Product Security Architect
Security architect job in Palo Alto, CA
We are seeking an experienced Product Security Architect to join our Security Center of Excellence team and lead security initiatives across our cloud-based SaaS product portfolio. This role requires a unique blend of deep technical expertise, architectural vision, and collaborative leadership to ensure our products are built with security at their core. The ideal candidate will work at the intersection of security, development, and product design to create robust, secure solutions that protect our customers and their data.
Key Responsibilities
Security Architecture & Design
Design and implement comprehensive security architectures for cloud-based SaaS products, ensuring security is embedded throughout the product lifecycle
Conduct thorough threat modeling exercises for new and existing product features, identifying potential vulnerabilities and attack vectors
Define security requirements, patterns, and best practices for product development teams
Review and approve architectural designs from a security perspective, providing actionable guidance and recommendations
Product Security Assessment
Perform in-depth security assessments of products at the code, configuration, and architectural levels
Identify security vulnerabilities, weaknesses, and gaps in existing and proposed product implementations
Conduct code reviews with a focus on security, analyzing Java, Python, and React codebases for security flaws
Evaluate third-party integrations, APIs, and dependencies for security risks
Collaboration & Enablement
Partner closely with development teams to integrate security controls and best practices into the software development lifecycle
Work with QE teams to develop security test strategies, including penetration testing, vulnerability scanning, and security automation
Provide security guidance and mentorship to engineering teams, fostering a security-first culture
Translate complex security concepts into clear, actionable recommendations for technical and non-technicaål stakeholders
Cloud & Infrastructure Security
Design and implement security controls for cloud infrastructure and services (AWS, Azure, GCP)
Architect and implement IAM strategies including role-based access control (RBAC), attribute-based access control (ABAC), least privilege principles, and identity federation
Design secure network architectures including VPCs, security groups, network ACLs, microsegmentation, and zero-trust network access
Establish cloud configuration security standards and guardrails to prevent misconfigurations and ensure secure-by-default deployments
Ensure proper implementation of cloud security best practices including data encryption (at rest and in transit), secrets management, and compliance
Monitor and respond to emerging cloud security threats and vulnerabilities
Security Standards & Compliance
Establish and maintain security standards, policies, and procedures aligned with industry frameworks
Support compliance efforts including SOC 2, ISO 27001, GDPR, and other relevant standards
Stay current with evolving security threats, vulnerabilities, and industry best practices
Required Qualifications
Experience
8+ years of experience in information security, with at least 5 years specifically in product security architecture
Proven track record as a Product Security Architect in a SaaS or cloud-based company
Extensive experience with threat modeling methodologies (STRIDE, PASTA, or similar)
Hands-on experience identifying and remediating security vulnerabilities in production environments
Strong background working collaboratively with development and QE teams in agile environments
Technical Expertise
Deep understanding of secure coding practices and common vulnerability patterns (OWASP Top 10, CWE/SANS Top 25)
Proficiency in code-level security analysis across multiple languages, particularly Java, Python, and React/JavaScript
Strong knowledge of cloud security architectures and services (AWS, Azure, or GCP)
Expert-level knowledge of IAM principles and implementation including multi-factor authentication, single sign-on, privileged access management, service accounts, and identity lifecycle management
Deep understanding of network security including firewalls, IDS/IPS, VPN, TLS/SSL, DDoS protection, API gateways, and secure network segmentation
Extensive experience with cloud configuration security including infrastructure-as-code security, cloud security posture management, configuration drift detection, and automated compliance checking
Experience with authentication and authorization frameworks (OAuth 2.0, OpenID Connect, SAML, JWT, RBAC, ABAC)
Understanding of containerization and orchestration security (Docker, Kubernetes)
Knowledge of API security, microservices architecture, and distributed systems security
Familiarity with DevSecOps practices and security automation tools (SAST, DAST, SCA)
Certifications
CISSP (Certified Information Systems Security Professional) required
Additional relevant certifications valued:
Cloud security: CCSP, AWS Certified Security Specialty, Azure Security Engineer, Google Cloud Professional Security Engineer
Security architecture: CSSLP, SABSA
Penetration testing: CEH, OSCP, GPEN
Network security: CCNP Security, GIAC certifications
Preferred Qualifications
Experience with Infrastructure as Code (Terraform, CloudFormation) and security policy as code
Knowledge of zero-trust architecture principles and implementation
Experience with security incident response and vulnerability management programs
Background in software development or engineering
Experience with regulatory compliance frameworks and security audits
Published security research, conference presentations, or contributions to open-source security projects
Master's degree in Computer Science, Cybersecurity, or related field
Technical Skills
Programming & Scripting:
Java (enterprise application security)
Python (security automation, scripting)
JavaScript/React (frontend security)
Additional languages a plus (Go, Rust, C/C++)
Security Tools & Platforms:
SAST/DAST tools (Checkmarx, Fortify, Veracode, etc.)
Vulnerability scanners and penetration testing tools
Security information and event management (SIEM) platforms
Cloud security posture management (CSPM) tools
Cloud Platforms & Configuration:
AWS, Azure, or Google Cloud Platform
IAM services (AWS IAM, Azure AD, GCP IAM, identity federation)
Network security services (VPC, Security Groups, Network ACLs, WAF, Cloud Firewall)
Cloud configuration management and security scanning tools
Cloud-native security services and controls (GuardDuty, Security Hub, Azure Defender, Security Command Center)
Secrets management (AWS Secrets Manager, Azure Key Vault, HashiCorp Vault)
Serverless architecture security
Development & DevOps:
CI/CD pipelines and security integration
Version control systems (Git)
Containerization and orchestration
Agile/Scrum methodologies
Personal Attributes
Strong analytical and problem-solving skills with attention to detail
Excellent communication skills with the ability to influence and educate diverse audiences
Self-motivated with the ability to work independently and as part of a team
Passionate about security and staying ahead of emerging threats
Pragmatic approach to balancing security with business needs and user experience
What We Offer
Opportunity to shape security architecture for cutting-edge Cybersecurity SaaS products
Collaborative environment with highly talented engineering teams
Professional development and growth opportunities
Competitive compensation and benefits package
We are an equal opportunity employer and value diversity in our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Cyber Security Risk and Vulnerabilities Architect
Security architect job in Oakland, CA
***We are unable to sponsor for this 6+ month straight contract role, no 3rd party candidates will be considered***
Prestigious Enterprise Company is currently seeking a Cyber Security Architect with strong Threat, Vulnerabilities, and Risk Compliance Architecture and Engineering experience. Candidate will be responsible for the planning, development and implementation of enterprise information security solutions to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
Responsibilities:
Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions.
Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.
Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.
Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture.
Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements.
Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks.
Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices.
Cloud Security:
Shared Responsibility model
Secure services in the cloud
Infrastructure security in the cloud
Secure boundaries
Authentication & Authorization
security services in the Cloud
Cloud Native VS Third party security capabilities
Container Security
Container security lifecycle
Image scanning
Qualifications:
Strong knowledge of network security protocols, best practices, and perimeter security tools
Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping
Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management
Understanding of common data protection technologies such as cryptography, tokenization, and hashing
Understanding of Azure native security services and best practices
Strong knowledge of threat modelling and risk assessment technologies or frameworks
The candidate shall have the experience on developing secure view of architecture and secure design documents for different applications
ability to lead the exercise of collecting the required data to produce the deliverables
Ability to articulate the requirements in technical and non technical language
Ability to defend secure design and support it with real life scenarios
Ability to articulate the risk and findings in business language
Explain vulnerabilities and threats
Threat modeling
Recent attacks
Application Security Focus Areas
Secure Code Development
Secure SDLC
Secure Agile development
Testing Security requirements
Writing security stories
Web Application Security
Owasp 10
SAST and DAST Scan
API Security
CI/ CD pipeline
Integrate security tools
Security testing
Director of Information and Data Security
Security architect job in Santa Clara, CA
Role Purpose
The Director of Information and Data Security will establish and lead Eltropy's IT and cybersecurity function, responsible for developing foundational systems, processes, and governance across infrastructure, data protection, and compliance. This leader will drive security maturity across the organization by balancing hands-on execution with long-term strategic planning, and by partnering with external GRC consultants to build a scalable security and compliance framework aligned with industry standards such as SOC 2 and ISO 27001.
Location: Santa Clara, CA (Hybrid)
Department: IT, Cyber Security and Ops
Employment Type: Full-Time
Minimum Experience: Senior Manager/Supervisor
Compensation: $200,000-$240,000 (Base + Bonus)
Strong cybersecurity background, with experience leading threat detection, incident response, and proactive security risk management across cloud and enterprise environments.
Key Responsibilities
IT and Infrastructure Security
Oversee endpoint management, asset inventory, and identity and access management
(IAM).
Establish standards for device hardening, patch management, and secure configuration.
Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
Lead threat detection, vulnerability management, and incident response operations.
Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
Conduct regular penetration testing, track remediation, and drive security awareness
programs.
Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
Partner with external GRC consultants to design and operationalize Eltropy's information
security and compliance framework.
Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
Maintain a centralized risk register and oversee remediation tracking.
Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
Establish and operationalize the company's Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
Develop and implement a company-wide security awareness program.
Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
Define structure, roles, and hiring priorities aligned with the company's growth stage.
Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
Asset Visibility: 100% endpoint and asset inventory completeness.
Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
Independent, self-starter with strong ownership and execution bias.
Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to:
VP of Operations
Level:
Senior Leadership
Direct Reports:
IT Team
Cybersecurity Engineer(s)
Information Security Manager
Security architect job in Santa Clara, CA
Role: Cybersecurity Manager
Duration: 6+ months
Summary: The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity, manages SOC functions, and ensures compliance with frameworks like ISO 27001, NIST, and ITAR.
Key Responsibilities:Lead cybersecurity operations, including SOC oversight, threat detection, and endpoint security.
Manage incident response for ransomware, APT, insider threats, and major security events.
Oversee vulnerability and patch management programs (Tenable, Automox, CrowdStrike).
Strengthen cloud and identity security across Azure, Entra ID, and Microsoft 365.
Implement Zero Trust architecture and secure configuration standards.
Support compliance efforts (ISO 27001, NIST CSF/800-53/171, ITAR, GDPR, HIPAA, PCI).
Lead global cybersecurity teams, contractors, and MSSP partners.
Provide executive-level reporting on risk posture, incidents, and security metrics.
Requirements:10+ years of cybersecurity experience with leadership responsibilities.
Strong background in SOC operations, IR, EDR, SIEM/SOAR, and cloud security.
Hands-on experience with Sentinel, XSOAR, CrowdStrike, Defender, Tenable.
Knowledge of ISO 27001, NIST, ITAR, and broader regulatory frameworks.
Strong communication, team leadership, and cross-functional collaboration skills.
Endpoint Security Architect
Security architect job in Sunnyvale, CA
Looking for a workplace where people realize their full potential, are recognized for the impact they make, and enjoy the company of the peers they work with? Welcome to Zensar! Read on for more details on the role and about us.
Zensar is offering an excellent opportunity for an "Endpoint Security Architect" to advance your career and achieve your goals. Their amazing benefits include a competitive salary, strong benefits package, and a friendly work environment.
Role: Endpoint Security Architect
Location: Sunnyvale, CA (Onsite - Hybrid 3 Days Work from Office)
Salary: $140K + Benefits.
The Endpoint Security Architect will be responsible for designing, assessing, and enhancing the organization's endpoint security posture across laptops, desktops, mobile devices, servers, and VMs. This role ensures alignment of endpoint operations, policies, and enforcement mechanisms with industry standards (NIST), organizational security policies, and regulatory requirements. The ideal candidate has deep experience with EDR/XDR, AV, MDM/Intune, device compliance, endpoint hardening, and integration with SIEM/SOAR/AD environments.
Key Responsibilities:
Endpoint Security Architecture & Design
Review and enhance endpoint architecture, including AV, EDR solutions.
Evaluate endpoint configuration, control enforcement, coverage, and security baselines.
Assess integration of endpoint platforms with SIEM, SOAR, Active Directory, Intune/MDM, and CMDB.
Review architectural components, telemetry flow, and sensor deployment methodology.
Validate data exchange between endpoint security tools and central monitoring systems.
2. Policy & Governance
Ensure endpoint security operations align with organizational security policies.
Review and update endpoint security policies aligned with NIST standards.
Validate roles & responsibilities across IT, SecOps, and endpoint management teams.
Evaluate policy coverage including patching, EDR/AV, device onboarding, and compliance.
3. Endpoint Operations & Integration
Assess GPOs, MDM/Intune policies, device configuration profiles, and enforcement controls.
Review endpoint discovery & profiling mechanisms to identify unmanaged/rogue devices.
Validate tagging, categorization, and asset mapping across EDR platforms and CMDB.
Check integration with NAC, SIEM, AD, vulnerability management, and patching tools.
4. Risk Management, Patching & Compliance
Review patch management and vulnerability remediation processes across endpoints.
Verify endpoint compliance monitoring, dashboards, and alerting workflows.
Assess patching SLAs, automation processes, and compliance reporting.
Skills & Qualifications
Technical Skills
Strong expertise in EDR/XDR platforms (e.g., CrowdStrike, Defender for Endpoint, Trellix, SentinelOne).
Hands-on experience with Intune/MDM, SCCM, JAMF, or similar device management tools.
Solid understanding of SIEM/SOAR platforms and AD integration.
Strong knowledge of NIST CSF, NIST 800-53/171, CIS benchmarks, and endpoint hardening.
Familiarity with NAC, vulnerability management, and patching tools (Tenable, Qualys, BigFix, etc.).
Experience designing endpoint security architectures for large enterprises.
Staff Security Engineer, Secure Digital Asset Operations
Security architect job in San Francisco, CA
At Ripple, we're building a world where value moves like information does today. It's big, it's bold, and we're already doing it. Through our crypto solutions for financial institutions, businesses, governments and developers, we are improving the global financial system and creating greater economic fairness and opportunity for more people, in more places around the world. And we get to do the best work of our career and grow our skills surrounded by colleagues who have our backs.
If you're ready to see your impact and unlock incredible career growth opportunities, join us, and build real world value.
THE WORK:
As a Staff Security Engineer within the Secure Digital Asset Operations (SDAO) function, you will collaborate with leadership and cross-functional Finance, Product, and Engineering teams to secure Ripple's digital assets. Your primary responsibility will be designing, implementing, managing, and optimizing processes and solutions in place to protect these assets.
WHAT YOU'LL DO:
Secure digital assets: Develop, implement, and manage processes to catalogue and secure the handling and storage of digital assets.
Continuously enhance security posture: Drive security risk assessments of digital asset safeguards to find opportunities for improvement, then collaborate with the Information Security team and cross-functional partners to design and implement those improvements.
Effectively communicate security posture: Develop effective methods to measure, supervise, and communicate security posture to key partners.
Evangelize security best practices: Raise awareness among individuals and teams through educating them on how to secure both Ripple and personal digital assets effectively.
Guide strategy: Advise on digital asset security methodologies, tooling decisions, and vendor integrations to improve the security posture.
WHAT YOU'LL BRING:
8+ years of industry experience securing digital assets and a demonstrated knowledge of crypto/blockchain/web3/smart contracts.
Strong knowledge of key management solutions, cryptography, and key management best practices that include the secure creation, distribution, storage, and usage of cryptographic keys.
Hands-on experience setting up, configuring, and maintaining a variety of digital asset wallet solutions (Software, Hardware, MPC, and/or MultiSig Wallets) and secure offline laptop solutions.
Experience handling sensitive work with discretion and professionalism, and demonstrated ability to become a trusted digital asset security advisor to the business.
Clear and concise communicator/writer who can effectively communicate to varying levels of junior and senior stakeholders across different organizations, hold teams accountable, and can document and translate complex security and compliance topics into functional requirements.
Comfortable operating on an unpaved road and dealing with ambiguity and complexity through effectively prioritizing and handling multiple assignments at a time.
Passion for continuous learning and willingness to learn and apply processes unique to the challenges at Ripple.
For positions that will be based in CA, the annual salary range for this position is below. Actual salaries may vary based on numerous factors including, among other things, an individual applicant's experience and qualifications for the position. This range does not include equity or additional compensation, such as bonuses or commissions.
CA Annual Base Salary Range: $192,000 USD - $240,000 USD
WHO WE ARE:
Do Your Best Work
The opportunity to build in a fast-paced start-up environment with experienced industry leaders
A learning environment where you can dive deep into the latest technologies and make an impact. A professional development budget to support other modes of learning.
Thrive in an environment where no matter what race, ethnicity, gender, origin, or culture they identify with, every employee is a respected, valued, and empowered part of the team.
In-office collaboration for moments that matter is important to our culture, and we give managers and teams the flexibility to decide which 10+ days a month they come in.
Bi-weekly all-company meeting - business updates and ask me anything style discussion with our Leadership Team
We come together for moments that matter which include team offsites, team bonding activities, happy hours and more!
Take Control of Your Finances
Competitive salary, bonuses, and equity
Competitive benefits that cover physical and mental healthcare, retirement, family forming, and family support
Employee giving match
Mobile phone stipend
Take Care of Yourself
R&R days so you can rest and recharge
Generous wellness reimbursement and weekly onsite & virtual programming
Generous vacation policy - work with your manager to take time off when you need it
Industry-leading parental leave policies. Family planning benefits.
Catered lunches, fully-stocked kitchens with premium snacks/beverages, and plenty of fun events
Benefits listed above are for full-time employees.
Ripple is an Equal Opportunity Employer. We're committed to building a diverse and inclusive team. We do not discriminate against qualified employees or applicants because of race, color, religion, gender identity, sex, sexual identity, pregnancy, national origin, ancestry, citizenship, age, marital status, physical disability, mental disability, medical condition, military status, or any other characteristic protected by local law or ordinance.
Please find our UK/EU Applicant Privacy Notice and our California Applicant Privacy Notice for reference.
Information Security Architect -- MAHDC5660809
Security architect job in San Francisco, CA
Information Security
Need Local to San Francisco, CA
Onsite role
Looking for independent folks.
Top Skills: KQL - kusto query language - used by different Microsoft security tools like sentinel or defender
SPL that Splunk uses
General incident response
actual incident tickets - resolve actual security incident tickets
Requirements
• Self-starter, able to readily explore and learn new areas and concepts.
• Knowledge and experience normally acquired through, or equivalent to, the completion of a Computer Science or Computer Engineering Bachelor's degree with a minimum of 5 years of job-related experience.
• Degrees in Computer Science or Engineering and/or relevant technically focused certifications in Cloud and/or enterprise security architecture such as GCAD or GDSA are advantageous
Experience with
• AWS commercial or government cloud
• Experience securing critical workloads in a cloud environment.
• Knowledge and experience with Databricks, Starburst, Collibra and Immuta is advantageous.
Job Role Summary
Lead and produce system threat models for integration of commercial components into a data lake platform. Help design secure cloud architectures. Propose effective security controls within the environment and identify and mitigate security vulnerabilities. Simplify complex security topics, lead discussion in technical and business teams, communicate risk accurately.
Skills
• Able to create AWS secure cloud architecture designs
• Understand current security threats, techniques, and landscape
• System threat modeling of applications and platforms
• Able to identify and provide mitigation for security vulnerabilities within applications and application environments based on threat models.
• Able to simplify complex security topics for consumption and critical decision making.
• Clear and accurate communication
• Able to lead/direct discussions with technical and business teams to achieve common goals.
• Able to work well within a team and support team goals
• Understand cyber security frameworks such as NIST 800-53
• Ability to work on a geographically distributed team across multiple time zones
• Familiarity with SAFe a plus
Responsibilities
• Evolve and mature our models, templates, standards and procedures related to secure application development and secure application and cloud architecture. Ensure these artifacts are in alignment with FRS policy and standards.
• Consult with our development teams to help them align with FRS policy and standards and meet the risk appetite of the customer.
• Work with members of application development teams to review and create secure application and infrastructure designs and patterns.
• Assist development teams by reviewing threat models related to applications and related systems. Analyze potential business impact and exposure leading to risk, based on emerging security threats, vulnerabilities, configurations, threat actor TTPs, etc.
• Evaluate CICD pipeline design, and related development team processes and help to mature and secure creation, management and utilization of pipelines.
• Assist in identification and integration of security focused tooling into development and operations processes.
• Support secure application architecture within the Federal Reserve System by fostering constructive dialogue and seeking resolution when confronted with discordant views.
• Solicit feedback and continuously improve your knowledge, skills and capabilities related to the position.
• Assist with recruiting activities and administrative work.
Security Architect GCP
Security architect job in Sunnyvale, CA
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Information Security Engineer (Local Candidates only)
Security architect job in Fremont, CA
Maxonic maintains a close and long-term relationship with our direct client. In support of their needs, we are looking:
Job Title: Information Security Engineer
Job Type: Fulltime
Work Schedule: Onsite 5 days a week
We are looking for a Security Engineer that is passionate about cybersecurity, system monitoring and analysis, and developing/automating creative solutions. You will have a chance to work on identifying security gaps in infrastructure and process, effectively execute projects/initiatives to address them, demonstrate excellent judgment, prioritization and communication of technical security risks, and act as a security liaison supporting business units.
Responsibilities
Monitor security tools, logs, and perform security assessments to identify issues, vulnerabilities, and incidents.
Develop dashboards, automated alerts, and access controls.
Manage and configure security tools (e.g., vulnerability discovery, patch management, EDR, SIEM, MDM, DLP).
Manage and configure access controls and management systems.
Develop and implement comprehensive incident response plans; lead the response to security breaches and incidents, including forensic analysis and mitigation.
Assist with regular security audits and compliance checks to ensure adherence to industry standards, regulations, and best practices.
Collaborate with IT, Cloud, and Engineering teams to integrate security practices into the development lifecycle.
Provide training and guidance to staff on security policies and procedures.
Develop and maintain documentation related to security operations, incident response, and compliance activities.
Qualifications:
Expertise in analyzing security logs and identifying incidents and suspicious activity.
Strong understanding of operating systems, network protocols, architecture, and security vulnerabilities.
Coding experience relevant to automating security tasks, log aggregation and analysis, and device management.
Experience managing security technologies (SIEM, IDS/IPS, EDR, malware analysis, and protection).
Familiarity with Azure systems.
Knowledge of compliance frameworks (ISO 27001, NIST, SOC2, FedRAMP) and experience with audits.
Excellent problem-solving skills and the ability to work under pressure.
Strong communication and interpersonal skills.
Bachelor's degree in Computer Science, Information Security, or a related field.
Security Certifications a plus
Minimum of 2 years of experience in information security, particularly in security operations or a similar role.
Ability to walk and stand on cement floors for long periods.
Ability to stand, stoop, bend and performing repetitive tasks.
Must be able to lift to 30 pounds at a time.
Prolonged periods of sitting at a desk and working on a computer
About Maxonic:
Since 2002 Maxonic has been at the forefront of connecting candidate strengths to client challenges. Our award winning, dedicated team of recruiting professionals are specialized by technology, are great listeners, and will seek to find a position that meets the long-term career needs of our candidates. We take pride in the over 10,000 candidates that we have placed, and the repeat business that we earn from our satisfied clients.
Interested in Applying?
Please apply with your most current resume. Feel free to contact Saurav Kumar (****************** / *************** for more details.
Senior Security GRC Engineer
Security architect job in San Ramon, CA
At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are.
We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right!
Job Description
We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms.
Job Responsibilities:
Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001).
Perform risk assessments and develop mitigation strategies for identified security risks.
Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management.
Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind.
Monitor and report on compliance status, identifying gaps and proposing remediation strategies.
Oversee third-party vendor risk assessments and ensure adherence to security requirements.
Support internal and external audits by providing documentation, evidence, and responses to audit findings.
Conduct security awareness training programs and promote a culture of compliance within the organization.
Required Experience/Skills/Knowledge:
5+ years of experience in Governance, Risk, and Compliance roles or a related field.
Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards.
Proficiency in GRC tools such as SAI360 for compliance and risk management.
Experience with privileged access management tools like CyberArk.
Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT.
Excellent communication and collaboration skills to engage with technical and non-technical stakeholders.
Strong analytical and organizational skills with attention to detail.
This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure.
Required Education:
Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
Equivalent work experience may be considered in lieu of a degree.
Security Engineer
Security architect job in Fremont, CA
Security Engineer | $120K + Bonus + Benefits | Fremont (ONSITE)
A major player in the technology hardware industry continues to grow their Fremont campus which manufactures servers for all the top companies in Silicon Valley.
Given their success and rapid growth, they are building out an IT Infrastructure team and are looking to add a Security Engineer. I have been working with hiring manager building out his team over the last year and hands-down one of most liked managers and this role offers great career experiences and mentorship.
Key Skill Sets:
Expertise in analyzing security logs and identifying incidents and suspicious activity.
Strong understanding of operating systems, network protocols, architecture, and security vulnerabilities.
Experience managing security technologies (SIEM, IDS/IPS, EDR, malware analysis, and protection)
Knowledge of compliance frameworks (ISO 27001, NIST, SOC2, FedRAMP) and experience with audits a plus
Azure environments
Location: Fremont, CA (onsite with some flexible hours)
Compensation: up to $120K base salary + Annual Bonus (base on individual/company performance)
Benefits: Medical/Dental/Vision, Life/Disability Insurance, 401K (match), Flexible Spending Accounts, PTO, tuition reimbursement.
(US Citizenship or Green Card required)
If interested in joining a fun, highly collaborative team for a division that continues to grow rapidly, please apply!
Infrastructure & Security Engineer (Platform)
Security architect job in San Francisco, CA
In this role, you will drive the evolution of our infrastructure and security posture. You will have substantial ownership over our technology choices and implementation for deployment, observability, storage, and security. You will identify, triage, and implement incremental improvements in all of these domains, working closely with backend engineers and internal and external auditors to develop appropriately scoped interventions. You will work with engineers to ensure that security considerations are baked into software development from the outset.
You should have a broad understanding of modern best practices around cloud architecture, data governance and infrastructure as code. You should approach questions of infrastructure and security risk with a sense of nuance and good judgment. You should be able to build consensus around your threat models such that the necessary consequences seem natural to other stakeholders.
In this role, you will need to be fluent in Python and Terraform (at least to start).
Company & Funding
We're building the world's largest long-term insurer, using digital money and AI to serve billions of people profitably. We want anyone, anywhere, to be able to save for their future, protect their family, and build wealth across generations.
We face a once-in-a-century opportunity to build a vertically integrated life (re)insurer. Our product offerings are globally unique, making it possible for us to scale our balance sheet, build modern systems from scratch, and then directly compete to win a market that is 3% of global GDP.
We've raised over $140M to date. Sam Altman and Lachy Groom led our initial raise, and they've since been joined by leading investors in AI, insurance, and Bitcoin, including Northwestern Mutual, Apollo, Bain Capital, Pantera, Haun, Framework, Fulgur Ventures, MS&AD, Mouro, Stillmark, and Wences Casares.
Our Bermuda operating subsidiary holds the the world's only license to issue life insurance denominated entirely in Bitcoin. It's also the only company in the world with audited financials stated in Bitcoin. (If you join us, you can expect to do a lot of things no one's ever done before.)
Engineering at Meanwhile
With the advent of ubiquitous AI tooling, the dynamic range in individual engineering effectiveness is only widening.
At Meanwhile, we're planning for a world in which small, tight-knit engineering teams (supported by a small, tight-knit platform team) own entire lines of business, and are compensated accordingly.
We're attacking a huge market with the leanest, most effective team in insurance. Where incumbents employ a thousand people, we think we can make it work with a hundred or a dozen.
We're looking for hungry ICs (and former managers who see the writing on the wall) interested in pushing the boundaries of engineering productivity in a vertically integrated, regulated organization.
We're growing quickly. You will fix million-dollar bugs.
On the business side, we hire for deep domain expertise, ambition, and the creativity to figure out the previously impossible. Because our engineers work closely with people from the business, they need curiosity, flexibility, an appetite for (and the ability to digest) complex context, and strong communication skills.
Our view is that ownership is taken, not given. You will be successful here if your work progressively builds others' trust in your ability to identify, attack, and solve larger and larger problems, including those that no one else has anticipated.
We believe that "code wins arguments," that prototyping is often the best first step in a design process, and that the impact of velocity is non-linear.
You are excited by putting up multiple meaningful changes, or writing thousands of lines of code, in a day (even though you know that deleting lines of code is more exciting than writing them, and that, occasionally, deep reflection is required in order to ship anything).
You aren't fazed by building systems that don't work out - sometimes, you have to throw code away.
Intellectual honesty is non-negotiable. You love to learn and to teach, to ask questions and to answer them, and to be transparent about your uncertainty.
You are eager to learn, with the rest of the team, how to work with AI tools, including agents, in order to move faster and ship better, more complete versions of your ideas. You will experiment with new ways of working, with the expectation that some of them will be unsuccessful, and you will teach others what works.
This is the most exciting time in decades to be a competent, technically ambitious engineer. We want to offer you the opportunity to see what's really possible and how much better you can get at your craft.
Cyber Security Engineer
Security architect job in San Jose, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
IT - Sr Systems Engineer (OpenStack and Nutanix)
Security architect job in San Jose, CA
We are seeking highly skilled OpenStack and Nutanix Administrators to join our IT Infrastructure team. This role is crucial in managing, optimizing, and ensuring the seamless operation of cloud and hyper-converged infrastructure environments. The ideal candidates will possess strong technical expertise, excellent problem-solving skills, and a proven ability to work in dynamic environments.
Key Responsibilities
- Deploy, configure, and maintain OpenStack cloud environments and Nutanix hyper-converged infrastructure.
- Monitor system performance, troubleshoot issues, and ensure high availability of services.
- Design and implement scalable solutions to meet organizational needs.
- Collaborate with cross-functional teams to align infrastructure with business objectives.
- Perform upgrades, patches, and routine maintenance for OpenStack and Nutanix systems.
- Develop automation scripts for efficient system management using tools like Ansible, Terraform and Pulumi.
- Ensure compliance with security standards and implement best practices for data protection.
- Document processes, configurations, and troubleshooting steps for knowledge sharing.
Qualifications
- Bachelors in Computer Science (or related field) and 6 - 9 years of relevant experience.
- Strong expertise in OpenStack architecture, deployment, and management.
- Hands-on experience with Nutanix AHV, Prism Central, and related tools.
- Proficiency in Linux system administration and scripting (e.g., Bash, Python).
- Excellent familiarity with virtualization technologies (e.g., KVM) and container platforms (e.g., Kubernetes).
- Knowledge of networking concepts such as VLANs, SDN, and load balancing.
- Experience with monitoring tools like Prometheus or Nagios.
- Excellent communication skills to collaborate with technical and non-technical stakeholders.
- Certifications in OpenStack or Nutanix (e.g., NCP-MCI) are a plus.
Network and Security Architect
Security architect job in Fremont, CA
The requirements listed below are representative of the knowledge, skill, and/or ability required: Build the networks by taking into consideration various factors like, bandwidth requirements, infrastructure requirements and security. Responsible for estimating growth and plan for the network upgrade to meet future demands.
Ability to work on multiple priorities and/or projects simultaneously.
Excellent listening and communications skills, both verbal and written.
flexible in working hours to support global project and migration during non-business hours.
Ability to collaborate with multiple teams to achieve project goals.
Organized, detail oriented and self-motivated.
Ability to provide and maintain detailed documentation on each project.
Demonstrate knowledge in advanced networking and infra security domain.
Ability to successfully train the operation team on the new solution(s) implemented.
Problem-solving skills and abilities to meet reasonable deadlines.
Ability to work with little supervision and manage a team.
Identify opportunities and recommend solutions for improving the overall network health by assessing overall effectiveness and efficiency.
Stay current with existing, emerging, and evolving technologies and when appropriate, make recommendations as to how we may best harness a new technology or idea.
BS in Engineering, Computer Science, or related field, with 15+ years of work experience in networking domain Have completed minimum 3 significant network solution designs In-depth knowledge of the OSI network model Experience with different network types (i.
e.
LAN, WAN, WLAN) Network protocols and technologies, e.
g.
DNS, HTTP, SSL, 802.
1x, Load Balancing, WAN optimization, SD-WAN, VPN, PKI Cisco network products (Nexus and Catalyst switches, routers, WLC, ISE) Knowledge of Palo Alto Networks firewall and IPS configuration and troubleshooting Knowledge of F5 load balancer Knowledge of public cloud is highly desirable Knowledge of Zero-Trust networking is highly desirable CCNP certification CCIE certification PCNSE certification Azure Network Engineer Associate
Urgent Job Opening for a SAP Security Consultant in San Francisco, CA
Security architect job in San Francisco, CA
Hello, Greetings for the day, We have an urgent job opening for a SAP Security Consultant in San Francisco, CA. Please find the complete below and consultant information details below to the job description. Duration: 5Months+ Job Title: SAP Security
Duties:
Provides the technical guidance in development of security roles and authorizations to SAP projects and production support for R3, BW, EBP, SMP, PI, AII/OER systems Ensures development and maintenance of SAP roles and authorizations are aligned with enterprise security best practices and corporate standards Delivers and manages overall SAP security standards and designs Works closely with SAP functional and technical teams in the identification and resolution of gaps in the security authentication and authorization processes Provides day-to-day support for GRC 5.3 CUP, FireFighter Works closely with security and technical teams in architecting and implementing Identity and Security best practices in SAP environment; Partners with teams in support of internal and external auditing of SAP environment Performs annual SAP licensing for all the systems onsite Skills: Minimum of 5 years of experience implementing and delivering SAP Security Solutions; Must have strong demonstrated knowledge of SAP Security and experience with GRC Analysis and Administration. Experience in implementing/upgrading/managing SAP GRC Access Controls, Access Risk Analysis and Emergency Access Management a plus; Must have excellent troubleshooting and resolution skills; Strong attention to detail. Strong technical knowledge of SAP Security architecture and role based authorization models; Strong analytical, problem solving and conceptual. Strong oral and written communication skills, with an ability to express complex technical concepts; Strong understanding of data privacy concepts. Strong Security and Risk mitigation mindset.Understanding of process re-engineering, segregation of duties, application security implementation, security auditing techniques Keywords: Education: Bachelor's degree in Computer Science or related field, OR equivalent combination of education and/or experience Skills and Experience: Required Skills: AUDITING MITIGATION PROBLEM SOLVING SAP Security GRC Additional Skills: RE-ENGINEERING RISK ANALYSIS ARCHITECTURE SAP SECURITY SECURITY ARCHITECTURE SECURITY IMPLEMENTATION SOLUTIONS AUTHENTICATION EBP MAINTENANCE R3
Thanks & Regards,
Srikanth
************
800 W, Fifth Avenue, Suite 208A
Naperville, IL - 60563
"
A Certified MBE & Women's Business Enterprise Alliance (WBEA)"
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security & Compliance, Manager (1 Year Contract)
Security architect job in Palo Alto, CA
Job Description
About us:
Lucence is a pioneering precision oncology company with a bold vision: a world where cancer is defeated through early detection and timely treatment. Our cutting-edge liquid biopsy tests use advanced molecular profiling to guide personalized cancer therapies, transforming how cancer is diagnosed and treated. At Lucence, we are shaping the future of precision medicine by capturing both genetic and cellular data from a single blood draw, bringing us closer to our mission of overcoming cancer.
We are looking for an Information Security & Compliance Manager to lead Lucence's SOC 2 compliance programmes. You will own our internal controls, audits, and security governance frameworks, ensuring the company meets the standards required for global diagnostics operations.
Key Responsibilities
Compliance Ownership
Own SOC 2 Type I/II, and build on HIPAA and cybersecurity certification roadmaps. Maintain documentation, evidence repositories, and ongoing readiness.
Internal Controls & Policies
Build, refine, and enforce security policies, risk registers, and access-control processes.
Audit Management
Partner with external auditors, coordinate internal contributors, drive remediation plans, and ensure timely closure of findings.
Vendor & Data Protection Reviews
Conduct security due diligence for vendors, manage DPAs, and ensure data-flow compliance for global partners.
Security Governance
Implement quarterly control testing, internal audits, DR/BCP drills, and continuous monitoring of compliance gaps.
Cross-Functional Partnering
Work closely with external vendors, Informatics, IT, Lab Ops, and Commercial teams to embed security into product and operational workflows.
Preferred Qualifications
Experience owning SOC 2 or ISO audit cycles end-to-end.
Familiarity with cloud environments (AWS/Azure/GCP) and modern security tooling.
Attention to detail to improve policies, controls, and audit documentation.
Certifications: ISO Lead Auditor, CISA, CISSP, or equivalent.
Chief Information Security Officer (0933 Manager V) - Department of Public Health
Security architect job in San Francisco, CA
: Company Description The Department of Public Health prioritizes equitable and inclusive access to quality healthcare for its community and values the importance of diversity in its workforce. All employees at the Department of Public Health work to advance equity, inclusion, and diversity with a specific lens and focus on race, ethnicity, gender, sex, sexuality, disability, and immigration status.
This is a Position-Based Test conducted in accordance with CSC Rule 111A.
Learn more about the City's hiring process here: ****************
sf.
gov/knowledge/process/Application Opening: Friday, November 21, 2025Application Deadline: Application filing will close on or after Friday, January 9, 2026.
Salary: $180,440 - $230,308 Annually (Range A) Appointment Type: Permanent Civil ServiceRecruitment ID: PBT-0933-160818 Becoming a City employee means being a part of a team that cares about making a difference.
Your work will shape both the present and future of San Francisco.
When you work for the City, you're choosing a job with purpose.
The mission of the San Francisco Department of Public Health (SFDPH) is to protect and promote the health of all San Franciscans.
SFDPH strives to achieve its mission through the work of several divisions - the San Francisco Health Network, Population Health Division, Behavioral Health Services, and Central Administration.
The San Francisco Health Network is the City's only complete system of care and has locations throughout the City, including Zuckerberg San Francisco General Hospital and Trauma Center, Laguna Honda Hospital and Rehabilitation Center, and over 15 primary care health centers.
The Population Health Division (PHD) provides core public health services for the City and County of San Francisco: health protection, health promotion, disease and injury prevention, disease surveillance, and disaster preparedness and response.
Behavioral Health Services operates in conjunction with SFHN and provides a range of mental health and substance use treatment services.
Central Administration houses core support organizations, including Finance, Information Technology (IT), Human Resources, Privacy and Compliance, Business Office, Facilities Management, and Security Services.
Job Description The San Francisco Department of Public Health is seeking a dynamic and experienced cybersecurity professional to join its IT leadership team.
As a key strategic leader, the Chief Information Security Officer (CISO) (0933 Manager V) will be responsible for developing and executing a comprehensive information security strategy that safeguards the department's systems, data, and services.
This role leads the implementation of an enterprise-wide security program that promotes collaboration, strengthens governance, and aligns cybersecurity initiatives with organizational goals.
The CISO serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development.
The CISO oversees a team of cybersecurity professionals within the SFDPH IT division and collaborates extensively with the CISO for the City and County of San Francisco.
We are looking for a visionary and collaborative leader who can balance innovation with risk mitigation, and who thrives in a complex, mission-driven environment.
The CISO reports directly to the Chief Information Officer (CIO).
The Chief Information Security Officer (0933 Manager V) performs the following essential job functions:Provides strategic leadership in evaluating and mitigating information security threats across the organization using a structured, risk-based methodology.
Advises executive leadership on identified risks and ensures timely execution of mitigation and remediation plans with integrity and discretion Directs the ongoing development of the department's information security program, including project portfolio management, incident response, policy frameworks, compliance activities, threat and vulnerability management, and third-party risk management Allocates and manages resources to support a robust security strategy.
Identifies and advocates for strategic investments, oversees capital and operating budgets, and delivers ROI analyses and budget recommendations Partners with the Office of Compliance and Privacy Affairs to assess data security risks related to contracts, projects, artificial intelligence solutions, and other initiatives.
Develops tools and interventions to mitigate risks, establishes performance metrics, and monitors compliance through audits and assessments Builds alignment and support for security goals and initiatives across internal and external stakeholders.
Communicates effectively with leadership at all levels on trends, risks, and the overall effectiveness of the security program Promotes awareness and understanding of regulatory requirements across the organization.
Leads or collaborates on testing and auditing activities to ensure ongoing compliance and successful certifications Analyzes security requirements and ensures compliance with industry standards such as HIPAA, NIST, and PCI-DSSEstablishes and maintains comprehensive policies and procedures to support effective and sustainable security operations Serves as the department's representative in security-related matters with City agencies and partners Continuously monitors emerging trends, technologies, and best practices in cybersecurity to ensure the department's security posture remains current and effective The Chief Information Security Officer (0933 Manager V) may perform other duties as assigned/required.
Qualifications 1.
Education: Bachelor's degree from an accredited college or university; AND 2.
Experience: Five (5) years of professional healthcare information systems security experience, of which three (3) years must include supervising IT professionals.
Education Substitution: Additional experience as described above may be substituted for the required degree on a year-for-year basis.
One (1) year is equivalent to thirty (30) semester units / forty-five (45) quarter units.
Applicants must meet the minimum qualification requirements by the final filing date unless otherwise noted.
One-year full-time employment is equivalent to 2,000 hours (2,000 hours of qualifying work experience is based on a 40-hour work week).
Desirable Qualifications: The stated desirable qualifications may be considered at the end of the selection process when candidates are referred for hiring:Possession of a Certified Information Systems Security Professional (CISSP) and/or Certified Information Security Manager (CISM) certification Verification of Education and Experience: Every application is reviewed to ensure that you meet the minimum qualifications as listed in the job ad.
Review SF Careers Employment Applications for considerations taken when reviewing applications.
Applicants may be required to submit verification of qualifying education and experience at any point during the recruitment and selection process.
If education verification is required, information on how to verify education requirements, including verifying foreign education credits or degree equivalency, can be found at ****************
sf.
gov/knowledge/experience-education/.
Note: Falsifying one's education, training, or work experience or attempted deception on the application may result in disqualification for this and future job opportunities with the City and County of San Francisco.
Additional Information Selection Procedures: After application submission, candidates deemed qualified must complete all subsequent steps to advance in this selection process, which includes the following: Supplemental Questionnaire (SQ) Examination (Weight: 100%) Candidates that meet the minimum qualifications will be invited to participate in a Supplemental Questionnaire (SQ) examination that is designed to measure the knowledge, skills, and abilities in job related areas which may include but not be limited to: Knowledge of local, State and Federals laws and regulations relating to information security, including but not limited to HIPAA and HITECH; Knowledge of information security technology frameworks and standards, including but not limited to NIST, HITRUST, COBIT, ISO 27001, PCI-DSS or similar cyber security frameworks; Knowledge of technology relating to enterprise wide information security protection; Knowledge of structured systems analysis and design practices and techniques; common operating systems software and relational database systems; hospitals or community health network environments; Ability to apply principles and practices of management, administration, budgeting, training, and personnel management; Ability to manage, supervise, train and coordinate complex functional area of responsibility and groups of employees; Ability to analyze and report on activities, issues and problems and recommend appropriate solutions; Ability to communicate effectively orally; Ability to communicate effectively in writing; Ability to exercise judgement, decisiveness and creativity required in situations involving the direction, control and planning of a program(s); manage critical timelines effectively; Ability to establish and maintain good working relationships with department personnel, staff, vendors, peers, and management, and engage and influence a broad range of stakeholders (e.
g.
HR, IT, Legal, Compliance, senior management, etc.
) Candidates must achieve a passing score on the Supplemental Questionnaire exam in order to continue in the selection process and will be placed on the confidential eligible list in rank order according to their final score.
Additional selection processes may be conducted by the hiring department prior to making final hiring decisions.
Certification The certification rule for the eligible list resulting from this examination will be the Rule of the List.
Eligible List/Score Report: A confidential eligible list of applicant names that have passed the civil service examination process will be created and used for certification purposes only.
An examination score report will be established, so applicants can view the ranks, final scores, and number of eligible candidates.
Applicant information, including names of applicants on the eligible list, shall not be made public unless required by law.
However, an eligible list shall be made available for public inspection, upon request, once the eligible list is exhausted or expired and referrals resolved.
The eligible list/score report resulting from this civil service examination process is subject to change after adoption (e.
g.
, as a result of appeals), as directed by the Human Resources Director or the Civil Service Commission.
The duration of the eligible list resulting from this examination process will be of six months and may be extended with the approval of the Human Resources Director.
To find Departments which use this classification, please see the city's Position Counts by Job Codes and Departments.
Terms of Announcement and Appeal Rights: Applicants must be guided solely by the provisions of this announcement, including requirements, time periods and other particulars, except when superseded by federal, state or local laws, rules, or regulations.
Clerical errors may be corrected by the posting the correction on the Department of Human Resources website at ****************
sf.
gov/.
The terms of this announcement may be appealed under Civil Service Rule 111A.
35.
1.
The standard for the review of such appeals is ‘abuse of discretion' or ‘no rational basis' for establishing the position description, the minimum qualifications and/or the certification rule.
Appeals must include a written statement of the item(s) being contested and the specific reason(s) why the cited item(s) constitute(s) abuse of discretion by the Human Resources Director.
Appeals must be submitted directly to the Executive Officer of the Civil Service Commission within five business days of the announcement issuance date.
Additional information regarding Employment with the City and County of San Francisco:Information about the Hiring ProcessConviction HistoryEmployee Benefits OverviewEqual Employment OpportunityDisaster Service WorkersADA AccommodationRight to WorkCopies of Application DocumentsDiversity StatementVeterans PreferenceSeniority Credit in Promotional Exams Where to Apply All job applications for the City and County of San Francisco must be submitted through our online portal.
Please visit ****************
sf.
gov/ to begin your application process.
Applicants may be contacted by email about this recruitment.
Please consider using a personal email address that you check regularly rather than a work or school account.
Computers are available for the public (9:00 a.
m.
to 4:00 p.
m.
Monday through Friday) to file online applications in the lobby of the Dept.
of Human Resources at 1 South Van Ness Avenue, 4th Floor and at the City Career Center at City Hall, 1 Dr.
Carlton B.
Goodlett Place, Room 110.
Ensure your application information is accurate, as changes may not be possible after submission.
Your first and last name must match your legal ID for verification, and preferred names can be included in parentheses.
Use your personal email address, not a shared or work email, to avoid unfixable issues.
Applicants will receive a confirmation email from notification@smartrecruiters.
com that their online application has been received in response to every announcement for which they file.
Applicants should retain this confirmation email for their records.
Failure to receive this email means that the online application was not submitted or received.
If you have any questions regarding this recruitment or application process, please contact the analyst, Marielle Saldajeno at marielle.
saldajeno@sfdph.
org or **************.
We may use text messaging to communicate with you on the phone number provided in your application.
The first message will ask you to opt in to text messaging.
The City and County of San Francisco encourages women, minorities and persons with disabilities to apply.
Applicants will be considered regardless of their sex, race, age, religion, color, national origin, ancestry, physical disability, mental disability, medical condition (associated with cancer, a history of cancer, or genetic characteristics), HIV/AIDS status, genetic information, marital status, sexual orientation, gender, gender identity, gender expression, military and veteran status, or other protected category under the law.
Manager, Information Security - Detection Engineering
Security architect job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. This role may be remote or hybrid. At LinkedIn, hybrid roles are performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. Remote roles are performed from the designated home work location upon time of hire, and any changes to this home work location requires a review of remote status and approval.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Engineering Manager to lead the Detection Engineering team in the US and to be an integral part of our Information Security organization. The Detection Engineering team is responsible for developing and maintaining threat detection capabilities, security monitoring systems, and detection rules to protect our infrastructure, applications, and, most importantly, our members. This is a key role in supporting and growing our security detection and monitoring capabilities.
Responsibilities:
Leadership and Team Management
+ Lead and manage the detection engineering team, including hiring, training, and mentoring team members.
+ Develop and maintain detection engineering policies, procedures, infrastructure, and guidelines.
+ Coordinate and oversee all activities of the detection engineering team during threat detection development and implementation.
Detection Development and Management
+ Serve as the primary point of contact for all threat detection development and enhancement initiatives.
+ Ensure timely development, testing, and deployment of detection rules and monitoring capabilities.
+ Conduct post-deployment analysis and create detailed reports on detection effectiveness with KPIs, including tuning recommendations and optimization strategies.
Communication and Coordination
+ Communicate detection development status, updates, metrics and reporting, and capabilities to senior management, stakeholders, and security teams regularly.
+ Coordinate with internal and external teams, including security operations, defense infrastructure, incident response, and product engineering teams to develop and maintain effective detection capabilities.
+ Develop and maintain an effective detection engineering communication plan.
Continuous Improvement
+ Continuously evaluate and improve detection engineering processes, tools, and capabilities.
+ Conduct and report on regular detection testing and validation exercises to test and refine detection rules and monitoring systems.
+ Stay current with emerging threats, attack techniques, and detection technologies to enhance the detection engineering program.
Reporting and Documentation
+ Maintain comprehensive documentation of all detection rules, including development rationale, testing results, and performance metrics.
+ Prepare and present detection engineering reports and metrics to senior leadership and stakeholders.
+ Ensure compliance with regulatory requirements and industry standards related to threat detection and monitoring.
Training and Awareness
+ Develop and deliver detection engineering training programs for team members and other relevant personnel.
+ Promote security detection awareness and best practices across the organization.
+ Ensure the detection engineering team is up-to-date with the latest tools, techniques, and procedures.
Budget and Resource Management
+ Manage the detection engineering budget and allocate resources effectively.
+ Evaluate and recommend tools, technologies, and services to enhance the detection engineering program.
+ Ensure the team has the necessary resources and support to perform their duties effectively.
Basic Qualifications:
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related technical discipline, or equivalent practical experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 7+ years of experience in cybersecurity, with a focus on detection engineering, security monitoring, threat intelligence, incident response, or related security roles.
+ Experience leading or managing a cybersecurity, incident response, or detection engineering team.
+ Experience in cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK, OCSF).
+ Experience in detection engineering tools and technologies (e.g., Query Languages, CI/CD, YARA, Sigma rules, threat intelligence platforms).
+ Experience with threat analysis, detection rule development, automation engineering, and security monitoring optimization.
+ Project management experience with managing budgets and resources.
Preferred Qualifications:
+ Master's degree in Cybersecurity, Information Assurance, or a related field.
+ 10+ years of experience in cybersecurity, with significant experience in detection engineering, threat intelligence, or incident response.
+ 3+ years of management experience in building small to medium-sized teams, demonstrating growth and a track record of successful deliveries.
+ Ability to work under pressure and manage multiple detection development projects simultaneously as well as managing an oncall team.
+ Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, SANS).
+ Experience in developing and delivering detection engineering training and awareness programs.
+ Strong proficiency in Kusto Query Language (KQL) and SQL.
+ Proficiency in programming or scripting languages (e.g., Python, Go, etc.) for automating detection development and testing processes.
+ Experience with cloud security and detection engineering in cloud environments especially Azure.
+ Knowledge of advanced threat detection techniques, including threat hunting and behavioral analysis as well as applied threat intelligence.
+ Familiarity with detection engineering frameworks and best practices (e.g., Sigma, YARA, STIX/TAXII, OCSF).
+ Strong communication skills, both written and verbal, with the ability to convey complex technical information to non-technical stakeholders.
Suggested Skills :
+ Security Information and Event Management (SIEM)
+ Query languages (KQL, SPL, SQL, Elastic, etc.)
+ Detection Rule Development (YARA, Sigma)
+ Scripting and Automation (e.g., Python, PowerShell, SQL)
+ Threat Intelligence Integration
+ Cloud Security (e.g., Azure, GCP)
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
**Equal Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
**Global Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
Cyber Security Architect / Engineer - Infrastructure and Applications
Security architect job in San Francisco, CA
NO SPONSORSHIP - NO OPT
Cybersecurity Engineer / Architect
BILL RATE: Open - C2C or W2
DURATION: 1 YEAR OR LONGER
The manager is looking for someone out of a large enterprise environment and is a true architect with engineering skills. Highly technical and applications and infrastructure focused is key platform applications storage network virtualization cloud azure and mobile security
The Cyber Security Engineer will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
Skills/Experience:
Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions.
Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.
Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.
Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture.
Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements.
Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks.
Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices.
Mandatory Technical Skills:
Experience with healthcare data systems or claims management platforms
Strong knowledge of network security protocols, best practices, and perimeter security tools
Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping
Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management
Understanding of common data protection technologies such as cryptography, tokenization, and hashing
Additional Technical Skills:
Understanding of Azure native security services and best practices
Strong knowledge of threat modelling and risk assessment technologies or frameworks