Post job

Security Architect remote jobs

- 632 jobs
  • OT Security Architect

    First Quality 4.7company rating

    Remote job

    We are seeking an OT Security Architect to work remotely. This position will be responsible for safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety. Primary responsibilities include: • Primarily responsible for OT security event monitoring, management, and response • Create an IS reference architecture for our OT networks • Work with OT engineering team, as well as with SOC team and verify that the reference architecture fits the business processes and requirements • Work with OT engineering teams for defining security controls for their on-going projects • Provide technical guidance to the GRC team with assessing OT 3rd party vendor and supply chain • Integrate with OT engineering projects and verify that the required IS controls are properly implemented • Revise and develop processes to strengthen the current OT Security Operations Framework, review policies and highlight the challenges in managing SLAs • Perform threat management, threat modeling, identify threat vectors and develop use cases for OT security monitoring including red\blue penetrations tests • Responsible for developing, configuring, and maintaining OT security automation and orchestration IR's and tools. • Creation of reports, dashboards, metrics for OT security operations and presentation to Sr. Mgmt. • Create required standards and procedures (i.e. IS purchasing standard, sanitization process) in coordination with all relevant stakeholders The ideal candidate should possess the following: • Minimum of five (5) years of professional experience in OT security and operations. • Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.) • Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443 • Experience in defining and implementing security controls for OT engineering projects. • Experience managing projects with the abilities to prioritize tasks and manage time effectively. • Experience in developing, configuring, and maintaining OT security automation and orchestration tools. • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered. • Background in manufacturing controls is preferred What We Offer You We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive: • Competitive base salary and bonus opportunities • Paid time off (three-week minimum) • Medical, dental and vision starting day one • 401(k) with employer match • Paid parental leave • Child and family care assistance (dependent care FSA with employer match up to $2500) • Bundle of joy benefit (years' worth of free diapers to all team members with a new baby) • Tuition assistance • Wellness program with savings of up to $4,000 per year on insurance premiums • ...and more! First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data. First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status. For immediate consideration, please go to the Careers section at ******************** to complete our online application.
    $85k-133k yearly est. 4d ago
  • Smart Contract Security Engineer

    Techchain Talent

    Remote job

    Our client is building the infrastructure for a more trustworthy internet. We are looking for a Smart Contract Security Engineer. In this role, you wont just audit code, you'll shape the security model for high-value protocols and safeguard the trust of an entire ecosystem. You'll work at the intersection of cutting-edge research, high-stakes engineering, and adversarial thinking, building defences for decentralized systems. This is a full-time position, fully remote or located with our primarily Seattle-based team. What You Will Do Lead design and security reviews of complex staking, reward distribution, and protocol contracts Build tooling, fuzzers, and formal verification pipelines to identify vulnerabilities before attackers do Collaborate directly with protocol researchers and engineers to harden new features from inception Read, interpret, and refine formal verification specifications to ensure they capture critical security properties Work closely with product and leadership teams to set on-chain strategy and roadmaps This is a unique opportunity to create a new paradigm of permissionless innovation and have outsized impact on the protocol and broader ecosystem. What You Will Bring Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities Experience with developer tools for smart contract development (e.g., Hardhat, Foundry) Passion for collaborating with developers, security auditors, and stakeholders Strong testing skills and experience with testing frameworks for smart contracts Experience with production deployments of non-trivial protocols and associated security audits Ability to collaborate with cross-functional and geographically remote teams For more information, please contact **************************
    $97k-136k yearly est. 1d ago
  • Cyber Security Engineer

    Robert Half 4.5company rating

    Remote job

    Are you ready for a change in 2026? If so, please keep reading! A client in the financial services industry is seeking a Cybersecurity Engineer to join their growing Information Security team. This is a direct-hire, hybrid role based in Fresno, CA, offering a mix of in-office and remote work each week. This role is ideal for a seasoned, hands-on cybersecurity professional who enjoys advanced threat analysis, incident response, and security engineering within a regulated environment, and who is confident serving as a trusted technical advisor across the organization. As the Cybersecurity Engineer, you will: Perform threat analysis, threat hunting, and incident response from detection through remediation Monitor, tune, and investigate alerts across EDR/XDR, SIEM, DLP, email security, and identity protection tools Support cloud security initiatives, particularly within Microsoft Azure and Microsoft security ecosystems Conduct vulnerability management, risk assessments, and remediation planning Participate in security architecture reviews, vendor assessments, and technology implementations Develop and improve security policies, procedures, runbooks, and technical documentation Serve as a senior technical resource, advising internal teams on security, risk, and compliance matters The ideal candidate will have: 5+ years of hands-on experience as a Cybersecurity Analyst, Security Engineer, SOC Analyst, or similar role Strong experience with threat detection, forensic analysis, and incident response Deep familiarity with Microsoft-based security environments Experience in highly regulated or financial services environments strongly preferred One or more professional cybersecurity certifications such as CISSP, CEH, CySA+, or similar If interested in learning more about this Cybersecurity Engineer role, please apply today!
    $106k-151k yearly est. 1d ago
  • Network Security Analyst 2 - Austin, TX (Hybrid)

    My3Tech

    Remote job

    Years Required/Preferred Experience 4 Required Experience with Linux and Windows operating systems 2 Required Experience of Vulnerability Management and Proficiency with Vulnerability Management tools 2 Required Understanding of networking concepts 2 Required Knowledge of Cybersecurity Frameworks such as NIST, ISO, or PCI. 2 Required Understanding of the MITRE ATT&CK framework 2 Required Ability to comprehend technical infrastructure, cloud computing, third-party dependencies and managed services 3 Preferred Degree in cybersecurity, computer science or related field 3 Preferred Experience with Red Hat Enterprise Linux (RHEI) administration, and Microsoft Active Directory and Group Policy 3 Preferred Experience with vulnerability management in cloud platforms such as AWS or Azure 3 Preferred Experience with Tenable/Qualys; JavaScript or PowerShell 3 Preferred Experience with ServiceNow dashboards 3 Preferred Ability to make actionable recommendations for discovered vulnerabilities 3 Preferred Ability to convey technical concepts clearly to both technical and non-technical audiences 3 Preferred Strong written skill for creating documentation and executive summaries
    $67k-91k yearly est. 1d ago
  • Information Security Analyst

    Ispace, Inc.

    Remote job

    Title: Information Security Analyst Duration: 12+ months contract Hybrid role 3 days Office, 2 days work from home Pay rate$65 per hr on W2 Local to Los Angeles candidates only Summary This is a hands-on security position working within the Information Security group and with the internal IT department at large. This position's core focus is to ensure consistent, measurable end to end delivery of security services. The successful candidate will work to develop and deploy capabilities ensuring enterprise systems and data are protected with the security controls and tools required to meet policy and compliance requirements. We are looking for candidates who have a passion for cybersecurity, threat detection, risk mitigation and response. You will be a key part of our efforts to build and support a defensible environment where we are able to detect, contain and respond quickly to threats and compromises in ways that serve to enable the business needs of a highly collaborative organization. The environment is fast-paced and commonly on the leading edge of technology, including early adoption of various cloud services along with the challenges of integrating those services into our security practice. Responsibilities Support a Technology Vendor Management program, ensuring technology risk reviews across multiple disciplines, and monitoring for renewals and savings opportunities Participate in risk reviews of the IT control framework (NIST CSF, CIS, ITIL, ISO 270001, etc.) Conduct thorough vendor, product and applications security assessments partnering with systems owners to integrate security early during the project lifecycle. Coordinate, across service owners, the implementation of core security integrations (SSO, Event Logs, Secrets, Alerting, Threat Model and Backup/Recovery) with applications developed in-house and externally/SaaS hosted environments. Partner with business groups to review workflows, producing output to enhance security processes in support of those workflows. Support the development and implementation of a data protection program. Coordinate with IRM leadership to develop and deliver key security metrics to ensure technical security controls are meeting desired objectives; ensuring the measurable effectiveness of CAA's technical controls. Required Capabilities A minimum of 2-3 years in Information Technology A minimum of 2 years' experience in cybersecurity risk management A Bachelor's or Master's Degree in a relevant field of work Strong analytical skills in conducting due diligence to identify, assess and prioritize vendor risks Familiarity with information security frameworks (NIST, ISO27001), data privacy regulations (GDPR, CCPA), and information security certifications/attestations (SOC, ISO, PCIDSS, FedRAMP) Experience in coordinating technical integrations for security tooling and processes. Ability to review complex systems architectures to identify key security integration opportunities Produce a comprehensive, written, security assessment of vendors security posture Experience using security analytics tooling to produce operational metrics and dashboards A strong understanding of the fundamental operations of servers, operating systems, cloud applications, and infrastructure Desired Skills Core skills in Cybersecurity fundamentals and Third Party Risk Management Familiarity with using Third Party Risk Management tools/processes such as One Trust, SIG or similar GRC platforms. Hands-on experience in Azure, AWS Cloud environments and familiarity with core Cloud services and Cloud architecture Familiarity with core security concepts of Single Sign-on (e.g PingFed, SAML), Identity and Access Administration (Active Directory, Azure AD, AWS IAM), Event Management (Splunk), Expert skills in using Microsoft Office suite, JIRA. If you're interested in above role please send me your updated resume to *******************************
    $65 hourly 3d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 5d ago
  • Senior Manager, Customer Trust & Field Security Specialist - Capital One Software (Remote)

    Capital One 4.7company rating

    Remote job

    Senior Manager, Customer Trust & Field Security Specialist - Capital One Software (Remote) About the Role: We are seeking an experienced and detail-oriented Senior Manager with horizontal cybersecurity expertise to join our dynamic Customer Trust & Field Security team. This critical role acts as the security expert for our sales and business development efforts, bridging our technical security posture with the questions of prospective customers. You will be responsible for reviewing, interpreting, and responding to customer security-related inquiries, ensuring our responses are accurate, complete, and aligned with our security certifications and documentation. This position is pivotal in establishing and strengthening customer confidence in our cybersecurity, privacy, and compliance programs, influencing product direction and sales strategy to solve real-world security challenges. You will drive transparency, thought leadership, and strategic engagement, ensuring our security posture aligns with industry best practices while enabling business growth. This is an opportunity to be a crucial part of our growth. If you're a cybersecurity professional who enjoys the challenge of communicating technical concepts in a business context, we'd love to hear from you. Key Responsibilities: Customer Trust & Transparency: Scale and build upon existing programs like the Customer Trust Center, providing customers with self-service access to relevant security, privacy, and compliance information. Customer Engagement: Act as a trusted technical and security advisor, engaging customer security teams and IT leaders to align on their cybersecurity & business needs. Serve as the internal subject matter expert on security for the GTM team, supporting sales and account managers in client-facing discussions and presentations. Industry Thought Leadership: Represent the company externally in security and technology conversations, shaping best practices and positioning our solutions as industry-leading. Go-to-Market & Sales Acceleration: Bridge the gap between technical value and business outcomes, aligning security messaging with sales and marketing strategies to drive adoption of our products. Cross-functional Influence & Collaboration: Work closely with the engineering, legal, risk, cyber, and compliance teams to ensure our security responses are accurate and reflect our latest technical and regulatory standing. RFI/RFP Response: Analyze and respond to cybersecurity sections of RFIs (Requests for Information) and RFPs (Requests for Proposal), providing detailed and precise information about our security controls, policies, and procedures. Security Documentation: Maintain and update a knowledge base of our security posture, including security policies, certifications (e.g., SOC 2, ISO 27001), and compliance documentation. Continuous Improvement: Identify trends in customer security inquiries to help improve our documentation and proactive communication strategies. Third-Party Risk & Due Diligence: Support third-party risk and due diligence processes, helping customers efficiently evaluate our security posture. Product Roadmap Contribution: Provide insights on emerging cybersecurity trends and customer expectations to contribute to the product roadmap. Security Sales Playbook Development: Develop and standardize security sales playbooks, equipping sales teams with messaging, objection handling, and case studies, as applicable. Why Join Us: Impactful Role: Play a critical role in shaping our customer trust strategy, directly influencing business growth and sales success by building trust and demonstrating our commitment to security for our customers. Collaborative Culture: Partner with diverse teams across the organization, from engineering to sales, in a fast-paced work environment. Thought Leadership: Represent the company externally and contribute to industry best practices. Customer-Centric Focus: Be part of a team dedicated to empowering organizations to confidently adopt our solutions. Basic Qualifications: At least 7 years of progressive experience in a cybersecurity or information security role, with a strong understanding of security frameworks and best practices, and a focus on horizontal expertise across various domains. At least 4 years in customer - facing roles , acting as a trusted advisor to senior security and IT leaders. Deep technical understanding of cybersecurity principles, data protection, privacy, and compliance frameworks. Familiarity with common cybersecurity concepts, including access control, encryption, network security, and incident response. Excellent written and verbal communication skills with the ability to translate complex technical information into clear, concise, and professional responses for both technical and non-technical audiences. Meticulous and organized, with a proven ability to manage multiple projects and deadlines simultaneously and great attention to detail . Ability to influence and collaborate effectively with cross-functional teams. Preferred Qualifications: Experience in developing and implementing scalable Customer Trust programs. 3+ years experience with Third Party Risk Management programs. Strong business acumen and the ability to translate complex technical concepts into business value. Professional certifications such as CISSP, CISM, CIPP/E, or CompTIA Security+ Experience with cloud services and cloud technologies (e.g., AWS, Microsoft Azure, GCP), cybersecurity technologies, data cloud platforms (e.g., Snowflake, Databricks). At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. Remote (Regardless of Location): $204,900 - $233,800 for Sr. Manager, Solutions Architecture McLean, VA: $225,400 - $257,200 for Sr. Manager, Solutions Architecture Richmond, VA: $204,900 - $233,800 for Sr. Manager, Solutions Architecture Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $225.4k-257.2k yearly 6h ago
  • Information Security - Governance, Risk, and Compliance (GRC) Director (Remote)

    P&G 4.8company rating

    Remote job

    Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands. From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded. The Opportunity P&G is seeking a Governance, Risk, and Compliance Director passionate about safeguarding data, enabling business through smart risk management, and shaping the future of cybersecurity. The IT Governance, Risk, and Compliance (GRC) Organization at Procter & Gamble is responsible for risk identification, assessment, and remediation across the IT landscape, as well as driving automated governance and compliance breakthroughs. As the GRC expert, you'll play a critical role in maturing and maintaining the security risk and compliance posture of our organization. You will lead initiatives that align our security program with business goals, ensure regulatory and policy compliance, and creatively solve problems to manage risk for the company. Responsibilities: Governance: Maintain and evolve the information security policy framework and controls aligned with industry best practices (e.g., NIST, ISO 27001, CIS). Establish and track metrics to measure policy adherence and program maturity. Drive internal alignment on security roles, responsibilities, and expectations. Risk Management: Manage the enterprise risk management process including risk identification, analysis, treatment planning, and reporting. Conduct security risk assessments for internal systems, projects, vendors, and business processes. Facilitate risk-based decision-making at all levels of the organization. Compliance: Ensure ongoing compliance with applicable regulations and frameworks (e.g., GDPR, HIPAA, CCPA, SOX). Maintain a library of evidence and documentation to support audit and regulatory needs. Monitor the effectiveness of IT controls and identify gaps in compliance. Analyze control measurements for negative trends and reoccurrence frequency. Collaborate with internal/external auditors on compliance audits, audit findings, and issue remediation Awareness & Enablement: Contribute to the continuous improvement of the risk and compliance mindset across P&G. Build IT risk awareness by providing support and training to others. Collaborate cross-functionally with IT, Legal, Privacy, and Business Operations teams. Stay up to date with how current events, security focus areas, and the regulatory environment may impact P&G's compliance processes Estimated Percent of Time Spent on Work 25% - Risk identification, analysis, and assessment 40% - Plan and drive enterprise-wide initiatives to reduce risk and improve compliance across the organization 25% - Assess and improve the effectiveness of IT controls and compliance across the enterprise 10% - Collaboration with internal/external auditors, driving a risk-aware compliance mindset Job Qualifications Required: Bachelor's degree in Computer Science, Computer Systems Engineering, Cybersecurity, Industrial Engineering, Business Management Information Systems, Software Development, or related field Prior hands on experience working in a security-focused role, such as Information Security Analyst, SOC Analyst, Security Engineer, etc. 8+ years of experience in Governance, Risk, and Compliance with a focus on Information Security In-depth knowledge of major security frameworks (e.g., NIST CSF, ISO 27001, SOC 2). Experience conducting risk assessments, audits, and control testing. Strong understanding of regulatory compliance requirements (e.g., GDPR, HIPAA, SOX, PCI DSS). Proven ability to write policies, manage documentation, and communicate clearly to both technical and non-technical stakeholders. Ability to influence and build relationships with business unit stakeholders, external service providers, and architecture teams. The ability to work independently, collaborate, and learn quickly. English fluency (speak, write, and read) Preferred Skills: Certified in CISSP, ISACA CRISC, CGEIT, CISA, or similar Pay Range: $160,000 - $220,000 Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process. Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE. P&G participates in e-verify as required by law. Qualified individuals will not be disadvantaged based on being unemployed. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Job Schedule Full time Job Number R000136880 Job Segmentation Experienced Professionals Starting Pay / Salary Range $160,000.00 - $220,000.00 / year
    $160k-220k yearly Auto-Apply 60d+ ago
  • Attack Surface Management Security Architect Remote 1444153

    Cisco 4.8company rating

    Remote job

    The application window is expected to close on: November 21, 2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. Remote USA The successful applicant may be performing work on FedRamp environments and partnering with researchers and threat intel teams that require they be a U.S. Person (i.e. U.S. citizen, U.S. national, lawful permanent resident, asylee, or refugee). This position may also perform work that the U.S. government has specified can only be performed by a U.S. Citizen on U.S. soil. **Meet the Team** The Cisco Attack Surface Management (ASM) Team is a highly skilled and dynamic group focused on detecting and remediating Cisco's operational security risks inclusive of IT services, acquisitions, and BU operated infrastructure and services, initially concentrating on identifying and reducing risks associated with Cisco's external perimeter. The ASM service unifies tooling sources of truth, mis-configurations, and vulnerability data collected to enable executive accountability and track the prioritized remediation of all exploitable weaknesses within target operational level agreements. The team is at the forefront of cybersecurity, employing ground breaking technologies and methodologies to detect, analyze, and proactively address attack surface threats. **Your Impact** We are seeking an enthusiastic and motivated Security Architect to support the implementation, client-facing delivery, and continuous improvement of our attack surface management service. This role will contribute to the proactive, sustainable, and measurable reduction of operational risk at Cisco, addressing foundational improvements and security root cause resolution. Multi-Functional Collaboration: Team members work closely with experts across various domains, including investigations, analysis, vulnerability management, security architecture, threat intelligence, cyber legal, data protection, and compliance, providing opportunities to learn and grow while addressing sophisticated challenges. **Key Responsibilities** + Be a trusted security architect across every business unit for exposure detection and remediation + Lead multiple client engagements using a campaign-based, risk remediation approach as part of a bi-directional partnership with active Business Unit/Business Entity contacts to serve last mile capabilities at scale + Lead exposure management campaigns across the organization using tools and platforms like Axonius, BishopFox, Tenable, Wiz, and a variety of authoritative tools to provide insight for rapid remediation. + Design and implement security campaigns advised by vulnerability discovery, mis-configurations, and attack surface analysis using automated and manual techniques. + Identify gaps in tooling and visibility of operational assets and assist the clients and ASM Platform team in discovery of unknowns and enabling new data feeds. + Lead collaboration with key partners within the Security & Trust Organization including security operations, incident response, risk management, and offensive security teams to drive risk reduction. + Know the latest with emerging threats, attack techniques, and ASM technologies to continuously enhance the ASM program. + Provide guidance and training to security teams on security protocols and tools. + Foster long-term relationships with key client partners, understanding their critical business needs and helping them to proactively identify and address operational security risk. + Leverage your superb communication skills to articulate sophisticated security concepts to technical and non-technical partners. **Minimum Qualifications** + Bachelor's degree in Cybersecurity, Intelligence, or related field. + 7+ years of experience in threat intelligence, cybersecurity, or security operations. + Expertise in vulnerability management, threat modeling, and security risk assessment. + Solid knowledge of network, endpoint, server, and application security fundamentals. **Preferred Qualifications** + Ability to read/understand exploit code, development skills, and think like an attacker. + Certified Threat Intelligence Analyst (CTIA) or GIAC Cyber Threat Intelligence (GCTI). + Solid experience in integrating threat intelligence into security operations, including experience with API integrations, automated scanning, and security analytics. + Ability to work collaboratively in cross-functional teams and lead security initiatives. STO25 **Why Cisco?** At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. **Message to applicants applying to work in the U.S. and/or Canada:** The starting salary range posted for this position is $148,000.00 to $187,800.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time. U.S. employees are eligible for paid time away as described below, subject to Cisco's policies: + 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees + 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco + Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees + Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations) + 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next + Additional paid time away may be requested to deal with critical or emergency issues for family members + Optional 10 paid days per full calendar year to volunteer For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows: + .75% of incentive target for each 1% of revenue attainment up to 50% of quota; + 1.5% of incentive target for each 1% of attainment between 50% and 75%; + 1% of incentive target for each 1% of attainment between 75% and 100%; and + Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid. The applicable full salary ranges for this position, by specific state, are listed below: New York City Metro Area: $177,400.00 - $259,600.00 Non-Metro New York state & Washington state: $158,100.00 - $230,400.00 * For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined. ** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements. Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
    $177.4k-259.6k yearly 47d ago
  • SAP Security Consultant. Remote Part Time or Full time Long Term Multi Year

    CapB Infotek

    Remote job

    For one of our ongoing project we are looking for SAP Security consultant. This is a 100% remote project and can be done on a Full time or Part time basis. The project is very Long term multi year. REQUIREMENTS Minimum of five (5) years of relevant work experience preferred. Minimum of three (3) years (five preferred) of experience in security implementation and support within SAP HCM, Financials/Logistics, BW, and Solution Manager for on-prem ECC (non-S/4). Strong background in SAP security. Minimum of three (3) years (five preferred) proven experience in designing, developing, and implementing custom SAP security roles for on-prem ECC (non-S/4). Minimum of three (3) years (five preferred) of experience in troubleshooting and researching SAP security solutions for both new developments and reported issues in on-prem (non-S/4) environments. Experience with BW4 HANA security conversion (from on-prem) in one or more conversion projects. Hands-on experience with SAP Security and Authorization concepts. Familiarity with testing strategies, technical monitoring, and incident management. Experience in SAP project management, adhering to SAP Best Practices. Practical experience in role building for HCM, Financials/Logistics, Business Warehouse, Solution Manager, and SAP Analytics Cloud. Proficient in troubleshooting and resolving security issues related to HCM, Financials/Logistics, Business Warehouse, Solution Manager, and SAP Analytics Cloud. Experience in implementing and testing necessary security notes. Deep understanding of Segregation of Duties (SoD) as it pertains to business/financial processes and security access. Collaborative experience with BASIS and ABAP developers regarding security components and ABAP custom programming for security processes. Extensive experience in writing security documentation, work instructions, and both technical and functional specifications. Skilled in creating comprehensive documentation (work instructions, project documentation, specifications, etc.) for future reference and maintainability, with the ability to work with minimal supervision. Strong focus on teamwork and customer support. Analytical, results-driven, and solution-oriented mindset. Exceptional interpersonal and communication skills, both verbal and written, with excellent proficiency in English. Ability to cross-train and share knowledge with support teams. Effective collaboration and engagement with all team members. Strong planning and organizational skills. Good facilitation abilities. SCOPE OF WORK HCM - OM, PA, BN, PY, EH&S, TM, SuccessFactors Learning, ESS, MSS including Portal, Gateway and Fiori Applications. Financials and Logistics - FI, CO, AP, AR, AA, FM, PS, MM, IM, WO, GM, OpenText - Invoice Management and Workflow. SAP Business Warehouse and SAP Analytics Cloud. SAP Solution Manager - Test Plan/Pkg., CBTA, BPCA, CCM and SP updates. Augment the current security team with SAP consulting services for maintenance support, project research, development, enhancement, configuration, design, build, testing, and deployment within the HCM, Financials/Logistics, and Solution Manager modules. Providing adequate deliverable documentation including but not limited to technical specs and test scripts. Assisting staff in developing new enhancements and maintaining existing custom enhancements to SAP modules. Assisting staff in developing and executing test strategies. Knowledge transfer through mentoring and training members of the various teams throughout the SOW engagement to allow for independent support. Implementing and supporting new SAP security requirements and development. Participate in defining problems and/or developing solutions. Performing required testing of HCM, Financials/Logistics, BW, and Solution Manager system changes or new security development prior to transport into quality assurance environment. Updating appropriate system and user documentation. Security development (roles/authorizations/etc.) for HCM, Financials/Logistics, BW, and Solution Manager. Supporting support pack implementations and upgrades. Assisting staff in support and troubleshooting of security due to support pack upgrades and the application of SAP required notes.
    $79k-110k yearly est. 60d+ ago
  • Director, Information Security

    Moov

    Remote job

    As Director of Information Security at Moov you will be responsible for the comprehensive enterprise-wide information security policy, strategy, architecture, operations, and capability enhancements of Moov and our platform. This position collaborates with the senior leadership team on security strategy, capability enhancements, and the development of enterprise security awareness and accountability. You will: Key Responsibilities: Develop, implement, and maintain information security policies, practices, and operations. Oversee incident evaluation and response, ensuring swift and effective handling. Manage corporate information security risk and regulatory architecture and status reporting efforts. Create and roll out audit and compliance programs. Implement technical compliance solutions and support for security awareness and training programs to ensure compliance. Collaborate with cross-functional teams to maintain a high standard of cybersecurity posture and response. Build and operate a security and compliance program for money movement regulations, aligning with information security policies and standards. Foster a security-conscious culture and ensure the platform's security. Leadership and Strategy: Execute a plan to achieve and maintain industry compliance for SOC 1, SOC 2, PCI, NACHA, FedRAMP, and other compliance programs. Research, educate, and recommend technical solutions to support compliance efforts. Develop, implement, and manage a comprehensive organization-wide information security and risk management program. Deliver education on compliance with security policies. Conduct security risk assessments and manage risk management processes. Ensure compliance with relevant laws, regulations, and policies in Moov's information security practices. Lead the information security team that is protecting Moov. Recruit, motivate, mentor, and lead the best security talent. You have: Bachelor's degree in Computer Science, Engineering, Information Systems, Cyber Security, Business, or a related academic discipline. 7-10+ years of relevant experience or an equivalent combination of education and experience. Strong knowledge of regulatory requirements and information security management frameworks, including SOC 1, SOC 2, ISO/IEC 27001, ITIL, SOX, PCI, FedRamp, and NIST. Ability to work in a fast-paced environment. Knowledge of payment systems, fintech, or online banking. Certification in CISSP, CISM, CRISC, CISA, CFE, or similar is highly recommended. Experience with banking regulations. Knowledge of OSS tools and active participation in OSS community. Experience working with remote-only teams. Experience with mid-size organizations and startups. Our company: Moov is a 100% remote company with people from more than 26 states. We're backed by a16z and other respected investors. We won Visa's global Everywhere Initiative and our community of builders grows larger every day. We're committed to building a team that represents a variety of backgrounds, perspectives, and skills and we embrace diversity, creativity, and equal opportunity. Our people: Our customers come from all walks of life and so do we. We hire great people from a variety of backgrounds, not just because it's the right thing to do, but because it makes our company stronger. We have mountain bikers, skiers/boarders, runners, video gamers, musicians, movie buffs, weight lifters, and about every other type of person in between. We enjoy solving problems and tackling challenges with creativity. If we don't know the answer, we revel in the hunt to find it. We like helping people and choose to give first. We're patient, open, and honest. If you share our values and enthusiasm for making the complex simple and delightful, you'll find a home at Moov. Benefits include: Competitive base salary + employee stock options w/early exercise opportunity 100% remote. We make remote-work work. We match what you contribute to your 401(k) up to 5% of your salary Generous parental leave Medical Ins: Health Savings Account (HSA) option w/employer contribution EAP and other wellness resources Unlimited PTO+ generous paid holiday schedule Professional Development Budget, we have a culture that encourages and promotes professional growth and development Home office stipend Culture of people helping people who give first, celebrate wins together and embrace autonomy, transparency, and trust The opportunity to join an experienced and ambitious team passionate about solving customers' needs and who love what they do Partner with a community of 3000+ developers around the world, helping them focus on possibilities vs payments Employee referral incentive Salary range: $220k - $232k based on experience, geography, and other key factors Advice: If you're nervous about not meeting every qualification above, apply anyway. Moov is all about pushing boundaries-ours, yours, and the industry's-so we look for curious people willing to experiment and grow. While we can't teach curiosity and compassion, we can teach some technical skills. Of course, we can't guarantee anything, but as Michael Scott says,“You miss 100% of the shots you don't take!” (Or was that Wayne Gretzsky?) One more thing: Don't go iron your clothes for your interview (do people still own irons?). We're all pretty casual here, so you can wear whatever you are most comfortable in. Okay-last thing: When you meet with us, have some concrete, tangible examples of when you've added value, improved something, created something, or done some fantastic, customer-centric work. We also want to learn about you as a person. If you want to know what it's like working at Moov, check out stories from our employees. PS: Share our job roles with others! Wouldn't it be nice to make new friends and bring over old friends? We think so. Moov Financial is a participant of E-Verify. All potential employees and employees are bound by the guidelines in the MOU and the rules and responsibilities. For more or up to date information on E-verify, go to ********************** and click on E-verify.
    $220k-232k yearly 27d ago
  • Senior Security Analyst III

    Oppfi

    Remote job

    OppFi is a leading tech-enabled digital finance platform that works with banks to provide financial products and services for everyday Americans. Through a transparent and responsible platform, which includes financial inclusion and excellent customer experience, the Company supports consumers who are turned away by mainstream options to build better financial health. We are a team of caring, innovative, and inclusive individuals who thrive in being immersed in diverse talents, expertise, perspectives, and backgrounds. Our employees approach every new challenge with an unparalleled ability to see what could be rather than settle for what is. Our business principles guide us and create an open and collaborative culture where we improve 1% every day, and the best ideas always win! We welcome individuals who want to make an impact in the financial system by facilitating credit access, expanding financial inclusion, promoting financial health, and delivering exceptional customer service. A few other fun facts about us. OppFi is one of the top consumer-rated financial platforms online, maintaining a 4.5/5.0-star rating on Trustpilot. We are a 2025 Crain's Fast 50™ company and were named on Built In's 2025 Best Places to Work in Chicago. Senior Security Analyst III As Senior Information Security Analyst III, you will be a key contributor to our day-to-day security operations, assisting with threat monitoring, incident triage, vulnerability remediation, and GRC activities. This role is an excellent opportunity for someone with security experience who is eager to grow their skills in risk management, cloud environments and security best practices. You will work closely with senior team members and various OppFi internal teams to ensure our environment maintains security, visibility, and compliance standards. What you get to do: Information Security Risk Management: Own the security review and assessment process evaluating the risk associated with introducing new applications/tools into the environment. Assist with security risk management activities, including the analysis, quantification, and tracking of information security risks, plus the review and documentation of risk exception requests. Policy and Compliance Analysis: Identify emerging compliance requirements and assess their impact on our policies. Develop and refresh our policies, procedures, standards, and guidelines to stay compliant and aligned with industry best practices. Governance Visibility: Design and maintain dynamic dashboards or scorecards that offer clear insights into Information Security Governance activities, demonstrating our commitment to security and compliance. Security Operations & Incident Support Monitor security alerts from various tools (SIEM, EDR, cloud logs) and support the triage of potential security incidents by gathering initial data and escalating to senior engineers as needed. Assist in the execution of security incident response playbooks, focusing on initial steps like investigation, basic containment, and documentation. Contribute to the documentation and tracking of security incidents to support audit and compliance requirements. Support the monitoring and logging strategy by assisting with the configuration and tuning of SIEM (Security Information and Event Management) alerts and reports. Perform regular log review and analysis for suspicious activities under the guidance of senior staff. Improvement & Collaboration Contribute to the development and maintenance of operational playbooks and documentation for security processes. Learn to deploy and manage new security tools and assist in the development of basic threat detection logic. Develop basic security performance metrics and assist with reporting to measure the effectiveness of security controls. Performs other related duties as assigned. What you will bring to the team: 3-5 years of professional experience in Information Security or IT Risk Management, with a background supporting IT compliance programs to meet regulatory requirements and demonstrated expertise in at least one of the following areas: Security Operations, Incident Response, or Vulnerability Management. Experience with Security and control frameworks, such as FFIEC, NIST, COBIT, ITIL, and ISO control framework EDR platforms (e.g., CrowdStrike, Defender for Endpoint, SentinelOne) SIEM/SOAR tools (e.g., Sumo Logic, Splunk, Chronicle, or Azure Sentinel) CSPM tools (e.g., Wiz, Prisma, Orca) Vulnerability management platforms (e.g., Qualys, Tenable, Rapid7) Experience identifying potential IT controls risks and opportunities through and offering sustainable recommendations that address cause rather than symptoms Experience with information security standards, best practices for securing computer systems within applicable laws and regulations Experience with Governance Risk & Compliance (GRC) tools and procedure development Solid understanding of common attack techniques (MITRE ATT&CK), incident triage, and remediation workflows. Foundational knowledge of AWS (Amazon Web Services) or other cloud environments. Basic understanding of networking, operating systems (Linux/Windows), and common security principles (e.g., least privilege, defense-in-depth). Familiarity with automation frameworks or API integrations for security tools. Strong written communication skills necessary for developing clear, concise procedures and playbooks, coupled with effective verbal skills for communicating technical findings. Experience building dashboards and metrics for leadership visibility. Strong analytical and problem-solving skills with a keen attention to detail and a desire to learn quickly. Bachelor's degree in Cybersecurity, Computer Science, or equivalent experience. Certifications such as CompTIA CySA+, GCIH, GCIA, GMON, GCDA, GSOC, or CISSP associate are preferred. Experience working in a regulated industry (financial services or health care) Reports to: Manager, Security Operations Total Rewards and Benefits: At OppFi, we are committed to fostering a fair and equitable workplace. The compensation range for this role reflects our good faith compensation estimate for this position. Final offers are determined based on a myriad of factors including, but not limited to experience, skills, qualifications, and other relevant business considerations. Candidates are encouraged to discuss compensation expectations during the hiring process. In addition to base pay, the total compensation package includes eligibility and potential for performance-based bonuses and equity grants dependent upon the role and job level. OppFi offers a flexible, remote environment, 401(k) matching program, and generous paid time off. Other benefits include medical, dental, and vision coverage, and tuition reimbursement. Additional benefits include DoorDash DashPass, Figo pet insurance, Rocket Lawyer, and access to LinkedIn Learning. OppFi also offers Fringe, a lifestyle benefits platform that allows employees to decide how to spend rewards from dozens of vendors like Uber, DoorDash, and UrbanSitter. #LI-Remote Compensation Range:$102,400-$153,600 USD EEO Statement: OppFi is an equal opportunity employer and does not discriminate based on any actual or perceived legally recognized protected bases under local, state, federal law, or regulations. Our goal as a company is to build an equitable workplace that actively works to dismantle systems of oppression in our processes, procedures, and interactions. We aim to help our employees thrive where they work and beyond. Check out our Culture page here. As part of OppFi's commitment to providing equal opportunity to qualified individuals, OppFi will ensure that persons with disabilities are provided reasonable accommodation as defined by applicable laws and organizational policies. If reasonable accommodation is needed to participate in the job application or interview processes or job requirements, please contact our People Team at ********************. Pursuant to the requirements of the California Consumer Privacy Act, OppFi is providing the "OppFi California Employee Privacy Policy", which details the categories of personal information collected and your rights under the policy. If you are a California resident, please review the policy here: ******************************* The information in this document is for general informational purposes only. It is not intended to be an all-inclusive list or description of the organization and its requirements for positions and employees. OppFi reserves the right to modify or change the information on this document at its discretion.
    $102.4k-153.6k yearly Auto-Apply 46d ago
  • Director of Information Security

    National Debt Relief 4.5company rating

    Remote job

    Our Director of Information Security provides strategic leadership and vision for enterprise-wide security operations. This role oversees and matures the organization's operations security program, ensuring alignment with business objectives, regulatory requirements, and industry best practices. The Director partners with senior leadership, technology leaders, and business stakeholders to embed security into products, services, and culture. This position reports to the Vice President of Information Security and leads a growing team (4-6 ICs) of security professionals across operational security, incident response, compliance, and governance. Responsibilities Strategic Leadership & Vision Help define and execute the enterprise information security strategy, ensuring alignment with corporate objectives and customer trust. Serve as an advisor to the various teams, technology leaders, and business stakeholders on emerging threats, risks, and security requirements. Lead the evolution of security as a business enabler and differentiator, ensuring resilience, trust, and compliance are built into tools and operations Team & Program Leadership Manage, mentor, and scale a high-performing security team across security operations, incident response, and data security functions. Establish clear career paths, KPIs, and success metrics to drive accountability, engagement, and professional growth. Foster a culture of continuous improvement, innovation, and proactive risk management. Operational Security & Incident Response Oversee enterprise security operations, including SIEM, log correlation, endpoint security, threat hunting, and vulnerability management. Direct incident response efforts, ensuring effective playbooks, rapid resolution, and post-incident learning. Drive automation, orchestration, and AI/ML-enabled threat detection to increase efficiency and reduce response times. Governance, Risk, & Compliance Partner with the GRC Team with security compliance frameworks (e.g., SOC 2, ISO 27001, PCI-DSS, HIPAA, FedRAMP, etc.) and ensure continuous readiness for audits. Develop and maintain enterprise security procedures, standards, and controls aligned to NIST, CIS, and OWASP frameworks. Participate in third-party risk management, vendor security assessments, and business continuity planning. Innovation & Emerging Technologies Provide guidance on secure adoption of cloud, SaaS, and SASE platforms. Champion responsible and secure use of emerging technologies (e.g., AI/ML, automation, zero trust, secure access). Anticipate future risks and proactively shape organizational security posture. Qualifications Education/Experience 10+ years of progressive information security experience, including significant leadership responsibility. 5+ years leading security teams in enterprise environments. Industry-recognized certifications strongly preferred (CISSP, CCISO, CISM, GSEC, GCIH, CEH, etc.). Required Skills/Abilities Proven success in building and maturing security programs that align with business strategy. Strong knowledge of security technologies (firewalls, DLP, IDS/IPS, MDM, SIEM, EDR, etc.) and modern architectures (SaaS, SASE, Zero Trust). Deep technical foundation across cloud/SaaS systems, network and endpoint security, cloud security, and secure configurations. Familiarity with penetration testing, forensic practices, and threat modeling. Strong executive communication skills with experience presenting to leadership, audit committees, and regulators. Demonstrated ability to lead cross-functional initiatives and drive measurable risk reduction. National Debt Relief Role Qualifications: Computer competency and ability to work with a computer. Prioritize multiple tasks and projects simultaneously. Exceptional written and verbal communication skills. Punctuality expected, ready to report to work on a consistent basis. Attain and maintain high performance expectations on a monthly basis. Work in a fast-paced, high-volume setting. Use and navigate multiple computer systems with exceptional multi-tasking skills. Remain calm and professional during difficult discussions. Take constructive feedback. Compensation Information Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for each position across the US. Within the range, individual pay is determined by work location, job-related skills, experience, and relevant education or training. This good faith pay range is provided in compliance with NYC law and the laws of other jurisdictions that may require a salary range in job postings. The salary for this position is $198,500 - $228,500. About National Debt Relief National Debt Relief was founded in 2009 with the goal of helping an expanding number of consumers deal with overwhelming debt. We are one of the most-trusted and best-rated consumer debt relief providers in the United States. As a leading debt settlement organization, we have helped over 450,000 people settle over $10 billion of debt, while empowering them to lead a healthier financial lifestyle and feel free to live their best life. At National Debt Relief, we treat our clients like real people. Our purpose is to elevate, empower, and transform their lives. Rated A+ by the Better Business Bureau, our goal is to help individuals and families get out of debt with the least possible cost through conducting financial consultations, educating the consumer and recommending the appropriate solution. We become our clients' number one advocate to help them reestablish financial stability as quickly as possible. Benefits National Debt Relief is a team-oriented environment full of rewards and growth opportunities for our employees. We are dedicated to our employee's success and growth within the company, through our employee mentorship and leadership programs. Our extensive benefits package includes: Generous Medical, Dental, and Vision Benefits 401(k) with Company Match Paid Holidays, Volunteer Time Off, Sick Days, and Vacation 12 weeks Paid Parental Leave Pre-tax Transit Benefits No-Cost Life Insurance Benefits Voluntary Benefits Options ASPCA Pet Health Insurance Discount Access to your earned wages at any time before payday National Debt Relief is a certified Great Place to Work ! National Debt Relief is an equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other status protected by law. For information about our Employee Privacy Policy, please see here For information about our Applicant Terms, please see here #LI-REMOTE
    $198.5k-228.5k yearly Auto-Apply 39d ago
  • Sr. Security Analyst

    Vectra Ai 4.5company rating

    Remote job

    Vectra is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit ************** *Location: US-Remote This position works on a 4x10, 3rd shift Position Overview Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As a Sr. Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for supervising and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met. A successful candidate will have sound technical experience and skills, blended with good interpersonal, communication, and project management skills. Responsibilities Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools. Investigate and analyze security incidents, identify root cause, and develop appropriate mitigation strategies. Complete security response actions, including full remote remediation of endpoints. Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities. Collaborate with multi-functional teams, including product, engineering, and support, to resolve customer incidents or issues. Mentor and provide guidance to junior security analysts, sharing knowledge and standard processes. Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations. Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments. Travel expected 0-5% Requirements Demonstrable experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment. Experience providing remote response and remediation activities within networks and on endpoints. Solid understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations. Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms. Solid knowledge of operating systems, networking protocols, and security technologies. Proficient in incident handling, threat hunting, and forensics. Excellent analytical and problem-solving skills, with the ability to think critically under pressure. Good communication skills to effectively collaborate with multi-functional teams and communicate complex security issues to non-technical stakeholders. Continuous learning attitude to stay updated with the evolving threat landscape and emerging security technologies. Desirable Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike Coding experience in Bash, Python, or Powershell Open-source development Our competitive total rewards package includes cash compensation within the range provided below. Actual pay for this position may vary based on the hired candidate's location, experience and relevant incumbent pay position. Vectra Total Rewards$110,000-$150,000 USD Vectra provides a comprehensive total rewards package that supports the financial, physical, mental and overall health of our employees and their families. Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options). Specific benefits offered varies by location, but commonly include health care insurance, income protection / life insurance, access to retirement savings plans, behavioral & emotional wellness services, generous time away from work, and a comprehensive employee recognition program. Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.
    $110k-150k yearly Auto-Apply 10d ago
  • Senior Security Analyst

    Blackcloak 3.5company rating

    Remote job

    BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity. Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive Security Analyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you.What You Will Do Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca. Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery. Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions. Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy Analyze phishing attempts, malware, and other cyber threats; partner with Security Engineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats. Participate in a 24/7 on-call rotation to respond to critical security incidents. Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata. Prepare and present detailed incident reports and security metrics to technical and leadership audiences. What You Need To Be Successful 4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role. Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive. Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks. Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities. Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud. Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE) Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC) Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+. Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences. $100,000 - $130,000 a year About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries. BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes: - 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic. Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: ******************************************************************************************************* #liremote
    $100k-130k yearly Auto-Apply 60d+ ago
  • Senior Security GRC Analyst

    Lambda 4.2company rating

    Remote job

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. *Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives Manage IT Risk Register including risk identification, tracking, and prioritization. Assist with and drive remediation of control deficiencies and gaps Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires Assist control owners with root cause analysis and track risk management action plan progress. Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have Experience in the machine learning or computer hardware industry Experience with Security by Design and/or Privacy by Design principles Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda Founded in 2012, with 500+ employees, and growing fast Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG Our values are publicly available: ************************* We offer generous cash & equity compensation Health, dental, and vision coverage for you and your dependents Wellness and commuter stipends for select roles 401k Plan with 2% company match (USA employees) Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
    $93k-129k yearly est. Auto-Apply 48d ago
  • Sr. Security Ops Analyst- Incident Response

    Taxact Inc.

    Remote job

    Taxwell helps everyday Americans get every tax advantage they deserve by finding credits and deductions they never even knew existed. Our tax preparation software offers easy guidance and ensures your maximum tax refund. We strive to build a team of like-minded experts in both tax and technology who align with our brand purpose, are advocates for our customers and have a fresh, non-traditional approach to the tax industry. The Sr. Security Ops Analyst/Incident Response role is a part of the Taxwell IRM team. IRM SecOps provides cyber security monitoring, reporting, and response along with detection capabilities and threat hunting. Duties include, but are not limited to: Receive incident escalations from monitoring team and assist with real-time advanced analysis, response, and reporting. Mentor and assist in training analysts to aid in their skills development and analytical capabilities. Proactively hunt for threats and enacting identification, containment, and eradication measures while supporting recovery efforts. Point person for coordination with appropriate parties during a security incident - client, management, legal, security, operations, etc. Create thorough reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis Supports detection capabilities and refines process through alert validation. Performs threat hunting and proactive incident response. Completes follow-through to ensure quality forensic materials are captured, preserved and documented along with details and timelines of events and recommendations to avoid future occurrences. Assist in the general maintenance and improvement of processes and/or playbooks. Conduct research regarding the latest methods, tools, and trends in digital forensics analysis. Conduct analysis using logs, previous alerts, etc. to identify trends to identify and prevent potential incidents. Ingest data from multiple sources and aggregate client metrics. Basic Qualifications Bachelor's degree or equivalent combination of CISSP certification and prior experience Five or more years of experience in information systems security. Good communication skills to interact with clients, team members, management, and support personnel. Good analytical and problem-solving skills. Ability to work independently and as part of a team, be highly self-motivated. Experience with cloud environments, such as Microsoft Azure and Amazon. Web Services; Container services and Kubernetes; Azure Monitor and/or Sentinel; Experience with AD and Entra ID; Mimecast and Microsoft Purview; Microsoft OpenAI Services; AWS technologies such as EC2, ECS, Lambdas, LightSail, and VMware Cloud. Ability to script in PowerShell, Python. Preferred Qualifications Previous expertise in consulting or finance, tax background desirable Preferred experience with EDR solutions such as Defender XDR and CrowdStrike Falcon. Experience in Data Visualization (example: PowerBI). Preferred experience with Splunk and osquery. GIAC GCFA and/or GCFR certification. Work Environment Requires being on-call during off hours. May require occasional weekend work. Location is Remote. #LI-DNI At Taxwell, we believe our work benefits from the diverse perspectives of our employees. As such, Taxwell welcomes and celebrates diversity and inclusion and is committed to equal opportunity employment. At Taxwell, you can expect a supportive, open, and inclusive atmosphere and a team that values your contributions. Taxwell is committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants without regard to race, color, religion, sex, national origin, age, d isability, marital status, sexual orientation, gender identity, veteran status, and any other status protected under applicable law. Taxwell considers information gathered in the hiring process, including information on this application, confidential, and only shares it on a need-to-know basis or as required by law. If you need assistance or accommodation due to a disability, you may contact us at ************** or by calling ************ extension 6049 to speak with a member of the HR Talent Acquisition team.
    $89k-119k yearly est. Auto-Apply 60d+ ago
  • Senior Security Compliance Analyst

    Onestudyteam

    Remote job

    At OneStudyTeam (a Reify Health company), we specialize in speeding up clinical trials and increasing the chance of new therapies being approved with the ultimate goal of improving patient outcomes. Our cloud-based platform, StudyTeam, brings research site workflows online and enables sites, sponsors, and other key stakeholders to work together more effectively. StudyTeam is trusted by the largest global biopharmaceutical companies, used in over 6,000 research sites, and is available in over 100 countries. Join us in our mission to advance clinical research and improve patient care. One mission. One team. That's OneStudyTeam. We are seeking a Senior Security Compliance Analyst with expertise in Governance, Risk, and Compliance (GRC) to support and enhance our security and compliance programs within the healthcare industry. This role is critical in ensuring adherence to industry regulations, responding to customer audits, and maintaining compliance with ISO 27001, HIPAA, and other security frameworks. The ideal candidate will be a detail-oriented compliance expert who can navigate complex regulatory environments, assist with internal/external audits, and drive continuous improvement in security governance. The ideal candidate must be able to operate independently while delivering on the following duties. What You'll Be Working On: Lead and support customer security audits, responding to security questionnaires and demonstrating compliance with security frameworks. Prepare, coordinate, and manage ISO 27001 audits, including evidence collection, control implementation, and auditor engagement. Ensure ongoing compliance with HIPAA, NIST CSF, and other regulatory requirements applicable to healthcare data security. Develop and maintain policies, procedures, and security documentation to meet regulatory and contractual obligations. Perform gap analyses and risk assessments to identify and remediate compliance risks. Manage and improve security governance frameworks, ensuring alignment with industry best practices and business objectives. Conduct third-party vendor risk assessments, ensuring compliance with security policies and contractual obligations. Monitor security controls, ensuring effectiveness and continuous improvement in alignment with security frameworks. Support security awareness training initiatives, ensuring employees understand compliance responsibilities. Stay current on ISO 27001, HIPAA, NIST 800-53, and other relevant standards, translating them into actionable security controls. Assist in defining security metrics and reporting on compliance status and risk posture to leadership. Work closely with legal, security, IT, and business teams to align compliance requirements with security operations. What You'll Bring to OneStudyTeam: Bachelor's degree in Information Security, Computer Science, Risk Management, or related field (or equivalent experience). 8+ years of progressive experience in GRC, compliance, or security audit roles. Experience in healthcare or regulated industries strongly preferred. Certifications strongly preferred: ISO 27001 Lead Auditor/Implementer, CISSP, CISM, CISA, HITRUST CCSFP, CRISC. Experience leading ISO 27001, SOC2, or HITRUST audits, including ISMS implementation and external audit coordination. Strong understanding of NIST CSF, SOC 2, GDPR, and other security frameworks. Hands-on experience with customer security audits, including responding to security questionnaires and managing security assessments. Ability to perform risk assessments, policy reviews, and compliance gap analyses. Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders. Detail-oriented with excellent organizational and project management skills. Ability to work independently and collaboratively in a remote environment. Familiarity with GRC tools (e.g., OneTrust, LogicGate, Archer, Vanta, Drata) is a plus. We value diversity and believe the unique contributions each of us brings drives our success. We do not discriminate on the basis of race, sex, religion, color, national origin, gender identity, age, marital status, veteran status, or disability status. Note: OneStudyTeam is unable to sponsor work visas at this time. If you are a non-U.S. resident applicant, please note that OneStudyTeam works with a Professional Employer Organization. As a condition of employment, you will abide by all organizational security and privacy policies. This organization participates in E-Verify (E-Verify's Right to Work guidance can be found here).
    $89k-119k yearly est. Auto-Apply 12d ago
  • Director, Information Security and Risk (Identity & Access Management)

    Cardinal Health 4.4company rating

    Remote job

    What Information Security and Risk contributes to Cardinal Health Information Security and Risk develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. This job family develops system back-up and disaster recovery plans. Information Technology also conducts incident response, threat management, vulnerability scanning, virus management and intrusion detection and completes risk assessments. The Director, Information Security and Risk (Identity & Access Management) is responsible for leading the organization's Identity & Access Management (IAM) strategy, governance, and operations to ensure secure, efficient, and compliant access to technology resources. This role requires a leader with proven ability to execute large-scale enterprise IAM programs that directly impact how employees, contractors, and customers interact with Cardinal Health technology. Success in this role demands a balance between delivering a frictionless, user-friendly experience and maintaining the highest standards of security. The Director must also excel at building partnerships across the organization and collaborating on program delivery, while driving operational excellence and anticipating business risks associated with IAM changes. Location - Ideally targeting individuals local to Central Ohio, but open to candidates located nationwide (fully remote). If living within commutable distance of our corporate HQ in Dublin, OH - the expectation would be to come in-office two or three days a month for team meetings. Responsibilities Act as a visionary in designing and executing multi-year IAM strategy that aligns with business goals and customer needs Develop and oversee enterprise IAM policies, standards, and procedures, ensuring consistent enforcement across the organization. Lead IAM initiatives including identity lifecycle management (provisioning, de-provisioning, role-based access, entitlement reviews). Direct privileged access management (PAM) programs to safeguard critical systems and sensitive data. Ensure compliance with internal policies and external regulatory requirements (e.g., SOX, HIPAA, GDPR, PCI-DSS) through strong access controls. Execute enterprise IAM programs with significant business impact, ensuring seamless access for employees, contractors, and customers. Balance user experience with security by designing IAM solutions that are simple, intuitive, and resilient. Drive operational excellence by establishing repeatable processes, KPIs, and service delivery models for IAM functions. Build strong partnerships across IT, Security, HR, and business units to align IAM delivery with organizational priorities. Establish metrics and reporting mechanisms to monitor IAM effectiveness, operational performance, and program maturity for executive leadership. Lead training and awareness programs related to IAM policies, secure access practices, and identity governance. Qualifications Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field preferred. Ideally targeting individuals with 12+ years of IT/security experience with at least 5 years in IAM leadership roles preferred. Proven track record of executing enterprise IAM programs with measurable business impact. Prior people leadership experience and demonstrated ability to manage operational IAM teams, highly preferred. Expertise with IAM tools and platforms (e.g., Okta, SailPoint, CyberArk, Azure AD). Strong understanding of relevant Regulatory and Compliance requirements (HIPAA, SOX, HITRUST CSF, etc.). Strong understanding of authentication protocols (SAML, OAuth, OpenID Connect, Kerberos) and cloud IAM (AWS IAM, Azure RBAC, GCP IAM). Certifications such as CISSP, CIAM, or CISM preferred. Strong analytical, relationship management, and communication skills (both written and verbal). Ability to collaborate across functions and influence stakeholders to achieve IAM program success. What is expected of you and others at this level Provides leadership to managers and experienced professional staff; may also manage front line supervisors Manages an organizational budget Develops and implements policies and procedures to achieve organizational goals Assists in the development of functional strategy Decisions have an extended impact on work processes, outcomes, and customers Interacts with internal and/or external leaders, including senior management Persuades others into agreement in sensitive situations while maintaining positive relationships #LI-LP #LI-Remote Anticipated salary range: $135,400 - $228,910 Bonus eligible: Yes Benefits: Cardinal Health offers a wide variety of benefits and programs to support health and well-being. Medical, dental and vision coverage Paid time off plan Health savings account (HSA) 401k savings plan Access to wages before pay day with my FlexPay Flexible spending accounts (FSAs) Short- and long-term disability coverage Work-Life resources Paid parental leave Healthy lifestyle programs Application window anticipated to close: 12/25/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply. Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law. To read and review this privacy notice click here
    $135.4k-228.9k yearly Auto-Apply 26d ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 25d ago

Learn more about security architect jobs

Top companies hiring security architects for remote work

Most common employers for security architect

RankCompanyAverage salaryHourly rateJob openings
1TSYS$135,453$65.122
2Grainger$133,938$64.390
3Fastly$133,501$64.184
4Valvoline$131,713$63.320
5UCLA$129,825$62.4227
6Akamai Technologies$127,688$61.3910
7Bentley Systems$114,527$55.060
8Regions Bank$113,772$54.7029
9Logistics Management Institute$112,455$54.0611
10Alcoa$112,266$53.970

Browse computer and mathematical jobs