Hardware Architect - Information Security
Security architect job in Seattle, WA
Apple Information Security is responsible for protecting Apple's data in transit and at rest. Apple employees and partners are always moving information from one system to another, or storing it on a server or device. Our job is to make sure Apple's information doesn't fall into the wrong hands. We are looking for a self-motivated individual with an intuition for security who is not afraid to question assumptions. The ability to be results-driven and comfortable with dynamic requirements, as well as having excellent interpersonal and time management skills, are keys to success in this position. As a member of our team, you will have the opportunity to collaborate with multi-functional partners both internal and external to Apple to build innovative security products. You will support the development of embedded systems designed to enhance Apple's security posture. You will be challenged to provide forward-thinking solutions to problems and to be a good teammate under deadline constraints. Show us your talent in this challenging, fun, and exciting environment. It's what makes us Apple.
As a Hardware Architect in Apple Information Security, you will: * Own u0026 establish the vision for future generations of security hardware. * Translate security features into high-level HW/SW specifications and derive HW requirements to design a product. * Manage the program seeking to realize the vision - hardware design, development, manufacturing, and deployment. * Map the design concept to available components, developing a bill of materials for manufacturer(s). * Identify suitable components based on requirements. * Validate end-to-end functionality, performance and reliability. * Integrate feedback on current hardware into future designs. * Generate performance projections for future systems. * Research market benchmarks, including performance, cost, and scope of application. * Be challenged to work under pressure and with ambiguity. * Be adept at shifting directions and priorities. * Be detail-oriented and self-motivated. * Demonstrate excellence at multitasking, organizing, and prioritizing complex projects to meet deadlines. * Cultivate your network by meeting new colleagues from across the business.
MS in electrical or computer engineering, or equivalent work experience. Experience in system architecture development, including driver and firmware development. Schematic entry and management of design constraints for high-speed PCB layout using Cadence tools or similar. Exceptional HW/SW problem solving skills. Proven ability to ramp up quickly on new technologies. Experience using test u0026 measurement equipment. Working knowledge of power supply design fundamentals.
BS in electrical or computer engineering, or equivalent work experience. Minimum 8 years relevant industry work experience. Ability to comprehend and develop hardware specifications, component selections, block diagrams, and schematics. Experience leading architecture reviews and approving system specifications. Understanding of security architecture and threat models. Guiding architecture tradeoff decisions at an executive level. Familiarity with DFT, DFM, and DFR principles. Understanding of performance modeling, including power/performance budgeting u0026 simulation tools. Knowledge of hardware/software co-design and interface standards. Ability to create diagrams and make concise presentations to clearly present information to cross-functional teams. Experience in hardware abstraction u0026 firmware interface definition. Self-driven with the ability to work autonomously while managing multiple simultaneous work tracks. Proven leadership of complex system development from concept to production bring-up. Ability to thrive in a self-directed, fast-paced environment, that is highly collaborative and multi-functional. Strong written and presentation skills, able to communicate effectively with engineers and senior leaders. Ability to build and maintain strong internal and external collaborative relationships.
Principal Information Security Architect
Security architect job in Boise, ID
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Security Architect
Security architect job in Washington
At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Security Architect.
Position Summary
We are seeking an experienced Security Architect to lead the design and implementation of secure systems and solutions for a large, complex U.S. government program. This role requires a strategic thinker with deep technical knowledge who can align cybersecurity architecture with mission and compliance requirements. The ideal candidate will collaborate across engineering, operations, and governance teams to develop scalable, resilient, and compliant architectures that support both legacy and modern cloud-based systems.
Key Responsibilities
· Serve as a trusted advisor and “right-hand” to the program lead
· Design, document, and implement secure system architectures in alignment with federal cybersecurity standards and mission objectives.
· Define security requirements for networks, applications, and cloud environments in accordance with frameworks such as NIST 800-53 and NIST 800-207 (Zero Trust)
· Lead architecture reviews, threat modeling, and risk assessments to identify security gaps and propose mitigation strategies.
· Provide security guidance throughout the system development lifecycle (SDLC) and DevSecOps pipelines.
· Develop architecture artifacts, including security diagrams, control mappings, and compliance traceability matrices.
· Support cloud security design and secure integration of COTS/GOTS and open-source solutions in AWS, Azure, or hybrid environments.
· Partner with Information Assurance (IA) and GRC teams to ensure secure and compliant implementations.
· Stay ahead of emerging threats and technology trends to proactively adapt architectural strategy.
Required Qualifications
· 10+ years of experience in information assurance, cybersecurity engineering, and GRC.
· In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP).
· Strong technical foundation with the ability to understand complex systems, architectures, and security configurations.
· Deep understanding of Zero Trust principles, DevSecOps environments, and modern system architecture.
· Experience designing secure systems across multiple domains (cloud, on-premises, hybrid, and mobile devices).
· Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams.
· Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related field
Preferred Qualifications
· Excellent verbal and written communication skills, including experience preparing formal security documentation and reports.
· Prior experience supporting U.S. federal agencies or DoD environments.
· Professional certifications such as CISSP, CISM, CAP, or CCSP.
Why Join SERVISS
Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way.
Freedom to Thrive.
· Be part of an exciting company with ground floor opportunities to include equity
· Highly competitive compensation and best in class benefits
· Opportunities for annual performance bonuses, growth incentives, and profit-sharing
· 100% of medical, vision, dental, and life insurance premiums covered by SERVISS
· 401(k) retirement plan with company match for the first 6%
Note: This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025.
Auto-ApplyEnterprise Security Architect
Security architect job in Bellevue, WA
Enterprise Security Architect Type: 12+ months Contract
Job Description
SR. SECURITY ENGINEER SKILLS & RESPONSIBILITIES
• Act as a trusted technical advisor with key security stakeholders at all levels of the organization for a variety of information security projects that arise from current business and technological developments
• Hands-on experience supporting network, operating system, database, application & data layers across multiple platforms and technologies
• Ability to assess risks and provide innovative countermeasures and solutions that appropriately balance security and business requirements
• Ability to step into an uncontrolled space and bring security structure
• Provide guidance to security analysts, PMs, business partners and IT leadership when new projects are introduced to the business or new risks are identified
SECURITY DESIGN ASSESSOR
• Ability to consult internally with Sr. Engineers (Application, Network, DevOps) to apply security principles and best practices that meet business objectives
• Experience controlling the threat surface area, identifying attack vectors, vulnerabilities and establishing appropriate controls. Can build a threat model
• Evaluation & assessment of compliance to a regulation, law or policy using industry standard methodologies (ISO27001, COBIT, NIST, etc.) in an enterprise environment
Required Qualifications:
INTERNAL TOOLS
• Evaluate, recommend, and implement commercial hardware and software security products to augment and enhance the Company enterprise security program
• Hands-on experience installing, configuring, and supporting security related hardware and software such as Certificate Management, Remote Connection, Network Protection, Data Loss Prevention, File Integrity Monitoring, Security Auditing & Logging, and Vulnerability Management
• Ability to learn a new technology and drive it from ideation through deployment and integration to fully automated and operationalized
• Ability to automate basic integration, data collection, scripting and reporting tasks via secure coding standards
TEAMMATE
• Ability to work on multiple tasks simultaneously, set priorities, communicate delivery expectations, and meet deadlines
• Innovative, collaborative and able to solve problems independently
• Able to work within the team to build measurable, repeatable processes
• Strong verbal and written communication skills
QUALIFICATIONS
• 5+ years of IT infrastructure proficiency and experience that could include one or more of: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (OS, WAF), Proxies, Gateways, Routers, VPN, Application Security SAST/DAST, etc.
• 5+ years information security experience preferred
• Proven ability to assess and influence capital project design and delivery decisions
• Proven ability to assess, recommend, deploy and integrate Information Security tools
• Foundational understanding of several enterprise environment technologies
• Working knowledge and experience in multiple ISC2 security domains
• Familiarity with current legal and regulatory requirements around information security and privacy, including PCI, SOX, HIPAA, GLBA, etc
• Ethical Penetration Testing experience preferred
• Available for work in Bellevue, WA (Factoria)
• CISSP Preferred
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Architect
Security architect job in Bellevue, WA
-We are an equal opportunity employer and committed to diversity.
Why us? We are seeking a passionate technical security professional to join our client's team in Bellevue. You will work cross-functionally to understand the linkage between business goals, business architectures, technology and security architectures - and strive to further business goals via evolution of architectures.
Our client is one of the world's leading Telecommunications organization delivering outstanding wireless experiences to more than 63 million customers.
Job Description
Job Type : Full Time
Job Location : Bellevue, WA
Compensation : $130K - $155K + Full Benefits
As a Principal Architect, you'll be required to:
* Drive the evolution of security infrastructure, processes, products, and services by influencing decision makers.
* Compile, deliver, and evangelize end-to-end technology and security roadmaps that guide the evolution of security infrastructure, products, and services by applying depth and breadth of expertise in multiple related disciplines.
* Responsible for building effective working relationships, making sound decisions, successfully making changes, initiating action and achieving results.
* Compile, develop, deliver, and evangelize end-to-end technology and security roadmaps that guide the evolution of security services, practices, products, and infrastructure by applying depth and breadth of expertise in multiple related disciplines.
Qualifications
We'd love to talk to you, if:
* You've more than 7 years of technical security solutions experience in a combination of relevant Security areas.
* You've strong experience implementing information security architecture concepts, principles, methods, and components.
* You've strong experience implementing Information Assurance principles and organizational requirements relevant to confidentiality, integrity, availability, authentication, non-repudiation.
* You've working knowledge of IT architectural concepts and frameworks.
* You've strong experience with network protocols such as TCP/IP, UDP, DHCP, DNS, and HTTP.
* You've strong knowledge of cryptology and encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES).
Additional Information
I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
Principal Cloud Security Architect
Security architect job in Seattle, WA
Role OverviewThe Principal Cloud Security Architect evaluates cloud architectures, identity models, permissions, and security controls across large-scale environments. This role focuses on identifying architectural risks, misconfigurations, and long-term security design gaps.
What You'll Do- Assess cloud architectures (AWS, Azure, GCP) for security gaps - Review IAM configurations, network segmentation, and resource policies - Identify misconfigurations, privilege risks, and insecure patterns - Summarize architectural flaws and provide structured mitigation guidance - Validate alignment with security frameworks and best practices - Support recurring assessments of cloud environments and deployment patterns What You BringMust-Have:- Deep experience in cloud security architecture - Strong understanding of IAM, network design, and cloud service models - Ability to document complex architectures in clear, structured form Nice-to-Have:- Experience with multi-cloud, zero-trust, or high-compliance environments
Auto-ApplyData Security Architect - Seattle, WA
Security architect job in Seattle, WA
Data Security Architect is a member of the IDW (Integrated Data Warehouse) Data Architecture team focused on T-Mobile's latest Hadoop/Teradata Data Warehouse platform. This person will own the data warehouse data security strategy and ensure the new data warehouse complies with T-Mobile security standards as listed by
CIS (Corporate Information Security department).
-->This role will own the security design on IDW (Integrated Data Warehouse) from the data architecture side and will work with strategic vendors, CIS, and other
vendor partners to design overall data warehouse security and to ensure IDW security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata
-->As a member of the Data Architecture team you will own the security design of T-Mobile's newest Hadoop/Teradata data warehouse implementation.
-->Work with strategic vendors and internal CIS (corporate information security) and other vendor partners to design the security controls and to ensure the IDW
security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata
-->Collaborate with team members, peers and the business unit management team to determine technical information security requirements and planned remediation
-->Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures.
Qualifications:
-->Strong understanding of encryption, obfuscation and/or tokenization technologies
-->Candidate must have strong technical, influential and organizational skills.
-->Candidate should be knowledgeable about Hadoop and Teradata security best practices
-->Candidate should be knowledgeable about Hadoop and Teradata security best practices
-->Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience.
-->Demonstrated ability to work effectively in a complex matrixed environment.
-->Outstanding verbal and written communication skills.
-->Ability to translate security requirements into business risks and impacts.
-->Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA.
-->Appropriate industry certifications, such as CISSP, CISA or CCIE.
-->Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline.
-->Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred.
Additional Information
Please forward resume to my Mail Id, as mentioned below, keep subject line as job title & location.
Email id: ********************
Phone: ************* Ext - 345
Easy ApplyGoogle Cloud Security Architect
Security architect job in Seattle, WA
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies
As a Consultant or Senior Consultant, you will collaborate with cross-functional teams, including IT, security, and business units, to design and implement Google Cloud-based application innovation solutions. You will work alongside experienced cloud architects, data scientists, and other specialists, ensuring the successful delivery of scalable, cloud-native applications and AI-powered solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this position the base salary pay ranges are listed below. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
East Bay, San Francisco, Silicon Valley:
* Consultant: $120,000-$177,000
* Senior Consultant: $140,000-$203,000
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Consultant: $110,000-$162,000
* Senior Consultant: $130,000-$186,000
All other locations:
* Consultant: $105,000-$148,000
* Senior Consultant: $115,000-$171,000
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
We are accepting applications until 12/31.
Chief Information Security Officer (CISO)
Security architect job in Seattle, WA
NOTE TO APPLICANTS: Individual(s) must be legally authorized to work in the United States without the need for immigration support or sponsorship from Milliman now or in the future
The Chief Information Security Officer (CISO) is a senior-level executive responsible for developing, implementing, and overseeing Milliman's global information security program. As a member of Global Corporate Services (GCS) reporting directly to the Chief Information Officer (CIO) and working closely with the CEO, Board of Directors, and Equity Principals, the CISO ensures the confidentiality, integrity, and availability of Milliman's information assets, technology infrastructure, and data across all practices and geographies.
This role provides strategic leadership, vision, and governance for all aspects of information security, aligning security initiatives with business objectives and regulatory requirements.
RESPONSIBILITIES:
Strategic Leadership & Governance
Drive the information security function across Milliman, ensuring alignment with organizational goals.
Establish and implement a global information security vision and strategy by collaborating with the Board, senior leaders, and Equity Principals.
Design and deliver the security roadmap, including staffing and budget plans, and manage the approved corporate information security budget.
Serve as an expert advisor to the Board and senior leadership on IT security matters.
Facilitate organization-wide security enhancements that integrate business objectives with IT infrastructure, physical infrastructure, and human resources.
Act as the primary change agent facilitating information security improvements in security culture, business relationships, and product/service design.
Chair the Security Technology Steering Group (STSG).
Risk Management & Compliance
Collaborate with senior leadership on IT-related risk management to identify, assess, and address risks.
Oversee the development, implementation, and maintenance of global information security policies, standards, guidelines, and procedures.
Ensure compliance with relevant laws, regulations, and industry frameworks (e.g., ISO 27001, HIPAA, HITRUST, SOC 2).
Partner with the Legal Department to maintain a collaborative approach to information security and privacy.
Manage third-party/vendor security risk programs and ensure alignment with corporate policies.
Serve as a voting member of the Enterprise Risk Management Committee and Technology Operations Committee and act as a key advisor to senior leadership on IT security matters.
Incident Response & Operational Oversight
Oversee emergency procedures and incident response protocols, serving as the control point during significant security incidents.
Direct teams to detect, report, contain, and mitigate incidents impacting data and infrastructure security.
Oversee periodic security reviews of all business units and present findings to the Enterprise Risk Committee and Board.
Partner with the Legal team in response to privacy incidents and significant events.
Collaborate with IT teams to develop, evaluate, and improve network disaster recovery plans.
Maintain relationships with law enforcement and relevant government agencies in support of the information security program.
Program Development & Stakeholder Engagement
Develop and implement enterprise-wide security awareness training.
Build and report on metrics and KPIs to measure program effectiveness.
Recommend security enhancements and purchases consistent with evolving threats and strategic objectives.
Stay current on technological advances and identify opportunities for adoption within Milliman.
Provide coordination, communication, and dissemination of best practices across the organization.
Support Equity Principals and their practices in security-related matters consistent with GCS service expectations.
SKILLS & QUALIFICATIONS REQUIRED:
Bachelor's degree in Computer Science, Computer Engineering, Information Systems, or related discipline.
The ideal candidate must possess certification (s): Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM)
The ideal candidate must have 10+ years in management of business or technology organizations, with demonstrated competency in strategic thinking, leadership, and relationship management, and enterprise-level responsibility.
The ideal candidate must have 7+ years of direct management experience overseeing security teams and budgets.
The ideal candidate must have previous experience with regulatory compliance frameworks such as ISO 27001/2, HIPAA, HITRUST, and SOC 2.
The ideal candidate must have previous experience with cloud security control design and management experience.
The ideal candidate must have thorough knowledge of finance, budgeting, project management, and systems development lifecycle.
The ideal candidate must have knowledge of security domains such as auditing, policy, database security, firewall design and implementation, risk analysis, identity management, access management, and web services.
Must have demonstrated leadership in multi-discipline, high-performance teams, including supervision and professional development of technical staff.
Must have proven ability to work with geographically diverse offices in a global organization.
Must have excellent verbal and written communication skills, including the ability to prepare documentation, policies, and build consensus across broad groups.
Must have the ability to deal effectively with concrete, tangible issues as well as abstract, conceptual matters.
Must demonstrated thought leadership in information security and creating innovative, scalable business solutions with the ability to lead and motivate cross-functional, interdisciplinary teams.
Must have strong time management skills, ability to handle multiple projects concurrently, and the capacity to be flexible and nimble as business needs change and evolve.
SKILLS & QUALIFICATIONS PREFERRED:
Advanced degree (master's or PhD) in Information Security, Computer Science, or related field.
Experience within consulting or professional services organizations.
Familiarity with enterprise-level cloud technologies, defect tracking tools, agile management tools, and Microsoft Suite.
Additional certifications (e.g., GIAC, CCSP, CRISC, PMP).
LOCATION:
This is a remote role. The expected application deadline for this job is December 15
th
, 2025
COMPENSATION:
The overall salary range for this role is $203,200 - $397,210. For candidates residing in:
Alaska, California, Connecticut, Illinois, Maryland, Massachusetts, New Jersey, New York City, Newark, San Jose, San Francisco, Pennsylvania, Virginia, Washington, or the District of Columbia the salary range is $233,680 - $397210.
All other locations the salary range is $203,200 - $345,400.
A combination of factors will be considered, including, but not limited to, education, relevant work experience, qualifications, skills, certifications, etc.
BENEFITS:
We offer a comprehensive benefits package designed to support employees' health, financial security, and well-being. Benefits include:
Medical, Dental and Vision - Coverage for employees, dependents, and domestic
Employee Assistance Program (EAP) - Confidential support for personal and work-related
401(k) Plan - Includes a company matching program and profit-sharing
Discretionary Bonus Program - Recognizing employee
Flexible Spending Accounts (FSA) - Pre-tax savings for dependent care, transportation, and eligible medical expenses.
Paid Time Off (PTO) - Begins accruing on the first day of Full-time employees accrue 15 days per year, and employees working less than full-time accrue PTO on a prorated basis.
Holidays - A minimum of 10 paid holidays per
Family Building Benefits - Includes adoption and fertility
Paid Parental Leave - Up to 12 weeks of paid leave for employees who meet eligibility
Life Insurance & AD&D - 100% of premiums covered by
Short-Term and Long-Term Disability - Fully paid by
ABOUT MILLIMAN:
Independent for over 75 years, Milliman delivers market-leading services and solutions to clients worldwide. Today, we are helping companies take on some of the world's most critical and complex issues, including retirement funding and healthcare financing, risk management and regulatory compliance, data analytics and business transformation.
Milliman invests in skills training and career development and gives all employees access to a variety of learning and mentoring opportunities. Our growing number of Milliman Employee Resource Groups (ERG's) are employee-led communities that influence policy decisions, develop future leaders, and amplify the voices of their constituents. We encourage our employees to give back to their varied professions, including leadership in professional organizations. Please visit our web site (****************************************** to learn more about Milliman's commitments to our people, inclusion, and sustainability.
Through a team of professionals ranging from actuaries to clinicians, technology specialists to plan administrators, we offer unparalleled expertise in employee benefits, investment consulting, healthcare, life insurance and financial services, and property and casualty insurance.
EQUAL OPPORTUNITY:
All qualified applicants will receive consideration for employment, without regard to race, color, religion, sex, sexual orientation, national origin, disability, or status as a protected veteran.
Blue Team DART - Senior Security Analyst
Security architect job in Seattle, WA
We exist to wow our customers. We know we're doing the right thing when we hear our customers say, "How did we ever live without Coupang?" Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce.
We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day.
Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world.
Role Overview
As our Cyber Security Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks.
The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis.
The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices.
What You Will Do
Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report
Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources
Ticket review, and security analysis escalated from SOC
Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare)
Analyze and respond to Email Security events
Oncall to response urgent security events or security issues
Collaborate effectively with internal teams through efficient communication
Minimum Qualifications
Bachelors Degree in Computer Science or a related technical field or equivalent professional experience.
2 years of experience in information Security with experience in Cyber Security Incident Analysis
Preferred Qualifications
8+ years of experience in information security with at least 5+ years as a Cyber Security Incident Analyst
Experience of Host based security investigation (Windows, Linux, Network/Security appliances)
Experience of analyzing security event and knowledge of AWS or Cloud environment
Experience of analyzing security event from Web security solutions (Akamai, CloudFlare)
Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc)
Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc)
Experience and skills querying SIEM Solutions for analyzing security events from the logs
Skill to analyze big data or big size logs
Experience in Automation and Scripting using Bash, Python, PowerShell
Proactive and proactive work attitude
Pay & Benefits
Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $108,000/year in our lowest geographic market to $232,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience.
General Description of All Benefits
Medical/Dental/Vision/Life, AD&D insurance
Flexible Spending Accounts (FSA) & Health Savings Account (HSA)
Long-term/Short-term Disability
Employee Assistance Program (EAP) program
401K Plan with Company Match
18-21 days of the Paid Time Off (PTO) a year based on the tenure
12 Paid Holidays
Paid Parental leave
Pre-tax commuter benefits
MTV - [Free] Electric Car Charging Station
General Description of Other Compensation
"Other Compensation" includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale.
Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate.
If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************.
Requisition # R0064937
Auto-ApplySenior Security Analyst
Security architect job in Seattle, WA
Join us in stopping bad bots, for good! Kasada protects millions of online users everyday. Founded to stop automated bot attacks, we believe the internet should be a safe place for everyone. Bad bots are highly destructive. They take over accounts, steal content, overload systems and infrastructure and cause billions of dollars in damages every year. Seeking to restore trust in the internet, Kasada stops bots at the very first request including those that have never been seen before.
We've grown from a few friends working out of a shipping container under the Sydney Harbour Bridge to now operating globally, we're spread across the world protecting some of the most well-known brands on the face of the earth.
We're an innately curious team that's not afraid to bring bold ideas to create better ways of solving problems. We're looking for people who are passionate about solving some of the most difficult and pressing cybersecurity issues, while having fun doing it!
The Role
We're currently on the lookout for a Senior Security Analyst to join our Security Operations team, focused on taking on complex and high impact unwanted automation for our customers. This role will require you to act as an escalation point for other analysts, handle investigations end to end, and contribute to improving our investigative methods and tooling. Your experience in a similar role in a cyber security environment will be highly regarded.
This position will allow you to apply your analytical skills in the fight against bad bots. Working with some of the world's biggest companies, you'll help reduce the damage caused by unwanted automation, while sharing your expertise and supporting our team.
This is a remote role, to ensure timezone overlap with our Australia-based team candidates should be located on the West Coast. What you will be doing;
Lead complex investigations and in-depth analysis of automated software activity within customer environments, driving cases to resolution.
Act as an escalation point for incident response and threat detection, providing expert guidance on challenging or ambiguous cases.
Apply and optimise a range of investigative tools and techniques to uncover patterns, anomalies, and root causes.
Collaborate across teams to provide clear, actionable advice on complex investigations and contribute to improving detection and response processes.
What you will bring;
Demonstrable, recent experience in cybersecurity or IT security roles.
Significant experience identifying and mitigating security risks in a web application or similar environments.
Solid understanding of security frameworks, incident response methodologies, and threat intelligence.
Familiarity with analytical security tools (e.g., Splunk, ElasticSearch, SQL, NoSQL databases).
Solid knowledge of web technologies (TCP stack, HTTP/S, WebSockets, Browser Architectures, Operating Systems)
Subject matter knowledge and awareness of automated cyber security attacks and/or bot groups.
Relevant certifications (e.g., CISSP, CISM, CEH, Bachelors degree in a relevant field) are desirable but not essential.
Critical and analytical mindset with proven ability to make sound, timely judgments.
$140,000 - $175,000 a year The Benefits of being a Kasadian
We want to ensure Kasada remains a great place to work and a place to do great work. It's important to us to build an inclusive environment where you can realize your full potential. We are a highly collaborative team regardless of location, placing a strong emphasis on our core values; and we have designed our benefits package so you can thrive, both inside and outside of work:
- A stake in Kasada's global success with equity/stock options - Flexible working hours and arrangements - Create a schedule that suits you - Support for growing families - Generous parental leave allowances and resources to help in the lead up, during and after parental leave. - Resources for well-being to support your growth including our EAP - confidential counselling for you and your loved ones - Birthday leave - Wellness leave - An action packed calendar of fun in-person and virtual events
Sound interesting? What's next?
Hit the apply button and one of our team will set up an exploratory, confidential discussion. We have designed our hiring process to be streamlined and thorough so everyone can make the right call on whether it is the right move for you. We are an inclusive team and this extends to all candidates that interview with us. Interviews are conducted virtually however if you want to come onsite - just ask! When you apply, please tell us the pronouns you use and any adjustments you may need during the interview process, we want to ensure you are set up for success in every conversation.
Still with us? Just a little bit more…
Research shows that women and other marginalized individuals tend to only apply when they check every box. We're always keen to broaden our perspective, so if you think you have what it takes, but don't necessarily meet every single point above, please still get in touch, we'd love to have a chat and see if you could be a great addition to the team!
Please note: Kasada is an e-verify employer (US based applicants only)
Auto-ApplyInformation Systems Security Officer
Security architect job in Washington
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
None
Clearance Level Must Be Able to Obtain:
None
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Security Information, Security Monitoring, Security Requirements, Security System Design, System Security
Certifications:
None
Experience:
7 + years of related experience
US Citizenship Required:
No
Job Description:
Seize your opportunity to make a personal impact as an Information Systems Security Officer supporting the Case Management Modernization (CMM) Program. The CMM program is an initiative to support the Administrative Office of the US Courts (AO) in developing a modern cloud-based solution to support all 204+ federal courts across the United States.
GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. The Information Systems Security Officer will work as part of the CMM Enterprise Data Warehouse (EDW) team to deploy a secured cloud-native EDW platform and support the statutory and operational reporting, data cataloging, and other analytical objectives.
RESPONSIBILITIES:
Provide subject matter expertise for implementing secure by design concept into development to include security design principles, data protection, threat and vulnerability management, compliance and governance, threat and vulnerability management, and performance risk assessments.
Provide an advanced level of information security expertise needed to solve difficult challenges pertaining to the design and implementation of information security solutions, which may include, but is not limited, to networking, operating system, application and database security relative to both techniques and technologies.
Identify, document, and automate the integration of security controls into the enterprise architecture and system development life cycle process enabling ongoing (continuous) security monitoring, automated security authorization, and transparent risk reporting.
Gain organizational approval for the design and architecture of security requirements for cloud environment including the DWaaS component. Implement and maintain upon approval.
Design, implement and maintain layered system security architectures encompassing software, hardware, and communications to support the requirements and provide for present and future cross-functional needs and interfaces.
Provide subject matter expertise and hands-on guidance to teams for embedding secure-by-design principles throughout the product lifecycle, including threat modeling and secure coding practices.
Design and implement cloud workloads, services, databases, etc. with security as a primary consideration, including network segmentation, granular access control, data protection, and encryption and zero trust principles.
Integrate automated security testing in the CI/CD pipelines enabling real-time feedback and rapid remediation of vulnerabilities during development and deployment.
Collaborate with the AO Information System Security Office (ISSO) to schedule periodic penetration testing and conduct vulnerability assessments.
Provide monthly and ad hoc reports on identified vulnerabilities, remediation actions, and security breaches covering all access layers (database, application, infrastructure). Include trend analysis and recommendations for continuous improvement.
Maintain a risk register and track mitigation process.
Propose, implement, and validate security risk mitigation activities for all non-production and production environments with documented evidence of effectiveness.
Validate successful implementation of risk mitigation activities for all non-production and production environments.
Develop and maintain all Cloud Security Documentation: System Security Plan, Business Continuity Analysis, Disaster Recovery Plan, other documents required for Authority to Operate (ATO).
Create and maintain a Cloud Security Roadmap, provide updates quarterly and obtain organizational approval for all security architecture and design artifacts.
Implement and document technical and administrative controls to protect sensitive data from unauthorized internal access, including logging, monitoring, and access reviews.
Provide operational support for identity and access management (IAM) with granular role-based access controls, integration with on-premises identity management solutions in accordance with Judiciary enterprise security standards and cloud identity solutions and enable product teams to maintain a private image catalog for team specific isolation.
Support secure design and operation of multi-segment networks, multiple subnets, and virtual network routing, with regular security assessments and documentation.
Provide product teams with and enforce approved standards for logging and data retention, ensuring logs are protected, searchable, and compliant with regulatory requirements.
Document and maintain Standard Operating Procedures (SOPs) for cyber security.
Automate repetitive security tasks (e.g., patching, compliance checks, incident response) to improve efficiency and reduce human error.
Implement regular reviews and updates of security controls, policies, and procedures to address emerging threats and technological changes.
Implement regular reporting on security KPIs (e.g., mean time to detect/respond, vulnerability remediation time, compliance status) to demonstrate effectiveness and inform decision-making.
Establish a process for ongoing assessment and improvement of governance controls.
Provide guidance and recommendations to stakeholders for containment, validation, and eradication, and support remediation and recovery of incidents (including coordination, documentation, timeline tracking, and resource identification/utilization).
REQUIRED EXPERIENCE & QUALIFICATIONS:
7+ years of experience project leadership in monitoring computer networks and security issues, investigating and resolving security and cybersecurity incidents.
Bachelor's degree in Computer Science, Computer Programming, Computer Engineering or relevant computer-based major.
Preferred: Certified Information Systems Security Professional (CISSP).
Preferred: Architect certification from at least one of the cloud service providers (CSPs).
Experience in documenting security incidents and performing security vulnerability assessments.
Experience working with Agile teams and SAFe to perform testing and uncovering system and network vulnerabilities.
Strong working experience in AWS Cloud Security (Certification is preferred) (3+ years' experience).
Required past ATO experience in AWS environment for large agency. (4+ years' experience).
Required solid understanding of NIST Standards.
Experience with the ATO process, FedRAMP, CIS, ISO 27001. (4+ years).
Solid understanding on ICAM, SIEM, Vulnerability management tools.
Experience with CSAM or similar tools.
The likely salary range for this position is $127,500 - $172,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Remote
Work Location:
USA DC Washington
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyNetwork Security Architect
Security architect job in Auburn, WA
Job Description
.
Our Client is seeking an experienced Senior Network Security Engineer to build and support our customer infrastructure environment based in San Jose, CA. Duration: Long Term (Possibility of Further Extension)
The ideal candidate will have hands-on architect, and setup expertise in network and security technologies, including Cisco Firepower NGFW, LAN/WAN/VPN, and F5 load balancing, as well as experience with proxy solutions, SFTP, and vulnerability management tools such as Tenable. Prior experience in manufacturing environments is a strong plus.
Key Responsibilities:
• Design, implement, and maintain secure network infrastructure across LAN, WAN, and VPN environments.
• Configure, manage, and troubleshoot Cisco Firepower Next-Generation Firewalls (NGFW).
• Support proxy/Next-Gen firewall setups to enhance network security and performance.
• Deploy and maintain F5 load balancers to optimize traffic and ensure high availability.
• Manage and secure SFTP configurations for data transfers.
• Utilize Tenable for vulnerability assessment, monitoring, and remediation support.
• Ensure compliance with security policies, standards, and best practices.
• Collaborate with cross-functional teams (network, systems, and security operations) to implement secure solutions.
• Document infrastructure configurations, processes, and operational procedures.
Required Skills:
• 5+ years of hands-on experience in network security engineering.
• Strong expertise in Cisco Firepower NGFW, LAN/WAN/VPN technologies.
• Experience with SED, Proxy/Next-Gen Firewalls, and F5 load balancing.
• Knowledge of SFTP configurations and management.
• Familiarity with Tenable or other vulnerability management tools.
• Excellent troubleshooting and analytical skills.
• Strong communication and documentation abilities.
Preferred Skills:
• Experience working in manufacturing environments.
• Relevant certifications such as CCNP Security, F5 Certified, CISSP, or CEH.
If interested, please send us your updated resume at
hr@dawarconsulting.com/***************************
Easy ApplyInformation Security Manager
Security architect job in Seattle, WA
Guide security policy and participate in broader Information Security governance efforts.
Develop and maintain the Information Security Management System (ISMS) in collaboration with regional information security SMEs and technical consultants.
Oversee and manage the ISMS and recommend appropriate mitigating controls.
Oversees Information Security Risk Management activities, including risk identification, assessment, and communication to relevant interest holders.
Provide valuable expertise and leadership directly to the governing Joint Board executive leadership, including sharing metrics to reflect the performance of the regional security program functions, executive risk score reports, and other guidance on a variety of information security topics.
Facilitate a committee of Information Security SMEs across the Agencies to ensure both regional compliance and concurrence on information security-related matters, recommending solutions, and working from the regional perspective to achieve optimal solutions.
Collaborate with the Systems Integrator, other vendors, and partner Agencies to ensure security best practices, standards, policies, and regulatory requirements are incorporated into core payment system design, implementation, and sustainment, as well as support other future phase projects.
Conduct regular security reviews of both software and processes, advising on information security practices. Reviews and creates threat models and recommends security enhancements consistent with information security strategy and evolving threats.
Support external IT security audits and assessments that focus on operation.
Develop, update, implement, and conduct information security training programs to support the ISMS objectives.
Manage approvals for Identity and Access Management (IAM) and Access Control Administration.
Act as Incident Commander for Security Incident Response activities, whenever the Information Security Incident Response Plan is invoked by the regional program; play an interest holder and oversight role if the plan is invoked by other partners or vendors.
Participate in information security incident investigation and response efforts; perform root-cause analysis when incidents occur and prepare incident reports.
Evaluate change requests to determine potential impacts to Information Security, including IT systems, processes, policies, and provide appropriate input to the Change Management process.
Coach future Regional Operations Team (ROOT) information security personnel as the ISMS becomes complete and mature.
Keep up to date on latest information security trends, "best practices", threats, and countermeasures.
Required Skills and Qualifications:
Enterprise-level information security plans, policies, standards, guidelines, methods, and practices based on current industry standards, best practices, tools, and techniques.
Information Security Management Systems, and applicable industry standards (ISO 27001/2).
Pertinent federal, state, and local laws, codes, and regulations; particularly those that affect information security for payment systems.
Environments subject to the Payment Card Industry Data Security Standard (PCI DSS), including compliance-related duties.
Knowledge and understanding of developing and administering information-security standards, practices, audits, risk management, and policy compliance.
Information Security Audit principles and practices.
Knowledge of one or more governance frameworks such as COBIT 5, ISO, NIST, or COSO.
Strong understanding of IT Service Delivery (ITIL) core processes and methodologies.
Principles, methods, and techniques used in the facilitation of managing projects and leading teams.
Relevant experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography.
In-depth knowledge of security software threats and vulnerability mitigation techniques.
Working knowledge of cloud platforms such as Azure/ AWS and relevant security controls.
Establishing and maintaining collaborative working relationships with other department staff, management, vendors, and other interest holders.
Documenting and explaining risks, recommendations, and incident data to technical interest holders.
Interpreting and administering information security policies, standards, and procedures sufficiently to administer, discuss, resolve, and explain them to staff and other constituencies.
Leading or supporting an Information Security Management System.
Generating metrics and preparing reports to facilitate decision-making on security-related activities.
Utilizing personal computer software programs affecting assigned work and in compiling and preparing spreadsheets and reports.
Responding to inquiries with effective oral and written communication.
Researching, analyzing, and evaluating new security processes, products, and techniques.
Excellent time management skills including the ability to prepare, prioritize, and complete work plans.
Working effectively under pressure, meeting deadlines, and adjusting to changing priorities.
Writing of technical documentation and standards, including skill in English usage, spelling, grammar, and punctuation
Required Certifications or Licenses:
At least one of the following (in valid status):
Certified Information Systems Security Professional (CISSP).
Certified Information Security Manager (CISM).
Certified Information Security Auditor (CISA).
Other industry relevant certifications in the fields of information security, project management, auditing and/ or risk management, such as the Certification in Risk and Information Systems Control (CRISC)
Preferred Skills and Qualifications:
Knowledge of Governance, Risk, and Compliance (GRC) tools.
Principles of leadership, supervision, training, and performance evaluation.
Extensive knowledge of risk-based methodologies, and one or more of the following frameworks: ISO 27001/2:2017, 27005:2011, and 31000; PCI-DSS; or NIST 800-53.
Duration:11/07/2025 to 2/28/2026
Location: Downtown Seattle (Hybrid)
M-F: 8 AM to 5 PM
Hybrid: 3 days work onsite
Pay: $75 per hour
Sr Ent Information Security Manager
Security architect job in Bellevue, WA
Bellevue Telecommunications Services Exp 10-15 years Deg Bachelors Relo Bonus Job Description The Information Security Manager, working with in Corporate Information Security Team will be responsible for liaising with assigned business units on behalf of Corporate Information Security (CIS). These responsibilities will include understanding business-driven projects that involve network and information security, applications, networking and web based technologies. They will be responsible for understanding the Business Unit's processes and priorities and working with them to manage business impact and threats, through a risk based methodology. Ensures through positive engagement that business goals are met in a secure and compliant manner, according to industry standard regulations
Qualifications
Ideal Candidate will have:
Candidate must have strong technical, influential and organizational skills.
Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience.
Expert relationship building and partnering skills, including persuasion, negotiation and consensus building.
Experience translating emerging IT and business trends into meaningful risk reduction opportunities.
Demonstrated ability to work effectively in a complex matrixed environment.
Outstanding verbal and written communication skills.
Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement.
Ability to translate security requirements into business risks and impacts.
Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA.
Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls.
Appropriate industry certifications, such as CISSP, CISA or CCIE.
Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline.
Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred.
Skills and Qualifications:
A broad, enterprise-wide view of the wireless (or similar) business and understanding of strategy, processes and capabilities, enabling technologies, and governance. Experience in telecommunications, internet service provider, or application service providers a plus.
The ability to apply Information Security principles to business solutions.
Extensive experience planning and deploying both business and technology security initiatives.
Exceptional communication skills and the ability to convey results in a summarily and persuasive manner to business owners. This includes written and verbal communications as well as visualizations.
The ability to act as liaison conveying information needs of the business to technology teams and technology constraints to the business.
Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI.
Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks.
Understanding of Local (Wired & Wireless), Wide area, and mobile networks.
A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS.
Strong background and experience in IP Networking and Routing Protocols.
Fluency in the use of all MS Office applications, including SharePoint services.
Qualifications
· Preferred: Any of the following
CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt
Education
Minimum Required
High School Diploma/GED
Education/Vocational Training/Experience Preferred
Bachelor's degree in Computer Science, Information Technology or related field from an accredited 4-year college or university
10 years of system, network, and application design and architecture experience. Preferably in the wireless communications space
CISSP and or CISM Certification (required; experience may be substituted for Cert requirements (4 years minimum)
CISA Certification (preferred but not required; experience may be substituted for Cert requirements (4 years minimum)
Responsibilities
What you will do:
Make proactive assessments of threat information in and outside the public domain, understanding the threat as it relates to its customers, and implementing measures to combat the threat.
Understand the operations of the business and comprehend how these create value and risk for the organization.
Collaborate with team members, peers and the business unit management team to determine technical information security requirements, planned remediation, and advocate for the program to gain resources to implement appropriate protection technologies and processes.
Implement and monitor controls necessary to ensure operational processes are performed and are effective to protect the environment from all forms of malicious cyber activity.
Assist the Governance group in the development and refinement of technical security standards, key performance indicators and other necessary processes to maintain effective operational security, as it relates to the business.
Make risk-based decisions on a daily basis that has the potential to impact our ability to operate and communicate.
Ensure the information and network security controls for us are appropriate and operating as intended; includes solutions that are directly controlled as well as security solutions that are operated by other internal and external groups.
Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program.
Interact with internal audit, third party auditors, and appropriate regulatory bodies.
Support the Information Security policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance.
Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
Senior Cloud Security Analyst
Security architect job in Washington
GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud Security Analyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position
Minimum Qualifications
Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience.
Preferred Qualifications
4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling
Work Schedule
Monday - Friday, 8am - 5pm (occasional evenings and weekends)
Information Systems Security Officer (ISSO)
Security architect job in Washington
Avint, LLC is seeking a highly skilled and mission-driven Information System Security Officer (ISSO) to join our team. The ideal candidate will bring deep technical expertise, hands-on experience securing complex systems, and a strong understanding of U.S. Government cybersecurity standards. This role requires a cybersecurity professional who can confidently lead system authorization activities, oversee compliance efforts, and ensure the security and integrity of both cloud and on-premises environments.
Candidates must be U.S. citizens with an active Top Secret clearance and SCI eligibility, hold a DoD 8570 certification (such as CISSP or Security+), and be comfortable working on-site in Washington, D.C. or across the DC Metro area five days per week. This position also requires the ability to travel domestically and internationally up to 25%.
Requirements
Position Requirements:
U.S. citizenship
Active U.S. DoD Top Secret clearance with SCI eligibility
Active DoD 8570 certification (e.g. CISSP, Security+)
Be on site in Washington, DC or customer location in the DC Metropolitan area 5 days per week
Ability to travel domestically and internationally up to 25% of the time
Background in systems administration, software development, systems engineering, and/or deep familiarity with Linux operating systems
Experience with risk management framework (RMF) software systems (eMASS, Xacta, etc)
Experience with information system scanning utilities (Nessus, OpenSCAP, etc)
Experience with cloud and on premises environments
Experience assessing and authorizing IT systems against U.S. Government standards such as FISMA, FedRAMP, and NIST SP 800-53
Benefits
Joining Avint is a win-win proposition! You will feel the personal touch of a small business and receive BIG business benefits. From competitive salaries, full health, and generous time off and Federal Holidays. Additionally, we encourage every Avint employee to further their professional development. To assist you in achieving your goals, we offer reimbursement for courses, exams, and tuition. Interested in a class, conference, program, or degree? Avint will invest in YOU and your professional development!
Salary range $110,000 to $115,000
Auto-ApplyDirector, Chief Information Security Officer (CISO)
Security architect job in Helena, MT
Job Description
.
Director, Chief Information Security Officer (CISO)
The Staff Pad is seeking a Chief Information Security Officer (CISO) on behalf of a leading healthcare organization in Helena, Montana.
This executive leader will establish and maintain the enterprise security vision, strategy, and program to safeguard all information assets-including PHI and sensitive clinical, administrative, and operational data. The CISO will oversee risk management, regulatory compliance, security operations, incident response, and the development of a strong security culture across the organization. This role requires both strategic leadership and deep technical expertise within the healthcare sector.
Position Overview
The CISO leads the enterprise cybersecurity program, ensuring the protection of systems, data, and clinical technologies while supporting patient safety and operational continuity. This leader will oversee governance, risk, compliance, and security operations, working closely with executive leadership to guide security strategy and response.
Key Responsibilities
Strategic Leadership & Governance
Develop and execute a long-term information security strategy aligned with organizational goals.
Build and maintain an enterprise security framework (NIST CSF, 405D, ISO 27001, HITRUST, etc.).
Advise executive leadership and the Board on security posture, threats, and mitigation plans.
Manage the information security budget and security technology investments.
Risk Management & Compliance
Lead enterprise risk assessments and prioritize mitigation initiatives.
Ensure compliance with HIPAA/HITECH, GDPR, and other relevant data privacy regulations.
Oversee creation and enforcement of security policies, procedures, and standards.
Direct internal and external audit readiness and remediation (HITRUST, SOC 2, etc.).
Manage a robust vendor and third-party risk management program.
Security Operations & Incident Response
Lead security operations, including threat/vulnerability management, IAM, SIEM, and endpoint protection.
Oversee development and testing of Incident Response, Disaster Recovery, and Business Continuity plans.
Serve as executive incident manager during security events, breaches, and investigations.
Ensure security of EHR systems, medical devices, and clinical technologies.
Team Leadership & Security Culture
Build and lead a strong GRC and SecOps team.
Drive organization-wide security awareness and training initiatives.
Partner with IT, Clinical Operations, Legal, HR, and other departments to embed security into systems and workflows.
Required Knowledge & Experience
Minimum 7 years of progressive experience in Information Security; senior leadership or CISO-level experience preferred.
Strong healthcare industry background, including understanding of EHR systems and PHI protection.
Proven expertise in enterprise cybersecurity architecture, IAM, cloud security, and threat detection tools.
Demonstrated experience conducting and managing enterprise risk assessments.
Education
Security Engineer, Operating Systems
Security architect job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyInformation Systems Security Officer
Security architect job in Camas, WA
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security
posture for information systems and as such, works in close collaboration with the ISSM, CPSO, and FSO. The
ISSO must have detailed knowledge and expertise required to manage the security aspects of an information
system and is assigned the day-to-day responsibility for assigned systems. Responsibilities include
implementation of the requirements of Risk Management Framework, including the Joint Special Access
Program (SAP) Implementation Guide (JSIG), NIST 800-53, or other security requirements as assigned.
This position will report to the Corporate Information Assurance Manager and work in close collaboration with
the AFSO and FSO. The ISSO is responsible for developing and updating the security authorization package, managing and controlling changes to the system, and assessing the security impact of those changes.
Ensure systems are operated, maintained, and disposed of following security policies and procedures as outlined
in the security authorization package.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Monitor system recovery processes to ensure security features and procedures are properly restored and
functioning correctly.
Ensure audit records are collected, reviewed, and documented.
Duties also include physical and environmental protection, personnel security, and incident handling.
DUTIES & RESPONSIBILITIES
Lead the information system security program for their assigned location to include implementation and
validation of automated informational security, ensuring security requirements as contracted are
satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current
DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring,
trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by
local employees
Conduct system audits in accordance with security accreditation package requirement
Lead the information system security program for their assigned location to include implementation and validation of automated informational security, ensuring security requirements as contracted are satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
Conduct system audits in accordance with security accreditation package requirements
Conduct vulnerability scans and analysis
Conduct maintenance on the networks, systems, and hardware
Perform software upgrades on networks, systems, and hardware
Perform security assignments in accordance with the Automated Information System requirements and local regulations
Understand and follow NISPOM/ODAA/RMF/JAFAN/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 4 years' experience in related field
DoD 8570 compliant, IAT Level II
Experience with Windows based administration of Information Systems
Ability to work within compliance standards; previous experience with RMF, HIPAA , PCI DSS, or
equivalent compliance standard preferred
Strong experience in networking, active directory, centralized logging solutions, vulnerability scanning
and anti-virus solutions
Experience with security audits for information systems
Strong communication and problem-solving skills
Ability to work in both a team environment as well as independently
Must be organized and detail oriented
Ability to obtain and maintain Top Secret clearance with the ability to obtain approval for SAP/SCI access
DESIRABLE
Have previous experience with DoD Security Regulations and Policies
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership