership, clear communication, a strong sense of craftsmanship, and the desire to create lasting work and work relationships. Yes, you can build an exciting business AND have real-life real-customer impact.
🏥 Medical, dental, and vision coverage - Kikoff covers the full cost of health insurance for the employee!
📈 Meaningful equity in the form of RSU's
🏝 Flexible vacation policy to help you recharge
💰 Competitive pay based on experience consisting of base + equity + benefits
Location: Hybrid, 3 days onsite in San Francisco, CA.
Visa sponsorship available: Kikoff is willing to provide sponsorship for H1-B visas and U.S. green cards for exceptional talent.
Equal Employment Opportunity Statement
Kikoff Inc. is an equal opportunity employer. We are committed to complying with all federal, state, and local laws providing equal employment opportunities and considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
Please reference the following for more information.
If you need reasonable accommodation for a job opening please connect with us at ***************** and describe the specific accommodation requested for a disability-related limitation. Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process.
San Francisco Fair Chance Ordinance: Pursuant to the San Francisco Fair Chance Ordinance, Kikoff will consider for employment qualified applicants with arrest and conviction records.
Auto-ApplyManager, Information Security - Detection Engineering
Security architect job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. This role may be remote or hybrid. At LinkedIn, hybrid roles are performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. Remote roles are performed from the designated home work location upon time of hire, and any changes to this home work location requires a review of remote status and approval.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Engineering Manager to lead the Detection Engineering team in the US and to be an integral part of our Information Security organization. The Detection Engineering team is responsible for developing and maintaining threat detection capabilities, security monitoring systems, and detection rules to protect our infrastructure, applications, and, most importantly, our members. This is a key role in supporting and growing our security detection and monitoring capabilities.
Responsibilities:
Leadership and Team Management
+ Lead and manage the detection engineering team, including hiring, training, and mentoring team members.
+ Develop and maintain detection engineering policies, procedures, infrastructure, and guidelines.
+ Coordinate and oversee all activities of the detection engineering team during threat detection development and implementation.
Detection Development and Management
+ Serve as the primary point of contact for all threat detection development and enhancement initiatives.
+ Ensure timely development, testing, and deployment of detection rules and monitoring capabilities.
+ Conduct post-deployment analysis and create detailed reports on detection effectiveness with KPIs, including tuning recommendations and optimization strategies.
Communication and Coordination
+ Communicate detection development status, updates, metrics and reporting, and capabilities to senior management, stakeholders, and security teams regularly.
+ Coordinate with internal and external teams, including security operations, defense infrastructure, incident response, and product engineering teams to develop and maintain effective detection capabilities.
+ Develop and maintain an effective detection engineering communication plan.
Continuous Improvement
+ Continuously evaluate and improve detection engineering processes, tools, and capabilities.
+ Conduct and report on regular detection testing and validation exercises to test and refine detection rules and monitoring systems.
+ Stay current with emerging threats, attack techniques, and detection technologies to enhance the detection engineering program.
Reporting and Documentation
+ Maintain comprehensive documentation of all detection rules, including development rationale, testing results, and performance metrics.
+ Prepare and present detection engineering reports and metrics to senior leadership and stakeholders.
+ Ensure compliance with regulatory requirements and industry standards related to threat detection and monitoring.
Training and Awareness
+ Develop and deliver detection engineering training programs for team members and other relevant personnel.
+ Promote security detection awareness and best practices across the organization.
+ Ensure the detection engineering team is up-to-date with the latest tools, techniques, and procedures.
Budget and Resource Management
+ Manage the detection engineering budget and allocate resources effectively.
+ Evaluate and recommend tools, technologies, and services to enhance the detection engineering program.
+ Ensure the team has the necessary resources and support to perform their duties effectively.
Basic Qualifications:
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related technical discipline, or equivalent practical experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 7+ years of experience in cybersecurity, with a focus on detection engineering, security monitoring, threat intelligence, incident response, or related security roles.
+ Experience leading or managing a cybersecurity, incident response, or detection engineering team.
+ Experience in cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK, OCSF).
+ Experience in detection engineering tools and technologies (e.g., Query Languages, CI/CD, YARA, Sigma rules, threat intelligence platforms).
+ Experience with threat analysis, detection rule development, automation engineering, and security monitoring optimization.
+ Project management experience with managing budgets and resources.
Preferred Qualifications:
+ Master's degree in Cybersecurity, Information Assurance, or a related field.
+ 10+ years of experience in cybersecurity, with significant experience in detection engineering, threat intelligence, or incident response.
+ 3+ years of management experience in building small to medium-sized teams, demonstrating growth and a track record of successful deliveries.
+ Ability to work under pressure and manage multiple detection development projects simultaneously as well as managing an oncall team.
+ Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, SANS).
+ Experience in developing and delivering detection engineering training and awareness programs.
+ Strong proficiency in Kusto Query Language (KQL) and SQL.
+ Proficiency in programming or scripting languages (e.g., Python, Go, etc.) for automating detection development and testing processes.
+ Experience with cloud security and detection engineering in cloud environments especially Azure.
+ Knowledge of advanced threat detection techniques, including threat hunting and behavioral analysis as well as applied threat intelligence.
+ Familiarity with detection engineering frameworks and best practices (e.g., Sigma, YARA, STIX/TAXII, OCSF).
+ Strong communication skills, both written and verbal, with the ability to convey complex technical information to non-technical stakeholders.
Suggested Skills :
+ Security Information and Event Management (SIEM)
+ Query languages (KQL, SPL, SQL, Elastic, etc.)
+ Detection Rule Development (YARA, Sigma)
+ Scripting and Automation (e.g., Python, PowerShell, SQL)
+ Threat Intelligence Integration
+ Cloud Security (e.g., Azure, GCP)
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
**Equal Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
**Global Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
Manager, Information Security Compliance
Security architect job in Santa Monica, CA
Department Description At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company (TWDC) is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance these exciting experiences.
The Enterprise Technology mission is to deliver technological solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence.
The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to:
* Secure the Magic by protecting information systems and platforms.
* Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests.
* Strengthen the business through optimizing execution, application, and technology used to protect the Company.
* Innovate by investing in core capabilities to enhance operational efficiency.
Team Description:
Global Information Security (GIS) supports all of Disney's business segments, including Disney Entertainment & ESPN (DE&E). DE&E encompasses the operations of Disney's streaming services-Disney+, Hulu, ESPN+, Disney+ Hotstar, Star, and the upcoming Venu Sports streaming service-as well as Disney's broadcast and cable networks, including ABC, ESPN, FX, Disney Channels, and National Geographic. DE&E sits at the intersection of entertainment, sports, and technology, striving to connect viewers with beloved stories while advancing the streaming industry with consumer-first innovations. Security professionals supporting DE&E work with industry-leading technologies to deliver world-class, highly secure services to customers.
What You'll Do:
* Independent audit support for:
* SOX 404 ITGCs
* PII
* PCI
* ISPS
* Collaborate with Enterprise Controls and Compliance (ECC) to scope systems and respective ITGCs.
* Perform control health checks and remediation testing procedures to address issues identified via audit assessments, access control reviews, internal or external audits and/or other assessments.
* Develop and lead the Control Assurance Programs (ISPS and SOX).
* Lead Audit Readiness efforts to ensure proper system scoping and respective ITGCs, control validations and timely program onboarding.
* Participate in audit walkthrough meetings to help establish internal testing procedures to gain operational comfort in the design of the Company's automated controls.
* This includes control self-evaluations of new controls or processes that impact the effectiveness of an existing control.
* Perform impact analysis and risk assessment on deficiency findings and documentation associated with the assessment.
* Work with management and internal audit on maintaining the master Risk and Control Matrix over the systems material to Disney Entertainment and ESPN (Broadcast TV and Streaming - Hulu, Disney+, ESPN+, STAR+ products)
* Ensure for timely management response of audit findings into our corporate SOCD/SAD.
* Oversee ISPS Management Audit coordination and open action plans.
* Provide consultancy to Development leads to identify and implement automation and efficiency opportunities to meet governance and compliance demands.
* Management of GRC workflows around coordination of certifications and attestations.
* Partner with leadership to support the PCI-DSS compliance program.
* Develop training materials, coordinate training sessions, and monitor compliance with training requirements.
* Oversee and manage a team of compliance analysts, ensuring day-to-day operations run smoothly and efficiently.
* Assign tasks and projects to team members based on priorities, deadlines, and individual strengths.
* Provide executive level updates on Compliance programs
Must Haves (Years of Experience, languages, programs, tools, etc.):
* Minimum of 8 years of related work experience, with 3 in management roles
* IT SOX experience and proven experience in supporting IT audit/compliance functions
* Experience in managing people
* Thorough understanding of SOX ITGC and ICFR 404 standards and audit objectives
* Interpersonal skills with the ability to work with teams cross-functionally
* Strong verbal and written communication skills and ability to effectively communicate to technical and non-technical audiences, including developers and tech operators
* Detail-oriented but able to understand the big picture. Highly organized and efficient
* Ability to navigate through ambiguity, manage and coordinate multiple project assignments simultaneously in a fast-paced, deadline-driven environment, accepting ownership and accountability of the process and deliver on commitments
* Experience with cloud-based services, specifically AWS
Nice To Haves (see above):
* Experience and knowledge of NIST framework, ISO 27001, K-ISMS, GDPR
* Experience working with companies that have a heavy microservice architecture
Education:
Bachelor's degree in Computer Science, CPA license, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience
The hiring range for this position in Glendale, CA and Santa Monica, CA is $141,900 to $190,300 per year and in New York, NY is $148,700 to $199,400 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
About The Walt Disney Company (Corporate):
At Disney Corporate you can see how the businesses behind the Company's powerful brands come together to create the most innovative, far-reaching and admired entertainment company in the world. As a member of a corporate team, you'll work with world-class leaders driving the strategies that keep The Walt Disney Company at the leading edge of entertainment. See and be seen by other innovative thinkers as you enable the greatest storytellers in the world to create memories for millions of families around the globe.
About The Walt Disney Company:
The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise that includes three core business segments: Disney Entertainment, ESPN, and Disney Experiences. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney's stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished.
This position is with Disney Worldwide Services, Inc., which is part of a business we call The Walt Disney Company (Corporate).
Disney Worldwide Services, Inc. is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, religion, color, sex, sexual orientation, gender, gender identity, gender expression, national origin, ancestry, age, marital status, military or veteran status, medical condition, genetic information or disability, or any other basis prohibited by federal, state or local law. Disney champions a business environment where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a constantly evolving world.
Apply Now Apply Later
Current Employees Apply via My Disney Career
Explore Location
Manager, Information Security, Productions
Security architect job in Culver City, CA
The Information Security organization at Sony Pictures Entertainment is responsible for protecting our content, systems, and data from being stolen, damaged, or destroyed. To do so, we are continuously improving our tools, capabilities, and processes to stay ahead of evolving threats.
The Manager, Information Security Productions is accountable for operationalizing the Information Security Productions program across all SPE U.S. productions. This includes driving consistent implementation of approved security standards, tools, and controls; ensuring data-driven visibility into production security risk; and supporting compliance and readiness reporting to leadership. Success in this role requires strong cross-functional collaboration across Information Security, IT, S3, and production teams to embed security into creative workflows without friction, while ensuring protection of SPE's most valuable assets-our stories and intellectual property.
This role will also ensure program consistency with regional and global counterparts, contribute to automation and standardization of key controls, and support ongoing improvement of information security for productions practices across the production lifecycle.
Key indicators of success in this role will be:
Business leaders have near real-time visibility into production information security risk using meaningful, actionable metrics that drive timely and effective decision-making.
Consistent application of approved tools, workflows, and controls across productions, ensuring compliance and readiness reporting aligns with studio KPIs.
Production teams trust SPE to provide a secure, highly available, and easy-to-use digital production environment that safeguards our content and data.
Information Security, Physical Security, and IT operate as unified partners to protect SPE productions from concept to archive.
Within this organization, we value learning, agility, and collaboration. The Manager, Information Security Productions (CC, US) will be a key contributor to Sony Pictures Entertainment's goal of being the most trusted studio in the industry.
Responsibilities
Provide visibility and actionable insight into Information Security risk across active U.S. productions.
Monitor, analyze, and report on production security posture and key control performance metrics for each production.
Partner with global InfoSec, Risk, Threat Intelligence, Incident Response, Training, and Governance teams to align production needs with enterprise programs.
Prepare and present dashboards and reports on security trends, compliance status, and improvement opportunities.
Support the development of production-specific metrics and KPIs to measure control effectiveness.
With IT and Physical Security, maintain security controls in place for productions to most effectively meet our business goals.
Operationalize the Production Information Security Program across U.S. productions.
Ensure consistent implementation of approved security tools, policies, and workflows within productions.
Coordinate adoption of automated controls with productions, such as provisioning, watermarking, and access telemetry.
Support the standardization and scalability of production security practices across production titles and business units.
Ensure and track production security culture, awareness, and response readiness.
Amplify the reach of security training and awareness initiatives by coordinating rollout to productions, ensuring consistent messaging and participation tracking.
Gather feedback from productions to help refine information security for productions training and awareness efforts.
Partner with Incident Response to ensure clear communications, timely follow-up, and closure of corrective actions.
Track cultural and operational readiness indicators (e.g., onboarding rates, reporting engagement, post-incident improvements) to measure program maturity and continuous improvement.
Qualifications
5+ Years of experience in Information Security, Information Technology or a related field
5+ Years of experience in an organization directly involved in movie, television and/or other entertainment production, or equivalent educational experience.
Bachelor's degree preferred
Strong understanding of the technologies, tools and processes used in production of movies and/or television.
Knowledge of Information Security frameworks, standards and best practices and their relevance to business success
Specific knowledge of processes, tools and practices used to maintain confidentiality in the context of movie and television productions.
Ability to develop and maintain meaningful metrics to track program and process effectiveness.
Strong planning and analytical skills
Strong communications skills
The anticipated base salary for this position is $115,000-$150,000. This role may also qualify for annual incentive and/or comprehensive benefits. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location of the position.
Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics.
SPE will consider qualified applicants with arrest or conviction records in accordance with applicable law.
To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.
Auto-ApplyManager, Information Security Compliance
Security architect job in Glendale, CA
Department Description
At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company (TWDC) is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance these exciting experiences.
The Enterprise Technology mission is to deliver technological solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence.
The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to:
Secure the Magic by protecting information systems and platforms.
Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests.
Strengthen the business through optimizing execution, application, and technology used to protect the Company.
Innovate by investing in core capabilities to enhance operational efficiency.
Team Description:
Global Information Security (GIS) supports all of Disney's business segments, including Disney Entertainment & ESPN (DE&E). DE&E encompasses the operations of Disney's streaming services-Disney+, Hulu, ESPN+, Disney+ Hotstar, Star, and the upcoming Venu Sports streaming service-as well as Disney's broadcast and cable networks, including ABC, ESPN, FX, Disney Channels, and National Geographic. DE&E sits at the intersection of entertainment, sports, and technology, striving to connect viewers with beloved stories while advancing the streaming industry with consumer-first innovations. Security professionals supporting DE&E work with industry-leading technologies to deliver world-class, highly secure services to customers.
What You'll Do:
Independent audit support for:
SOX 404 ITGCs
PII
PCI
ISPS
Collaborate with Enterprise Controls and Compliance (ECC) to scope systems and respective ITGCs.
Perform control health checks and remediation testing procedures to address issues identified via audit assessments, access control reviews, internal or external audits and/or other assessments.
Develop and lead the Control Assurance Programs (ISPS and SOX).
Lead Audit Readiness efforts to ensure proper system scoping and respective ITGCs, control validations and timely program onboarding.
Participate in audit walkthrough meetings to help establish internal testing procedures to gain operational comfort in the design of the Company's automated controls.
This includes control self-evaluations of new controls or processes that impact the effectiveness of an existing control.
Perform impact analysis and risk assessment on deficiency findings and documentation associated with the assessment.
Work with management and internal audit on maintaining the master Risk and Control Matrix over the systems material to Disney Entertainment and ESPN (Broadcast TV and Streaming - Hulu, Disney+, ESPN+, STAR+ products)
Ensure for timely management response of audit findings into our corporate SOCD/SAD.
Oversee ISPS Management Audit coordination and open action plans.
Provide consultancy to Development leads to identify and implement automation and efficiency opportunities to meet governance and compliance demands.
Management of GRC workflows around coordination of certifications and attestations.
Partner with leadership to support the PCI-DSS compliance program.
Develop training materials, coordinate training sessions, and monitor compliance with training requirements.
Oversee and manage a team of compliance analysts, ensuring day-to-day operations run smoothly and efficiently.
Assign tasks and projects to team members based on priorities, deadlines, and individual strengths.
Provide executive level updates on Compliance programs
Must Haves (Years of Experience, languages, programs, tools, etc.):
Minimum of 8 years of related work experience, with 3 in management roles
IT SOX experience and proven experience in supporting IT audit/compliance functions
Experience in managing people
Thorough understanding of SOX ITGC and ICFR 404 standards and audit objectives
Interpersonal skills with the ability to work with teams cross-functionally
Strong verbal and written communication skills and ability to effectively communicate to technical and non-technical audiences, including developers and tech operators
Detail-oriented but able to understand the big picture. Highly organized and efficient
Ability to navigate through ambiguity, manage and coordinate multiple project assignments simultaneously in a fast-paced, deadline-driven environment, accepting ownership and accountability of the process and deliver on commitments
Experience with cloud-based services, specifically AWS
Nice To Haves (see above):
Experience and knowledge of NIST framework, ISO 27001, K-ISMS, GDPR
Experience working with companies that have a heavy microservice architecture
Education:
Bachelor's degree in Computer Science, CPA license, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience
The hiring range for this position in Glendale, CA and Santa Monica, CA is $141,900 to $190,300 per year and in New York, NY is $148,700 to $199,400 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
Job Posting Segment:
Enterprise Technology
Job Posting Primary Business:
Corporate Global Information Security
Primary Job Posting Category:
Security Governance
Employment Type:
Full time
Primary City, State, Region, Postal Code:
Glendale, CA, USA
Alternate City, State, Region, Postal Code:
USA - CA - 2450 Broadway, USA - NY - 7 Hudson Square
Date Posted:
2025-11-21
Auto-ApplyDirector, Information Security & Compliance
Security architect job in Los Angeles, CA
Loyola Marymount University (LMU) is seeking an experienced leader to serve as Director of Information Security & Compliance within our Information Technology Services (ITS) team. This role offers a strategic opportunity to shape and safeguard the university's digital environment, drive proactive risk management, and embed a culture of security across the organization. Reporting directly to the CIO/VP of IT, the Director will architect and manage a best-in-class information security and compliance program that supports LMU's mission of learning, holistic education, service, and justice.
Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will serve as the University's Cybersecurity leader. The Director will create a modern and effective Information Security and Compliance Program that will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy.
Position Specific Responsibilities/Accountabilities
* Enhance Security Posture: Develop and implement a comprehensive cybersecurity program that significantly reduces risks and vulnerabilities across the university's digital landscape.
* Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements.
* Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance.
* Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats.
* Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents.
* Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for cybersecurity.
* Training and Awareness: Provide comprehensive training and guidance to staff on cybersecurity best practices, resulting in a well-informed and vigilant workforce.
* Monitoring and Reporting: Continuously monitor and report on the effectiveness of the cybersecurity program, providing clear metrics and insights that demonstrate progress and areas for improvement.
* Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals.
* Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services.
* Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements.
* Perform other related duties.
Loyola Marymount University Expectations
Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service.
Requisite Qualifications
* Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity.
* Seven years of experience in information security, with at least three years in a management role.
* Experience in developing and implementing technology policy, especially in a University environment is desirable.
* Professional certifications such as CISSP, CISM, or CISA are highly desirable.
* Experience in developing and implementing technology policy, preferably in a University environment.\
* Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS).
* Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required.
* Excellent analytical, problem-solving, and decision-making skills.
* Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders.
* Demonstrated ability to lead and manage a team of security professionals.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position.
#HERC# #HEJ#
Staff Regular
Salary range
$146,800.00 - $205,500.00 Salary commensurate with education and experience.
Please note that this position is not eligible for visa sponsorship now or in the future.
Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
Auto-ApplySystems Security Engineer II
Security architect job in Huntington Beach, CA
The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response.
ESSENTIAL JOB FUNCTIONS
• Monitor network traffic for anomalies, investigate alerts and respond to security incidents.
• Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices.
• Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices.
• Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations
• Install and configure Network Equipment (Switches, Firewalls, and other networking hardware)
• Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs.
• Possess a solid understanding of Windows Server services and roles including installation and configuration
• Create certificates for network devices and servers that have a web management capability
• A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues
• Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls
• Effectively use PowerShell to automate and standardize administrative tasks
• Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances
• Manage our virtualized server environment managing, creating VM's and patching the VMware environment.
• Strong understanding of Virtual Switches, Port Groups (Distributed and Standard)
• Manage the Active Backup for Business on Synology and other advanced Synology administration features
• Maintain and monitor Backup solutions.
• Manage our users email accounts using the cloud service M365 from Microsoft
• Responsible for creating and maintaining server and network documentation to include tasks and procedures
• Proactively monitor our network using a variety of tools to help identify potential network and server issues
• Assist in patching our entire infrastructure when needed using a variety of tools
• Maintains strong technical abilities, knowledge of new and changing technologies
• Prepare for emergencies by creating and/or updating action plans
• Jumping into time-sensitive projects wherever needed
• Showing flexibility and a willingness to learn
• Maintain healthy communication with IT Staff, IT Customers and Vendors
• Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables.
• Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization.
• Execute each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follow all department quality standards/criteria. Raise concerns and issues to immediate manager.
• Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service).
• Understands department's key performance indicators and contributes to achieve these goals both individually and as a team.
• Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization.
• Executes each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follows all department quality standards/criteria. Raises concerns and issues to management.
• Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team.
• Other duties as needed or required.
ADDITIONAL RESPONSIBILITIES
• Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution
• Occasional travel to various Cambro locations domestically and internationally as required (15%)
• May occasionally guide less experienced associates to help with technical projects
• Some travel may be required.
REQUIRED QUALIFICATIONS
The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
• Bachelor's degree (B.A.) from a four-year accredited college or university.
• 5-10 years of experience in IT security, network, administration, and support roles.
• Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
• Ability to adapt and adjust plans to meet changing needs.
• Proficient in Microsoft Office Suite
• Experience with Fortinet solutions, EDR, email security solutions
• Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation.
• Strong knowledge of DNS records including reverse zones and maintaining DNS records
• Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches
• Solid understanding of routing protocols, static routes and ARP cache
• Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances)
• Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner
• Strong Windows administration skills including Active Directory/GPO's and security policies
• Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x
• Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures
• Must be able to follow instructions and procedures and ask questions if something is unclear
• Excellent documentation skills including ability to create network drawings
• Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure
• Strong customer service and communication skills
• Excellent organizational skills and strong sense of urgency
• Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks
• Great accuracy and attention to detail
PREFERRED QUALIFICATIONS
• Experience in Business Continuity and disaster recovery is a plus
• Knowledge of Ruckus Access Points and Switches
• Knowledge of IBMi
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs.
Driving cars and other IT equipment
Working around equipment and machinery
Exposure to excessive noise
Exposure to dust, gas, fumes or chemicals
Working at heights
Use of special visual or auditory protective equipment
Walking on uneven ground
PPE Requirements
Safety glasses
Steel-toe slip-resistant shoes - When in production area
Hearing protection (e.g. ear plugs, ear muffs) - When in production area
Face covering (mask) in accordance with company policy.
Hardhat/bump camp
IT Application
COMPENSATION RANGE:
$97,000- $120,000
Salary may vary based on experience.
CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
Auto-ApplyManager, Information Security - Detection Engineering
Security architect job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
Job Description
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. This role may be remote or hybrid. At LinkedIn, hybrid roles are performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. Remote roles are performed from the designated home work location upon time of hire, and any changes to this home work location requires a review of remote status and approval.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Engineering Manager to lead the Detection Engineering team in the US and to be an integral part of our Information Security organization. The Detection Engineering team is responsible for developing and maintaining threat detection capabilities, security monitoring systems, and detection rules to protect our infrastructure, applications, and, most importantly, our members. This is a key role in supporting and growing our security detection and monitoring capabilities.
Responsibilities:
Leadership and Team Management
* Lead and manage the detection engineering team, including hiring, training, and mentoring team members.
* Develop and maintain detection engineering policies, procedures, infrastructure, and guidelines.
* Coordinate and oversee all activities of the detection engineering team during threat detection development and implementation.
Detection Development and Management
* Serve as the primary point of contact for all threat detection development and enhancement initiatives.
* Ensure timely development, testing, and deployment of detection rules and monitoring capabilities.
* Conduct post-deployment analysis and create detailed reports on detection effectiveness with KPIs, including tuning recommendations and optimization strategies.
Communication and Coordination
* Communicate detection development status, updates, metrics and reporting, and capabilities to senior management, stakeholders, and security teams regularly.
* Coordinate with internal and external teams, including security operations, defense infrastructure, incident response, and product engineering teams to develop and maintain effective detection capabilities.
* Develop and maintain an effective detection engineering communication plan.
Continuous Improvement
* Continuously evaluate and improve detection engineering processes, tools, and capabilities.
* Conduct and report on regular detection testing and validation exercises to test and refine detection rules and monitoring systems.
* Stay current with emerging threats, attack techniques, and detection technologies to enhance the detection engineering program.
Reporting and Documentation
* Maintain comprehensive documentation of all detection rules, including development rationale, testing results, and performance metrics.
* Prepare and present detection engineering reports and metrics to senior leadership and stakeholders.
* Ensure compliance with regulatory requirements and industry standards related to threat detection and monitoring.
Training and Awareness
* Develop and deliver detection engineering training programs for team members and other relevant personnel.
* Promote security detection awareness and best practices across the organization.
* Ensure the detection engineering team is up-to-date with the latest tools, techniques, and procedures.
Budget and Resource Management
* Manage the detection engineering budget and allocate resources effectively.
* Evaluate and recommend tools, technologies, and services to enhance the detection engineering program.
* Ensure the team has the necessary resources and support to perform their duties effectively.
Qualifications
Basic Qualifications:
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related technical discipline, or equivalent practical experience.
* 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
* 7+ years of experience in cybersecurity, with a focus on detection engineering, security monitoring, threat intelligence, incident response, or related security roles.
* Experience leading or managing a cybersecurity, incident response, or detection engineering team.
* Experience in cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK, OCSF).
* Experience in detection engineering tools and technologies (e.g., Query Languages, CI/CD, YARA, Sigma rules, threat intelligence platforms).
* Experience with threat analysis, detection rule development, automation engineering, and security monitoring optimization.
* Project management experience with managing budgets and resources.
Preferred Qualifications:
* Master's degree in Cybersecurity, Information Assurance, or a related field.
* 10+ years of experience in cybersecurity, with significant experience in detection engineering, threat intelligence, or incident response.
* 3+ years of management experience in building small to medium-sized teams, demonstrating growth and a track record of successful deliveries.
* Ability to work under pressure and manage multiple detection development projects simultaneously as well as managing an oncall team.
* Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, SANS).
* Experience in developing and delivering detection engineering training and awareness programs.
* Strong proficiency in Kusto Query Language (KQL) and SQL.
* Proficiency in programming or scripting languages (e.g., Python, Go, etc.) for automating detection development and testing processes.
* Experience with cloud security and detection engineering in cloud environments especially Azure.
* Knowledge of advanced threat detection techniques, including threat hunting and behavioral analysis as well as applied threat intelligence.
* Familiarity with detection engineering frameworks and best practices (e.g., Sigma, YARA, STIX/TAXII, OCSF).
* Strong communication skills, both written and verbal, with the ability to convey complex technical information to non-technical stakeholders.
Suggested Skills :
* Security Information and Event Management (SIEM)
* Query languages (KQL, SPL, SQL, Elastic, etc.)
* Detection Rule Development (YARA, Sigma)
* Scripting and Automation (e.g., Python, PowerShell, SQL)
* Threat Intelligence Integration
* Cloud Security (e.g., Azure, GCP)
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
Additional Information
Equal Opportunity Statement
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
* Documents in alternate formats or read aloud to you
* Having interviews in an accessible location
* Being accompanied by a service dog
* Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
San Francisco Fair Chance Ordinance
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
Pay Transparency Policy Statement
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
Global Data Privacy Notice for Job Candidates
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************