SAP Finance Architect, AWS Fintech
Security architect job in Seattle, WA
We are seeking an experienced and highly skilled SAP Finance Costing expert to join our team. The ideal candidate will have deep expertise in SAP Product Costing, with a strong understanding of end-to-end manufacturing and finance processes, including cost planning and actual costing. This role involves working closely with business stakeholders, IT teams, and implementation partners to design, configure, and support SAP solutions that drive financial transparency and operational efficiency.
Key job responsibilities
* Design, configuration, and implementation of SAP Product Costing solutions.
* Analyze business requirements related to cost planning, cost estimation, standard costing, actual costing (Material Ledger), and variance analysis.
* Support month-end and year-end closing activities related to product costing and inventory valuation.
* Collaborate with cross-functional teams including Finance, Manufacturing, and Supply Chain to ensure integrated business processes.
* Provide expert-level troubleshooting and issue resolution within the SAP CO-PC module.
* Drive process improvements and automation opportunities within the costing domain.
* Create functional specifications for custom developments and work with ABAP developers as needed.
* Lead and support testing efforts, including unit testing, integration testing, and user acceptance testing (UAT).
* Provide training, documentation, and support to key users and end-users.
* Stay updated with SAP best practices, S/4HANA innovations, and industry trends.
BASIC QUALIFICATIONS- 4+ years of design, implementation, or consulting in applications and infrastructures experience
- 4+ years of specific technology domain areas (e.g. software development, cloud computing, systems engineering, infrastructure, security, networking, data & analytics) experience
- 10+ years of IT development or implementation/consulting in the software or Internet industries experience
- SAP S/4HANA Experience
- SAP Finance Product Costing Experience
- SAP Finance Domain Experience
PREFERRED QUALIFICATIONS- Experience migrating or transforming legacy customer solutions to the cloud
- Experience working within software development or Internet-related industries
- Knowledge of AWS services
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit ********************************************************* for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Our compensation reflects the cost of labor across several US geographic markets. The base pay for this position ranges from $118,200/year in our lowest geographic market up to $204,300/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Amazon is a total compensation company. Dependent on the position offered, equity, sign-on payments, and other forms of compensation may be provided as part of a total compensation package, in addition to a full range of medical, financial, and/or other benefits. For more information, please visit ******************************************************** This position will remain posted until filled. Applicants should apply via our internal or external career site.
AWS + Microservices Architect
Security architect job in Bellevue, WA
Expertise in Microservice architecture & AWS solutions.
Strategy:
· Own solution design for multiple initiatives, works across domain to ensure cohesive solution, identify gaps in the architecture and solution design, and assess and define remediation efforts or mitigation options.
· Work toward practical solutions considering all teams, initiatives, and long-term outlook by implementing decisions improving quality, efficiency to achieve revenue, profitability and strategic goals for the organization.
· Connect business strategies to technology domains for delivery, maximizing well-defined structure of the clients business processes, products and capabilities.
Innovation and Leadership:
· Lead overall end-to-end solution design, ensure quality, consistency, and alignment of designs to the clients standards and technical strategies.
· Lead large cross-domain initiatives and apply technical standards to develop solution architecture, drive technical strategy and architectural tradeoff discussions.
· Demonstrate comprehensive understanding of how people, processes, and technology interact to perform the fundamental activities of the business in both current and future state and model these interactions to guide technology strategy to better achieve business outcomes.
· Works cross-functionally to understand the linkage between client's business goals, business architecture, and requirements frameworks.
· Compile, deliver, and promote end-to-end technology roadmaps that guide the evolution of infrastructure, products, and services by applying depth and breadth of expertise in multiple related subject areas.
· Mentors, team members on standard processes in area of expertise. Grasp and communicate big-picture enterprise-wide issues to team.
Technology and System:
· Compile, develop, and deliver architectural guardrails; influence stakeholders and ensure compliance with architectural guardrails within many technology domains that support the needs of products teams to efficiently launch products and services
--
Warm Regards!
Dheeraj Patel | US IT Recruiter
LinkedIn ID: - ****************************************************
Email: ********************************
“Together we can build a Better Tomorrow”
Hardware Architect - Information Security
Security architect job in Seattle, WA
Apple Information Security is responsible for protecting Apple's data in transit and at rest. Apple employees and partners are always moving information from one system to another, or storing it on a server or device. Our job is to make sure Apple's information doesn't fall into the wrong hands. We are looking for a self-motivated individual with an intuition for security who is not afraid to question assumptions. The ability to be results-driven and comfortable with dynamic requirements, as well as having excellent interpersonal and time management skills, are keys to success in this position. As a member of our team, you will have the opportunity to collaborate with multi-functional partners both internal and external to Apple to build innovative security products. You will support the development of embedded systems designed to enhance Apple's security posture. You will be challenged to provide forward-thinking solutions to problems and to be a good teammate under deadline constraints. Show us your talent in this challenging, fun, and exciting environment. It's what makes us Apple.
As a Hardware Architect in Apple Information Security, you will: * Own u0026 establish the vision for future generations of security hardware. * Translate security features into high-level HW/SW specifications and derive HW requirements to design a product. * Manage the program seeking to realize the vision - hardware design, development, manufacturing, and deployment. * Map the design concept to available components, developing a bill of materials for manufacturer(s). * Identify suitable components based on requirements. * Validate end-to-end functionality, performance and reliability. * Integrate feedback on current hardware into future designs. * Generate performance projections for future systems. * Research market benchmarks, including performance, cost, and scope of application. * Be challenged to work under pressure and with ambiguity. * Be adept at shifting directions and priorities. * Be detail-oriented and self-motivated. * Demonstrate excellence at multitasking, organizing, and prioritizing complex projects to meet deadlines. * Cultivate your network by meeting new colleagues from across the business.
MS in electrical or computer engineering, or equivalent work experience. Experience in system architecture development, including driver and firmware development. Schematic entry and management of design constraints for high-speed PCB layout using Cadence tools or similar. Exceptional HW/SW problem solving skills. Proven ability to ramp up quickly on new technologies. Experience using test u0026 measurement equipment. Working knowledge of power supply design fundamentals.
BS in electrical or computer engineering, or equivalent work experience. Minimum 8 years relevant industry work experience. Ability to comprehend and develop hardware specifications, component selections, block diagrams, and schematics. Experience leading architecture reviews and approving system specifications. Understanding of security architecture and threat models. Guiding architecture tradeoff decisions at an executive level. Familiarity with DFT, DFM, and DFR principles. Understanding of performance modeling, including power/performance budgeting u0026 simulation tools. Knowledge of hardware/software co-design and interface standards. Ability to create diagrams and make concise presentations to clearly present information to cross-functional teams. Experience in hardware abstraction u0026 firmware interface definition. Self-driven with the ability to work autonomously while managing multiple simultaneous work tracks. Proven leadership of complex system development from concept to production bring-up. Ability to thrive in a self-directed, fast-paced environment, that is highly collaborative and multi-functional. Strong written and presentation skills, able to communicate effectively with engineers and senior leaders. Ability to build and maintain strong internal and external collaborative relationships.
Security Architect
Security architect job in Great Falls, MT
Job Details Great Falls Office - Great Falls, MT HybridDescription
The role of the Security Architect at MDT is to ensure that security requirements necessary to protect MDT's mission, vision and business processes are adequately addressed. The Security Architect is responsible for designing and implementing comprehensive security solutions and strategies. This role serves as a key security and technical advisor and strategist, partnering with technology, development, and business teams to ensure secure-by-design solutions across the organization's technology landscape.
DUTIES & RESPONSIBILITIES
Design and implement security controls for cloud, on-premises, and hybrid environments (e.g., AWS, Azure, GCP).
Monitor and review cloud service provider security policies to help ensure compliance with organizational requirements.
Partner with Enterprise Architects and Development teams to ensure security best practices and principles are embedded in their workflows.
Conduct security assessments and risk analysis to identify vulnerabilities and propose mitigation strategies within the Zero Trust framework.
Design and implement Zero Trust principles and frameworks to enhance the security posture of our systems and networks.
Design and maintain robust CI/CD pipelines with integrated security checks to "shift security left," ensuring vulnerabilities are identified early in the development process.
Collaborate with cross-functional teams to define access policies, user authentication mechanisms, and secure connectivity across various environments.
Design and collaborate with cross-functional teams to deploy secure SSO solutions with identity providers (IdPs), directory services, and third-party applications for seamless and centralized authentication and authorization across multiple applications and systems.
Collaborate with stakeholders to understand business requirements and translate them into effective security controls and solutions.
Make recommendations to reduce risks.
Supports administration of the enterprise security infrastructure including, but not limited to, the systems supporting: network security monitoring, two-factor authentication, web application firewalls, vulnerability management, endpoint detection and response, data loss prevention, and enterprise logging.
Supports incident response processes.
Compiles metrics for leadership.
Assists in installing, implementing, and maintaining security software.
Maintains the availability, patching, and operational functionality of assigned security systems.
Evaluates new security tools, products, and solutions for applicability to security needs.
Makes recommendations regarding purchase of security products.
Ensures MDT's reputation is maintained internally and externally.
Ensures appropriate levels of security and confidentiality are always maintained.
Acts as a representative of MDT with business and professional organizations and external IT contacts.
Keeps management informed of area activities and any significant concerns.
Attends and participates in meetings as required.
Completes accurate tickets, reports, records, and other documentation as necessary.
Stay up to date with industry trends, emerging technologies, and security best practices to proactively identify potential threats and vulnerabilities.
Responsible for working with the security team and other departments to ensure work is flowing effectively and timely throughout the organization.
Assists in setting department and company standard practices and procedures.
Responsible for working with company vendors to ensure the delivery of products or services is successful.
Acts as a subject matter expert for co-workers and fosters a culture of continuous learning and cross-training.
Assigned to the on-call rotation to support security operations.
Stays informed of trends and changes in the information security field.
Completes special projects and research studies as required.
Keeps work area clean, secure, and well maintained
EDUCATION & EXPERIENCE REQUIREMENTS
Bachelor's degree in Computer Science or a related field, or an equivalent combination of training and experience in Computer Science.
Professional certifications such as CISSP, CISM, CCSK, or CCSP are highly desirable.
Ten years of experience as a Security Architect or similar role, with a focus on cloud security and Zero Trust architecture.
REQUIRED KNOWLEDGE
Strong knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud) and associated security controls.
Experience designing and implementing Zero Trust architectures, including network segmentation, secure access controls, and strong authentication mechanisms.
Experience with designing and implementing Secure Access Service Edge (SASE) and Software-Defined Wide Area Network (SD-WAN).
Experience with the design and integration of security into the SDLC by implementing secure coding standards, automated security testing (SAST, DAST), and vulnerability scanning.
In-depth understanding of SSO protocols and standards (e.g., SAML, OAuth, OpenID Connect) and their implementation.
Technical understanding of threat actor attack techniques.
Familiarity with security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO 27001, CIS Controls).
Excellent analytical and problem-solving skills, with the ability to assess complex security requirements and recommend appropriate solutions.
Effective communication and interpersonal skills to collaborate with cross-functional teams and communicate security concepts to non-technical stakeholders.
Self-motivated and ability to meet deadlines with minimal supervision.
Well organized and attentive to detail.
Strong leadership abilities.
Project management skills.
Ability to maintain confidentiality.
WORKING CONDITIONS
Special
No hazardous or significantly unpleasant conditions (such as in a typical office).
Additional hours, including on-call with Saturday/Sunday support, as required.
Long duration of computer workstation usage.
INTENT AND FUNCTION OF S
s assist organizations in ensuring that the hiring process is fairly administered and that qualified employees are selected. They are also essential to an effective appraisal system and related promotion, transfer, layoff, and termination decisions. Well-constructed job descriptions are an integral part of any effective compensation system.
All descriptions have been reviewed to ensure that only essential functions and basic duties have been included. Peripheral tasks, only incidentally related to each position, have been excluded. Requirements, skills, and abilities included have been determined to be the minimal standards required to successfully perform the positions. In no instance, however, should the duties, responsibilities, and requirements delineated be interpreted as all inclusive. Additional functions and requirements may be assigned by supervisors as deemed appropriate.
In accordance with the Americans with Disabilities Act, it is possible that requirements may be modified to reasonably accommodate disabled individuals. However, no accommodations will be made which may pose serious health or safety risks to the employee or others or which impose undue hardships on the organization.
Security Architect
Security architect job in Washington
At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Security Architect.
Position Summary
We are seeking an experienced Security Architect to lead the design and implementation of secure systems and solutions for a large, complex U.S. government program. This role requires a strategic thinker with deep technical knowledge who can align cybersecurity architecture with mission and compliance requirements. The ideal candidate will collaborate across engineering, operations, and governance teams to develop scalable, resilient, and compliant architectures that support both legacy and modern cloud-based systems.
Key Responsibilities
· Serve as a trusted advisor and “right-hand” to the program lead
· Design, document, and implement secure system architectures in alignment with federal cybersecurity standards and mission objectives.
· Define security requirements for networks, applications, and cloud environments in accordance with frameworks such as NIST 800-53 and NIST 800-207 (Zero Trust)
· Lead architecture reviews, threat modeling, and risk assessments to identify security gaps and propose mitigation strategies.
· Provide security guidance throughout the system development lifecycle (SDLC) and DevSecOps pipelines.
· Develop architecture artifacts, including security diagrams, control mappings, and compliance traceability matrices.
· Support cloud security design and secure integration of COTS/GOTS and open-source solutions in AWS, Azure, or hybrid environments.
· Partner with Information Assurance (IA) and GRC teams to ensure secure and compliant implementations.
· Stay ahead of emerging threats and technology trends to proactively adapt architectural strategy.
Required Qualifications
· 10+ years of experience in information assurance, cybersecurity engineering, and GRC.
· In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP).
· Strong technical foundation with the ability to understand complex systems, architectures, and security configurations.
· Deep understanding of Zero Trust principles, DevSecOps environments, and modern system architecture.
· Experience designing secure systems across multiple domains (cloud, on-premises, hybrid, and mobile devices).
· Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams.
· Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related field
Preferred Qualifications
· Excellent verbal and written communication skills, including experience preparing formal security documentation and reports.
· Prior experience supporting U.S. federal agencies or DoD environments.
· Professional certifications such as CISSP, CISM, CAP, or CCSP.
Why Join SERVISS
Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way.
Freedom to Thrive.
· Be part of an exciting company with ground floor opportunities to include equity
· Highly competitive compensation and best in class benefits
· Opportunities for annual performance bonuses, growth incentives, and profit-sharing
· 100% of medical, vision, dental, and life insurance premiums covered by SERVISS
· 401(k) retirement plan with company match for the first 6%
Note: This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025.
Auto-ApplyEnterprise Security Architect
Security architect job in Bellevue, WA
Enterprise Security Architect Type: 12+ months Contract
Job Description
SR. SECURITY ENGINEER SKILLS & RESPONSIBILITIES
• Act as a trusted technical advisor with key security stakeholders at all levels of the organization for a variety of information security projects that arise from current business and technological developments
• Hands-on experience supporting network, operating system, database, application & data layers across multiple platforms and technologies
• Ability to assess risks and provide innovative countermeasures and solutions that appropriately balance security and business requirements
• Ability to step into an uncontrolled space and bring security structure
• Provide guidance to security analysts, PMs, business partners and IT leadership when new projects are introduced to the business or new risks are identified
SECURITY DESIGN ASSESSOR
• Ability to consult internally with Sr. Engineers (Application, Network, DevOps) to apply security principles and best practices that meet business objectives
• Experience controlling the threat surface area, identifying attack vectors, vulnerabilities and establishing appropriate controls. Can build a threat model
• Evaluation & assessment of compliance to a regulation, law or policy using industry standard methodologies (ISO27001, COBIT, NIST, etc.) in an enterprise environment
Required Qualifications:
INTERNAL TOOLS
• Evaluate, recommend, and implement commercial hardware and software security products to augment and enhance the Company enterprise security program
• Hands-on experience installing, configuring, and supporting security related hardware and software such as Certificate Management, Remote Connection, Network Protection, Data Loss Prevention, File Integrity Monitoring, Security Auditing & Logging, and Vulnerability Management
• Ability to learn a new technology and drive it from ideation through deployment and integration to fully automated and operationalized
• Ability to automate basic integration, data collection, scripting and reporting tasks via secure coding standards
TEAMMATE
• Ability to work on multiple tasks simultaneously, set priorities, communicate delivery expectations, and meet deadlines
• Innovative, collaborative and able to solve problems independently
• Able to work within the team to build measurable, repeatable processes
• Strong verbal and written communication skills
QUALIFICATIONS
• 5+ years of IT infrastructure proficiency and experience that could include one or more of: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (OS, WAF), Proxies, Gateways, Routers, VPN, Application Security SAST/DAST, etc.
• 5+ years information security experience preferred
• Proven ability to assess and influence capital project design and delivery decisions
• Proven ability to assess, recommend, deploy and integrate Information Security tools
• Foundational understanding of several enterprise environment technologies
• Working knowledge and experience in multiple ISC2 security domains
• Familiarity with current legal and regulatory requirements around information security and privacy, including PCI, SOX, HIPAA, GLBA, etc
• Ethical Penetration Testing experience preferred
• Available for work in Bellevue, WA (Factoria)
• CISSP Preferred
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Architect
Security architect job in Bellevue, WA
-We are an equal opportunity employer and committed to diversity.
Why us? We are seeking a passionate technical security professional to join our client's team in Bellevue. You will work cross-functionally to understand the linkage between business goals, business architectures, technology and security architectures - and strive to further business goals via evolution of architectures.
Our client is one of the world's leading Telecommunications organization delivering outstanding wireless experiences to more than 63 million customers.
Job Description
Job Type : Full Time
Job Location : Bellevue, WA
Compensation : $130K - $155K + Full Benefits
As a Principal Architect, you'll be required to:
* Drive the evolution of security infrastructure, processes, products, and services by influencing decision makers.
* Compile, deliver, and evangelize end-to-end technology and security roadmaps that guide the evolution of security infrastructure, products, and services by applying depth and breadth of expertise in multiple related disciplines.
* Responsible for building effective working relationships, making sound decisions, successfully making changes, initiating action and achieving results.
* Compile, develop, deliver, and evangelize end-to-end technology and security roadmaps that guide the evolution of security services, practices, products, and infrastructure by applying depth and breadth of expertise in multiple related disciplines.
Qualifications
We'd love to talk to you, if:
* You've more than 7 years of technical security solutions experience in a combination of relevant Security areas.
* You've strong experience implementing information security architecture concepts, principles, methods, and components.
* You've strong experience implementing Information Assurance principles and organizational requirements relevant to confidentiality, integrity, availability, authentication, non-repudiation.
* You've working knowledge of IT architectural concepts and frameworks.
* You've strong experience with network protocols such as TCP/IP, UDP, DHCP, DNS, and HTTP.
* You've strong knowledge of cryptology and encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES).
Additional Information
I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
Data Security Architect - Seattle, WA
Security architect job in Seattle, WA
Data Security Architect is a member of the IDW (Integrated Data Warehouse) Data Architecture team focused on T-Mobile's latest Hadoop/Teradata Data Warehouse platform. This person will own the data warehouse data security strategy and ensure the new data warehouse complies with T-Mobile security standards as listed by
CIS (Corporate Information Security department).
-->This role will own the security design on IDW (Integrated Data Warehouse) from the data architecture side and will work with strategic vendors, CIS, and other
vendor partners to design overall data warehouse security and to ensure IDW security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata
-->As a member of the Data Architecture team you will own the security design of T-Mobile's newest Hadoop/Teradata data warehouse implementation.
-->Work with strategic vendors and internal CIS (corporate information security) and other vendor partners to design the security controls and to ensure the IDW
security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata
-->Collaborate with team members, peers and the business unit management team to determine technical information security requirements and planned remediation
-->Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures.
Qualifications:
-->Strong understanding of encryption, obfuscation and/or tokenization technologies
-->Candidate must have strong technical, influential and organizational skills.
-->Candidate should be knowledgeable about Hadoop and Teradata security best practices
-->Candidate should be knowledgeable about Hadoop and Teradata security best practices
-->Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience.
-->Demonstrated ability to work effectively in a complex matrixed environment.
-->Outstanding verbal and written communication skills.
-->Ability to translate security requirements into business risks and impacts.
-->Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA.
-->Appropriate industry certifications, such as CISSP, CISA or CCIE.
-->Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline.
-->Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred.
Additional Information
Please forward resume to my Mail Id, as mentioned below, keep subject line as job title & location.
Email id: ********************
Phone: ************* Ext - 345
Easy ApplyChief Information Security Officer (CISO)
Security architect job in Seattle, WA
NOTE TO APPLICANTS: Individual(s) must be legally authorized to work in the United States without the need for immigration support or sponsorship from Milliman now or in the future The Chief Information Security Officer (CISO) is a senior-level executive responsible for developing, implementing, and overseeing Milliman's global information security program. As a member of Global Corporate Services (GCS) reporting directly to the Chief Information Officer (CIO) and working closely with the CEO, Board of Directors, and Equity Principals, the CISO ensures the confidentiality, integrity, and availability of Milliman's information assets, technology infrastructure, and data across all practices and geographies.
This role provides strategic leadership, vision, and governance for all aspects of information security, aligning security initiatives with business objectives and regulatory requirements.
RESPONSIBILITIES:
Strategic Leadership & Governance
* Drive the information security function across Milliman, ensuring alignment with organizational goals.
* Establish and implement a global information security vision and strategy by collaborating with the Board, senior leaders, and Equity Principals.
* Design and deliver the security roadmap, including staffing and budget plans, and manage the approved corporate information security budget.
* Serve as an expert advisor to the Board and senior leadership on IT security matters.
* Facilitate organization-wide security enhancements that integrate business objectives with IT infrastructure, physical infrastructure, and human resources.
* Act as the primary change agent facilitating information security improvements in security culture, business relationships, and product/service design.
* Chair the Security Technology Steering Group (STSG).
Risk Management & Compliance
* Collaborate with senior leadership on IT-related risk management to identify, assess, and address risks.
* Oversee the development, implementation, and maintenance of global information security policies, standards, guidelines, and procedures.
* Ensure compliance with relevant laws, regulations, and industry frameworks (e.g., ISO 27001, HIPAA, HITRUST, SOC 2).
* Partner with the Legal Department to maintain a collaborative approach to information security and privacy.
* Manage third-party/vendor security risk programs and ensure alignment with corporate policies.
* Serve as a voting member of the Enterprise Risk Management Committee and Technology Operations Committee and act as a key advisor to senior leadership on IT security matters.
Incident Response & Operational Oversight
* Oversee emergency procedures and incident response protocols, serving as the control point during significant security incidents.
* Direct teams to detect, report, contain, and mitigate incidents impacting data and infrastructure security.
* Oversee periodic security reviews of all business units and present findings to the Enterprise Risk Committee and Board.
* Partner with the Legal team in response to privacy incidents and significant events.
* Collaborate with IT teams to develop, evaluate, and improve network disaster recovery plans.
* Maintain relationships with law enforcement and relevant government agencies in support of the information security program.
Program Development & Stakeholder Engagement
* Develop and implement enterprise-wide security awareness training.
* Build and report on metrics and KPIs to measure program effectiveness.
* Recommend security enhancements and purchases consistent with evolving threats and strategic objectives.
* Stay current on technological advances and identify opportunities for adoption within Milliman.
* Provide coordination, communication, and dissemination of best practices across the organization.
* Support Equity Principals and their practices in security-related matters consistent with GCS service expectations.
SKILLS & QUALIFICATIONS REQUIRED:
* Bachelor's degree in Computer Science, Computer Engineering, Information Systems, or related discipline.
* The ideal candidate must possess certification (s): Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM)
* The ideal candidate must have 10+ years in management of business or technology organizations, with demonstrated competency in strategic thinking, leadership, and relationship management, and enterprise-level responsibility.
* The ideal candidate must have 7+ years of direct management experience overseeing security teams and budgets.
* The ideal candidate must have previous experience with regulatory compliance frameworks such as ISO 27001/2, HIPAA, HITRUST, and SOC 2.
* The ideal candidate must have previous experience with cloud security control design and management experience.
* The ideal candidate must have thorough knowledge of finance, budgeting, project management, and systems development lifecycle.
* The ideal candidate must have knowledge of security domains such as auditing, policy, database security, firewall design and implementation, risk analysis, identity management, access management, and web services.
* Must have demonstrated leadership in multi-discipline, high-performance teams, including supervision and professional development of technical staff.
* Must have proven ability to work with geographically diverse offices in a global organization.
* Must have excellent verbal and written communication skills, including the ability to prepare documentation, policies, and build consensus across broad groups.
* Must have the ability to deal effectively with concrete, tangible issues as well as abstract, conceptual matters.
* Must demonstrated thought leadership in information security and creating innovative, scalable business solutions with the ability to lead and motivate cross-functional, interdisciplinary teams.
* Must have strong time management skills, ability to handle multiple projects concurrently, and the capacity to be flexible and nimble as business needs change and evolve.
SKILLS & QUALIFICATIONS PREFERRED:
* Advanced degree (master's or PhD) in Information Security, Computer Science, or related field.
* Experience within consulting or professional services organizations.
* Familiarity with enterprise-level cloud technologies, defect tracking tools, agile management tools, and Microsoft Suite.
* Additional certifications (e.g., GIAC, CCSP, CRISC, PMP).
LOCATION:
This is a remote role. The expected application deadline for this job is December 15th, 2025
COMPENSATION:
The overall salary range for this role is $203,200 - $397,210. For candidates residing in:
* Alaska, California, Connecticut, Illinois, Maryland, Massachusetts, New Jersey, New York City, Newark, San Jose, San Francisco, Pennsylvania, Virginia, Washington, or the District of Columbia the salary range is $233,680 - $397210.
* All other locations the salary range is $203,200 - $345,400.
A combination of factors will be considered, including, but not limited to, education, relevant work experience, qualifications, skills, certifications, etc.
BENEFITS:
We offer a comprehensive benefits package designed to support employees' health, financial security, and well-being. Benefits include:
* Medical, Dental and Vision - Coverage for employees, dependents, and domestic
* Employee Assistance Program (EAP) - Confidential support for personal and work-related
* 401(k) Plan - Includes a company matching program and profit-sharing
* Discretionary Bonus Program - Recognizing employee
* Flexible Spending Accounts (FSA) - Pre-tax savings for dependent care, transportation, and eligible medical expenses.
* Paid Time Off (PTO) - Begins accruing on the first day of Full-time employees accrue 15 days per year, and employees working less than full-time accrue PTO on a prorated basis.
* Holidays - A minimum of 10 paid holidays per
* Family Building Benefits - Includes adoption and fertility
* Paid Parental Leave - Up to 12 weeks of paid leave for employees who meet eligibility
* Life Insurance & AD&D - 100% of premiums covered by
* Short-Term and Long-Term Disability - Fully paid by
ABOUT MILLIMAN:
Independent for over 75 years, Milliman delivers market-leading services and solutions to clients worldwide. Today, we are helping companies take on some of the world's most critical and complex issues, including retirement funding and healthcare financing, risk management and regulatory compliance, data analytics and business transformation.
Milliman invests in skills training and career development and gives all employees access to a variety of learning and mentoring opportunities. Our growing number of Milliman Employee Resource Groups (ERG's) are employee-led communities that influence policy decisions, develop future leaders, and amplify the voices of their constituents. We encourage our employees to give back to their varied professions, including leadership in professional organizations. Please visit our web site (****************************************** to learn more about Milliman's commitments to our people, inclusion, and sustainability.
Through a team of professionals ranging from actuaries to clinicians, technology specialists to plan administrators, we offer unparalleled expertise in employee benefits, investment consulting, healthcare, life insurance and financial services, and property and casualty insurance.
EQUAL OPPORTUNITY:
All qualified applicants will receive consideration for employment, without regard to race, color, religion, sex, sexual orientation, national origin, disability, or status as a protected veteran.
Blue Team DART - Senior Security Analyst
Security architect job in Seattle, WA
We exist to wow our customers. We know we're doing the right thing when we hear our customers say, “How did we ever live without Coupang?” Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce.
We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day.
Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world.
Role Overview
As our Cyber Security Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks.
The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis.
The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices.
What You Will Do
Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report
Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources
Ticket review, and security analysis escalated from SOC
Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare)
Analyze and respond to Email Security events
Oncall to response urgent security events or security issues
Collaborate effectively with internal teams through efficient communication
Minimum Qualifications
Bachelors Degree in Computer Science or a related technical field or equivalent professional experience.
2 years of experience in information Security with experience in Cyber Security Incident Analysis
Preferred Qualifications
8+ years of experience in information security with at least 5+ years as a Cyber Security Incident Analyst
Experience of Host based security investigation (Windows, Linux, Network/Security appliances)
Experience of analyzing security event and knowledge of AWS or Cloud environment
Experience of analyzing security event from Web security solutions (Akamai, CloudFlare)
Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc)
Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc)
Experience and skills querying SIEM Solutions for analyzing security events from the logs
Skill to analyze big data or big size logs
Experience in Automation and Scripting using Bash, Python, PowerShell
Proactive and proactive work attitude
Pay & Benefits
Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $108,000/year in our lowest geographic market to $232,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience.
General Description of All Benefits
Medical/Dental/Vision/Life, AD&D insurance
Flexible Spending Accounts (FSA) & Health Savings Account (HSA)
Long-term/Short-term Disability
Employee Assistance Program (EAP) program
401K Plan with Company Match
18-21 days of the Paid Time Off (PTO) a year based on the tenure
12 Paid Holidays
Paid Parental leave
Pre-tax commuter benefits
MTV - [Free] Electric Car Charging Station
General Description of Other Compensation
“Other Compensation” includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale.
Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate.
If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************.
Requisition # R0064937
Auto-ApplySenior Security Analyst
Security architect job in Seattle, WA
Join us in stopping bad bots, for good! Kasada protects millions of online users everyday. Founded to stop automated bot attacks, we believe the internet should be a safe place for everyone. Bad bots are highly destructive. They take over accounts, steal content, overload systems and infrastructure and cause billions of dollars in damages every year. Seeking to restore trust in the internet, Kasada stops bots at the very first request including those that have never been seen before.
We've grown from a few friends working out of a shipping container under the Sydney Harbour Bridge to now operating globally, we're spread across the world protecting some of the most well-known brands on the face of the earth.
We're an innately curious team that's not afraid to bring bold ideas to create better ways of solving problems. We're looking for people who are passionate about solving some of the most difficult and pressing cybersecurity issues, while having fun doing it!
The Role
We're currently on the lookout for a Senior Security Analyst to join our Security Operations team, focused on taking on complex and high impact unwanted automation for our customers. This role will require you to act as an escalation point for other analysts, handle investigations end to end, and contribute to improving our investigative methods and tooling. Your experience in a similar role in a cyber security environment will be highly regarded.
This position will allow you to apply your analytical skills in the fight against bad bots. Working with some of the world's biggest companies, you'll help reduce the damage caused by unwanted automation, while sharing your expertise and supporting our team.
This is a remote role, to ensure timezone overlap with our Australia-based team candidates should be located on the West Coast. What you will be doing;
Lead complex investigations and in-depth analysis of automated software activity within customer environments, driving cases to resolution.
Act as an escalation point for incident response and threat detection, providing expert guidance on challenging or ambiguous cases.
Apply and optimise a range of investigative tools and techniques to uncover patterns, anomalies, and root causes.
Collaborate across teams to provide clear, actionable advice on complex investigations and contribute to improving detection and response processes.
What you will bring;
Demonstrable, recent experience in cybersecurity or IT security roles.
Significant experience identifying and mitigating security risks in a web application or similar environments.
Solid understanding of security frameworks, incident response methodologies, and threat intelligence.
Familiarity with analytical security tools (e.g., Splunk, ElasticSearch, SQL, NoSQL databases).
Solid knowledge of web technologies (TCP stack, HTTP/S, WebSockets, Browser Architectures, Operating Systems)
Subject matter knowledge and awareness of automated cyber security attacks and/or bot groups.
Relevant certifications (e.g., CISSP, CISM, CEH, Bachelors degree in a relevant field) are desirable but not essential.
Critical and analytical mindset with proven ability to make sound, timely judgments.
$140,000 - $175,000 a year The Benefits of being a Kasadian
We want to ensure Kasada remains a great place to work and a place to do great work. It's important to us to build an inclusive environment where you can realize your full potential. We are a highly collaborative team regardless of location, placing a strong emphasis on our core values; and we have designed our benefits package so you can thrive, both inside and outside of work:
- A stake in Kasada's global success with equity/stock options - Flexible working hours and arrangements - Create a schedule that suits you - Support for growing families - Generous parental leave allowances and resources to help in the lead up, during and after parental leave. - Resources for well-being to support your growth including our EAP - confidential counselling for you and your loved ones - Birthday leave - Wellness leave - An action packed calendar of fun in-person and virtual events
Sound interesting? What's next?
Hit the apply button and one of our team will set up an exploratory, confidential discussion. We have designed our hiring process to be streamlined and thorough so everyone can make the right call on whether it is the right move for you. We are an inclusive team and this extends to all candidates that interview with us. Interviews are conducted virtually however if you want to come onsite - just ask! When you apply, please tell us the pronouns you use and any adjustments you may need during the interview process, we want to ensure you are set up for success in every conversation.
Still with us? Just a little bit more…
Research shows that women and other marginalized individuals tend to only apply when they check every box. We're always keen to broaden our perspective, so if you think you have what it takes, but don't necessarily meet every single point above, please still get in touch, we'd love to have a chat and see if you could be a great addition to the team!
Please note: Kasada is an e-verify employer (US based applicants only)
Auto-ApplyNetwork Security Architect
Security architect job in Auburn, WA
Job Description
.
Our Client is seeking an experienced Senior Network Security Engineer to build and support our customer infrastructure environment based in San Jose, CA. Duration: Long Term (Possibility of Further Extension)
The ideal candidate will have hands-on architect, and setup expertise in network and security technologies, including Cisco Firepower NGFW, LAN/WAN/VPN, and F5 load balancing, as well as experience with proxy solutions, SFTP, and vulnerability management tools such as Tenable. Prior experience in manufacturing environments is a strong plus.
Key Responsibilities:
• Design, implement, and maintain secure network infrastructure across LAN, WAN, and VPN environments.
• Configure, manage, and troubleshoot Cisco Firepower Next-Generation Firewalls (NGFW).
• Support proxy/Next-Gen firewall setups to enhance network security and performance.
• Deploy and maintain F5 load balancers to optimize traffic and ensure high availability.
• Manage and secure SFTP configurations for data transfers.
• Utilize Tenable for vulnerability assessment, monitoring, and remediation support.
• Ensure compliance with security policies, standards, and best practices.
• Collaborate with cross-functional teams (network, systems, and security operations) to implement secure solutions.
• Document infrastructure configurations, processes, and operational procedures.
Required Skills:
• 5+ years of hands-on experience in network security engineering.
• Strong expertise in Cisco Firepower NGFW, LAN/WAN/VPN technologies.
• Experience with SED, Proxy/Next-Gen Firewalls, and F5 load balancing.
• Knowledge of SFTP configurations and management.
• Familiarity with Tenable or other vulnerability management tools.
• Excellent troubleshooting and analytical skills.
• Strong communication and documentation abilities.
Preferred Skills:
• Experience working in manufacturing environments.
• Relevant certifications such as CCNP Security, F5 Certified, CISSP, or CEH.
If interested, please send us your updated resume at
hr@dawarconsulting.com/***************************
Easy ApplyInformation Security Manager
Security architect job in Seattle, WA
Guide security policy and participate in broader Information Security governance efforts.
Develop and maintain the Information Security Management System (ISMS) in collaboration with regional information security SMEs and technical consultants.
Oversee and manage the ISMS and recommend appropriate mitigating controls.
Oversees Information Security Risk Management activities, including risk identification, assessment, and communication to relevant interest holders.
Provide valuable expertise and leadership directly to the governing Joint Board executive leadership, including sharing metrics to reflect the performance of the regional security program functions, executive risk score reports, and other guidance on a variety of information security topics.
Facilitate a committee of Information Security SMEs across the Agencies to ensure both regional compliance and concurrence on information security-related matters, recommending solutions, and working from the regional perspective to achieve optimal solutions.
Collaborate with the Systems Integrator, other vendors, and partner Agencies to ensure security best practices, standards, policies, and regulatory requirements are incorporated into core payment system design, implementation, and sustainment, as well as support other future phase projects.
Conduct regular security reviews of both software and processes, advising on information security practices. Reviews and creates threat models and recommends security enhancements consistent with information security strategy and evolving threats.
Support external IT security audits and assessments that focus on operation.
Develop, update, implement, and conduct information security training programs to support the ISMS objectives.
Manage approvals for Identity and Access Management (IAM) and Access Control Administration.
Act as Incident Commander for Security Incident Response activities, whenever the Information Security Incident Response Plan is invoked by the regional program; play an interest holder and oversight role if the plan is invoked by other partners or vendors.
Participate in information security incident investigation and response efforts; perform root-cause analysis when incidents occur and prepare incident reports.
Evaluate change requests to determine potential impacts to Information Security, including IT systems, processes, policies, and provide appropriate input to the Change Management process.
Coach future Regional Operations Team (ROOT) information security personnel as the ISMS becomes complete and mature.
Keep up to date on latest information security trends, "best practices", threats, and countermeasures.
Required Skills and Qualifications:
Enterprise-level information security plans, policies, standards, guidelines, methods, and practices based on current industry standards, best practices, tools, and techniques.
Information Security Management Systems, and applicable industry standards (ISO 27001/2).
Pertinent federal, state, and local laws, codes, and regulations; particularly those that affect information security for payment systems.
Environments subject to the Payment Card Industry Data Security Standard (PCI DSS), including compliance-related duties.
Knowledge and understanding of developing and administering information-security standards, practices, audits, risk management, and policy compliance.
Information Security Audit principles and practices.
Knowledge of one or more governance frameworks such as COBIT 5, ISO, NIST, or COSO.
Strong understanding of IT Service Delivery (ITIL) core processes and methodologies.
Principles, methods, and techniques used in the facilitation of managing projects and leading teams.
Relevant experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography.
In-depth knowledge of security software threats and vulnerability mitigation techniques.
Working knowledge of cloud platforms such as Azure/ AWS and relevant security controls.
Establishing and maintaining collaborative working relationships with other department staff, management, vendors, and other interest holders.
Documenting and explaining risks, recommendations, and incident data to technical interest holders.
Interpreting and administering information security policies, standards, and procedures sufficiently to administer, discuss, resolve, and explain them to staff and other constituencies.
Leading or supporting an Information Security Management System.
Generating metrics and preparing reports to facilitate decision-making on security-related activities.
Utilizing personal computer software programs affecting assigned work and in compiling and preparing spreadsheets and reports.
Responding to inquiries with effective oral and written communication.
Researching, analyzing, and evaluating new security processes, products, and techniques.
Excellent time management skills including the ability to prepare, prioritize, and complete work plans.
Working effectively under pressure, meeting deadlines, and adjusting to changing priorities.
Writing of technical documentation and standards, including skill in English usage, spelling, grammar, and punctuation
Required Certifications or Licenses:
At least one of the following (in valid status):
Certified Information Systems Security Professional (CISSP).
Certified Information Security Manager (CISM).
Certified Information Security Auditor (CISA).
Other industry relevant certifications in the fields of information security, project management, auditing and/ or risk management, such as the Certification in Risk and Information Systems Control (CRISC)
Preferred Skills and Qualifications:
Knowledge of Governance, Risk, and Compliance (GRC) tools.
Principles of leadership, supervision, training, and performance evaluation.
Extensive knowledge of risk-based methodologies, and one or more of the following frameworks: ISO 27001/2:2017, 27005:2011, and 31000; PCI-DSS; or NIST 800-53.
Duration:11/07/2025 to 2/28/2026
Location: Downtown Seattle (Hybrid)
M-F: 8 AM to 5 PM
Hybrid: 3 days work onsite
Pay: $75 per hour
Sr Ent Information Security Manager
Security architect job in Bellevue, WA
Bellevue Telecommunications Services Exp 10-15 years Deg Bachelors Relo Bonus Job Description The Information Security Manager, working with in Corporate Information Security Team will be responsible for liaising with assigned business units on behalf of Corporate Information Security (CIS). These responsibilities will include understanding business-driven projects that involve network and information security, applications, networking and web based technologies. They will be responsible for understanding the Business Unit's processes and priorities and working with them to manage business impact and threats, through a risk based methodology. Ensures through positive engagement that business goals are met in a secure and compliant manner, according to industry standard regulations
Qualifications
Ideal Candidate will have:
Candidate must have strong technical, influential and organizational skills.
Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience.
Expert relationship building and partnering skills, including persuasion, negotiation and consensus building.
Experience translating emerging IT and business trends into meaningful risk reduction opportunities.
Demonstrated ability to work effectively in a complex matrixed environment.
Outstanding verbal and written communication skills.
Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement.
Ability to translate security requirements into business risks and impacts.
Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA.
Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls.
Appropriate industry certifications, such as CISSP, CISA or CCIE.
Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline.
Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred.
Skills and Qualifications:
A broad, enterprise-wide view of the wireless (or similar) business and understanding of strategy, processes and capabilities, enabling technologies, and governance. Experience in telecommunications, internet service provider, or application service providers a plus.
The ability to apply Information Security principles to business solutions.
Extensive experience planning and deploying both business and technology security initiatives.
Exceptional communication skills and the ability to convey results in a summarily and persuasive manner to business owners. This includes written and verbal communications as well as visualizations.
The ability to act as liaison conveying information needs of the business to technology teams and technology constraints to the business.
Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI.
Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks.
Understanding of Local (Wired & Wireless), Wide area, and mobile networks.
A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS.
Strong background and experience in IP Networking and Routing Protocols.
Fluency in the use of all MS Office applications, including SharePoint services.
Qualifications
· Preferred: Any of the following
CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt
Education
Minimum Required
High School Diploma/GED
Education/Vocational Training/Experience Preferred
Bachelor's degree in Computer Science, Information Technology or related field from an accredited 4-year college or university
10 years of system, network, and application design and architecture experience. Preferably in the wireless communications space
CISSP and or CISM Certification (required; experience may be substituted for Cert requirements (4 years minimum)
CISA Certification (preferred but not required; experience may be substituted for Cert requirements (4 years minimum)
Responsibilities
What you will do:
Make proactive assessments of threat information in and outside the public domain, understanding the threat as it relates to its customers, and implementing measures to combat the threat.
Understand the operations of the business and comprehend how these create value and risk for the organization.
Collaborate with team members, peers and the business unit management team to determine technical information security requirements, planned remediation, and advocate for the program to gain resources to implement appropriate protection technologies and processes.
Implement and monitor controls necessary to ensure operational processes are performed and are effective to protect the environment from all forms of malicious cyber activity.
Assist the Governance group in the development and refinement of technical security standards, key performance indicators and other necessary processes to maintain effective operational security, as it relates to the business.
Make risk-based decisions on a daily basis that has the potential to impact our ability to operate and communicate.
Ensure the information and network security controls for us are appropriate and operating as intended; includes solutions that are directly controlled as well as security solutions that are operated by other internal and external groups.
Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program.
Interact with internal audit, third party auditors, and appropriate regulatory bodies.
Support the Information Security policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance.
Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
Product Security Analyst (Mid-Senior)
Security architect job in Seattle, WA
Company:
The Boeing Company
Boeing Defense Space & Security (BDS) is seeking an innovative Product Security Analyst to join our team in Seattle, Washington. In this role, you will lead embedded system cybersecurity and resiliency efforts across the full product lifecycle-from requirements and design through testing, production, and sustainment-ensuring the security of Boeing's advanced aerospace products and services.
You will collaborate with a multidisciplinary, enterprise-wide Product Security community to develop and implement best practices, tools, and solutions that protect complex systems, including IT, embedded, and non-IT environments. This role offers the opportunity to solve high-impact security challenges, influence next-generation security engineering, and directly contribute to the resilience of Boeing's commercial and defense offerings.
Ideal candidates bring experience in software and system security, rapid prototyping, and supporting system development, integration, and testing. Strong communication, problem-solving skills, and the ability to work independently and collaboratively with diverse teams and customers are essential.
If you are passionate about advancing cybersecurity in aerospace and want to make a meaningful impact on the future of flight, we encourage you to apply.
Position Responsibilities:
In this position, you will engage in one or more of the following activities:
Support the development and enhancement of product security requirements and architectures to meet certification and customer requirements.
Conduct product security risk assessments, attack surface analyses, and vulnerability evaluations for embedded and IT systems.
Assist in security audits and assessments of applications, components, and subsystems integrated into Boeing products and services.
Coordinate with governments, customers, suppliers, and industry partners to identify risks and improve security standards and regulatory compliance.
Analyze and triage product security incidents, identifying attack indicators and escalating potential breaches.
Perform trend analysis and support the development of detection and mitigation capabilities against evolving threats.
Prepare and present technical reports and briefings tailored to technical teams and senior leadership.
Collaborate with cross-functional teams to integrate security practices into the product lifecycle, ensuring a holistic approach to security.
Stay current with emerging threats, vulnerabilities, and security technologies to continuously improve security posture.
Support research and development activities that result in innovative solutions to enhance product security.
Travel to other Boeing sites within the U.S. may be required (estimated to be ~10% travel time).
Differentiators by Level:
Individual Contributor 3 (IC-3):
Focuses on researching and analyzing technical data, performing standard risk assessments, and supporting incident coordination. Prepares technical reports and briefings under guidance.
Individual Contributor 4 (IC-4):
Leads complex security analyses and incident coordination efforts. Provides technical leadership within teams and presents findings to senior management. Drives improvements in detection capabilities and security integration.
Individual Contributor 5 (IC-5):
Acts as a consultant and technical authority on product security integration and risk management. Oversees complex assessments and leads strategic initiatives to advance detection and mitigation capabilities. Communicates technical impacts to senior leadership and influences enterprise security posture.
This position is expected to be 100% onsite. The selected candidate will be required to work onsite at one of the listed location options.
This position requires a minimum active/current U.S. Secret Security Clearance for which the U.S. Government requires U.S. Citizenship.
Basic Qualifications (Required Skill/Experience):
Bachelor's degree in Cybersecurity, or related technical discipline.
Bachelor's degree and 5+ years' experience or Master's and 3+ years (IC-3); Bachelor's degree and 9+ years' experience or Master's and 7+ years (IC-4); Bachelor's degree and 14+ years' experience or Master's and 12+ years (IC-5)
3+ years of experience in product security analysis, risk assessment, vulnerability management, or related fields.
Must obtain a CompTIA Security+, a CISSP certification or equivalent Cyber Security certification within 6 months of employment in this role.
Preferred Qualifications (Desired Skills/Experience):
Experience leading security projects or teams (for levels IC-4 and IC-5).
Knowledge of system-level product security concepts and operational environments.
Familiarity with malware analysis, attack surface reduction, and security audit methodologies.
Experience with security incident response and trend analysis.
Ability to present complex technical information to diverse audiences, including senior leadership.
Strong analytical and problem-solving skills.
Effective written and verbal communication skills.
Ability to work collaboratively in cross-functional teams.
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.
Relocation:
This position offers relocation based on candidate eligibility. Note: Basic relocation will be offered for eligible internal candidates.
Pay & Benefits:
At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities.
The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work.
The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary Pay Range:
Level 3: 119,000 - $161,000
Level 4: $148,750 - $201,250
Level 5: 181,900 - $246,100
Language Requirements:
Not Applicable
Education:
Not Applicable
Relocation:
This position offers relocation based on candidate eligibility.
Export Control Requirement:
This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee.
Safety Sensitive:
This is not a Safety Sensitive Position.
Security Clearance:
This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active)
Visa Sponsorship:
Employer will not sponsor applicants for employment visa status.
Contingent Upon Award Program
This position is not contingent upon program award
Shift:
Shift 1 (United States of America)
Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
EEO is the law
Boeing EEO Policy
Request an Accommodation
Applicant Privacy
Boeing Participates in E - Verify
E-Verify (English)
E-Verify (Spanish)
Right to Work Statement
Right to Work (English)
Right to Work (Spanish)
Auto-ApplySenior Cloud Security Analyst
Security architect job in Washington
GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud Security Analyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position
Minimum Qualifications
Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience.
Preferred Qualifications
4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling
Work Schedule
Monday - Friday, 8am - 5pm (occasional evenings and weekends)
Director, Chief Information Security Officer (CISO)
Security architect job in Helena, MT
Job Description
.
Director, Chief Information Security Officer (CISO)
The Staff Pad is seeking a Chief Information Security Officer (CISO) on behalf of a leading healthcare organization in Helena, Montana.
This executive leader will establish and maintain the enterprise security vision, strategy, and program to safeguard all information assets-including PHI and sensitive clinical, administrative, and operational data. The CISO will oversee risk management, regulatory compliance, security operations, incident response, and the development of a strong security culture across the organization. This role requires both strategic leadership and deep technical expertise within the healthcare sector.
Position Overview
The CISO leads the enterprise cybersecurity program, ensuring the protection of systems, data, and clinical technologies while supporting patient safety and operational continuity. This leader will oversee governance, risk, compliance, and security operations, working closely with executive leadership to guide security strategy and response.
Key Responsibilities
Strategic Leadership & Governance
Develop and execute a long-term information security strategy aligned with organizational goals.
Build and maintain an enterprise security framework (NIST CSF, 405D, ISO 27001, HITRUST, etc.).
Advise executive leadership and the Board on security posture, threats, and mitigation plans.
Manage the information security budget and security technology investments.
Risk Management & Compliance
Lead enterprise risk assessments and prioritize mitigation initiatives.
Ensure compliance with HIPAA/HITECH, GDPR, and other relevant data privacy regulations.
Oversee creation and enforcement of security policies, procedures, and standards.
Direct internal and external audit readiness and remediation (HITRUST, SOC 2, etc.).
Manage a robust vendor and third-party risk management program.
Security Operations & Incident Response
Lead security operations, including threat/vulnerability management, IAM, SIEM, and endpoint protection.
Oversee development and testing of Incident Response, Disaster Recovery, and Business Continuity plans.
Serve as executive incident manager during security events, breaches, and investigations.
Ensure security of EHR systems, medical devices, and clinical technologies.
Team Leadership & Security Culture
Build and lead a strong GRC and SecOps team.
Drive organization-wide security awareness and training initiatives.
Partner with IT, Clinical Operations, Legal, HR, and other departments to embed security into systems and workflows.
Required Knowledge & Experience
Minimum 7 years of progressive experience in Information Security; senior leadership or CISO-level experience preferred.
Strong healthcare industry background, including understanding of EHR systems and PHI protection.
Proven expertise in enterprise cybersecurity architecture, IAM, cloud security, and threat detection tools.
Demonstrated experience conducting and managing enterprise risk assessments.
Education
Information System Security Officer (ISSO)
Security architect job in Sedro-Woolley, WA
Janicki Industries is an innovative, family-owned aerospace company located at the foot of the Cascades. We focus on engineering and manufacturing complex projects for companies in the aerospace, defense, and space industries. . We are looking for an Information System Security Officer to join our team.
This position is located on-site in Sedro-Woolley, Washington State
POSITION DESCRIPTION
The responsibility of the Information System Security Officer (ISSO) is to maintain the governance, risk, and compliance of isolated information systems in support of production and engineering efforts. This position requires strict adherance to the Department of Defense and Customer requirements. The ideal candidate will have a solution-driven attitude with excellent follow-up and an aptitude for collaborative problem-solving. This candidate will interface directly with the Security Department, Information Technology, Program Management, and our Customer's to draft, implement, and audit policy and procedures that allow Janicki to remain at the forefront of engineering
The following essential job functions are performed as an ISSO:
Maintains Information Systems (IS) security implementation policy and guidelines, plans, instructions, standard operating procedures, and security education, training, and awareness program (SETA)
Maintains familiarity with all applicable policies and regulations (e.g. NIST 800-53, NIST 800-71, NISPOM, NSA Policy Manual 9-12, etc.)
Ensures all IS security-related documentation is current and authorizations are on file for each Information System
Ensures software, hardware, and firmware comply with appropriate security configuration guidelines, policies and procedures, and approvals
Effectively works with vendors for product (hardware/software) procurement to ensure systems remain compliant as needs change
Maintains classified systems through Security Technical Implementation Guides (STIGs), self-assessments, recurring audits, and verification of system setup with applicable policies and regulations
Analyzes security vulnerabilities/risks and provides guidance on suitable options for identified issues
Work with program/project Managers to monitor/periodically review contract requirements for conformance
Conducts and participates in inspections (internal and external) and implements necessary actions to correct deficiencies
Communicates with prime contractors and government agencies to obtain approvals and maintain compliance.
Ensure periodic testing is conducted to evaluate the security posture of the IS by employing various intrusion/attack detections and monitoring tools
Assists users in account management (e.g., training employees in security procedures, password resets, etc.)
Performs additional duties as necessary which may include IT maintenance unrelated to the duties of this position, personnel maintenance, facility lock/unlock procedures, etc.
Works well under pressure, meeting and completing multiple deadlines
Must be willing to travel on occasion
Must work well under pressure, meeting and completing multiple deadlines
Must be at work on time and maintain good attendance. This is a condition of employment and is an essential function of the job
QUALIFICATIONS
MUST BE U.S. CITIZEN OF THE UNITED STATES AND NOT HOLD DUAL CITIZENSHIP WITH ANTOHER COUNTRY.
EDUCATION/EXPERIENCE
Current DOD Security Clearance Required
Minimum 2+ years of experience as ISSO implementing NISPOM Chapter 8, ICD 705, and JSIG IS requirements
Bachelor's degree in an IT-related field or equivalent education or work experience
CompTIA Security+
Experience with Windows operating environments
Familiarity with conducting and reviewing vulnerability and compliance scans
Experience developing subordinates and communications up and down the chain of command
Experience in providing Information Systems security awareness and training
Maintains awareness of upcoming customer/government-driven changes and challenges and suggests approaches to meet those challenges
Excellent time management skills; keeps commitments and welcomes a collaborative environment
Self-disciplined to lead IA projects with minimal supervision
Previous experience working as a security professional in an SAP/SCI environment
Familiarity with the National Industrial Security Program Operating Manual (NISPOM), Joint Special Access Program (SAP) Implementation Guide (JSIG), and National Institute of Standards and Technology (NIST) frameworks
Excellent communication skills (written & oral)
Knowledgable in COMSEC
ADDITIONAL INFORMATION
Salary range for this role is between $80,000 - $110,000, plus discretionary bonus, 401(k) matching, vacation, and health benefits. Employees can also receive additional pay for off-shifts. The range provided is Janicki's estimate of the base compensation for this role. Actual amount offered will be based on job-related and non-discriminatory factors such as experience, location, education, training, skills, and abilities
BENEFITS
Medical, dental, and vision insurance with employer contribution
Disability insurance as well as Life/AD&D insurance
HSA (Health Savings Account) with employer contribution and FSA (Flexible Savings Account)
401k with employer matching
Paid time off and paid holidays (including two floating holidays)
Education reimbursement program
Several shift options
Premium pay for off-shifts
Not sure that you'll be the perfect fit for this role? You should still apply! We'll review your application for other opportunities. We are always on the lookout for talented people!
Janicki Industries is an Equal Opportunity Employer. Janicki Industries does not discriminate on the basis of race, color, religion, sex, national origin, sexual orientation, marital or familial status, physical or mental disability, genetic information, age, retaliation, veteran/military service status, or any other legally protected status. Janicki is proud to be a military friendly employer.
Applicants or employees wishing to view a copy of Janicki Industries' Affirmative Action Plan for veterans and individuals with disabilities, or applicants requiring reasonable accommodation to the application/interview process should notify the Human Resources Department at **************.
As a federal government contractor and a recipient of federal funding, Janicki is required to abide by federal drug testing requirements (including preemployment drug testing for cannabis). Additionally, because of Janicki's work on aerospace products and the high volume of safety sensitive positions, Janicki takes the safety of its employees very seriously and requires that employees pass a preemployment drug test prior to starting employment.
Security Engineer, Operating Systems
Security architect job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Build secure network stacks with appropriate isolation and segmentation
Create OS-level attestation and integrity monitoring systems
Develop security patches, custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyInformation Systems Security Officer
Security architect job in Camas, WA
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security
posture for information systems and as such, works in close collaboration with the ISSM, CPSO, and FSO. The
ISSO must have detailed knowledge and expertise required to manage the security aspects of an information
system and is assigned the day-to-day responsibility for assigned systems. Responsibilities include
implementation of the requirements of Risk Management Framework, including the Joint Special Access
Program (SAP) Implementation Guide (JSIG), NIST 800-53, or other security requirements as assigned.
This position will report to the Corporate Information Assurance Manager and work in close collaboration with
the AFSO and FSO. The ISSO is responsible for developing and updating the security authorization package, managing and controlling changes to the system, and assessing the security impact of those changes.
Ensure systems are operated, maintained, and disposed of following security policies and procedures as outlined
in the security authorization package.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Monitor system recovery processes to ensure security features and procedures are properly restored and
functioning correctly.
Ensure audit records are collected, reviewed, and documented.
Duties also include physical and environmental protection, personnel security, and incident handling.
DUTIES & RESPONSIBILITIES
Lead the information system security program for their assigned location to include implementation and
validation of automated informational security, ensuring security requirements as contracted are
satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current
DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring,
trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by
local employees
Conduct system audits in accordance with security accreditation package requirement
Lead the information system security program for their assigned location to include implementation and validation of automated informational security, ensuring security requirements as contracted are satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
Conduct system audits in accordance with security accreditation package requirements
Conduct vulnerability scans and analysis
Conduct maintenance on the networks, systems, and hardware
Perform software upgrades on networks, systems, and hardware
Perform security assignments in accordance with the Automated Information System requirements and local regulations
Understand and follow NISPOM/ODAA/RMF/JAFAN/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 4 years' experience in related field
DoD 8570 compliant, IAT Level II
Experience with Windows based administration of Information Systems
Ability to work within compliance standards; previous experience with RMF, HIPAA , PCI DSS, or
equivalent compliance standard preferred
Strong experience in networking, active directory, centralized logging solutions, vulnerability scanning
and anti-virus solutions
Experience with security audits for information systems
Strong communication and problem-solving skills
Ability to work in both a team environment as well as independently
Must be organized and detail oriented
Ability to obtain and maintain Top Secret clearance with the ability to obtain approval for SAP/SCI access
DESIRABLE
Have previous experience with DoD Security Regulations and Policies
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership