Cyber Security Analyst
Security architect job in Detroit, MI
Security Governance, Risk & Compliance Analyst (GRC Analyst)
Direct Hire
Detroit (hybrid after 30-days) --> LOCAL candidates will only be considered
US or Green Card may only be considered
We're seeking an experienced Information Security Governance, Risk & Compliance Analyst to strengthen our IT Security program. This role is ideal for a proven GRC professional with hands-on expertise in regulatory compliance, risk assessments, and enterprise security frameworks.
Ideal Profile Highlights:
10+ years in Information Security GRC across regulated industries
Expertise in NIST, ISO 27001, SOX, GLBA, GDPR, and audit coordination
Strong operational experience with Azure, O365, CrowdStrike, Mimecast, ZenGRC, Archer, KnowBe4
Proven leader with excellent technical writing and cross-functional collaboration skills
Certifications: CIPP/US, CIPM, CDPSE, ISO 27001 Internal Auditor
Key Responsibilities:
Monitor regulatory changes and ensure compliance alignment
Conduct enterprise risk assessments and manage remediation
Support audit readiness and evidence documentation
Develop and enhance governance policies and incident response plans
Deliver GRC reporting to IT & business leadership
✅ Hybrid schedule after 30 days
Security Architect
Security architect job in Farmington Hills, MI
Job Details Farmington Hills Office - Farmington Hills, MI HybridDescription
The role of the Security Architect at MDT is to ensure that security requirements necessary to protect MDT's mission, vision and business processes are adequately addressed. The Security Architect is responsible for designing and implementing comprehensive security solutions and strategies. This role serves as a key security and technical advisor and strategist, partnering with technology, development, and business teams to ensure secure-by-design solutions across the organization's technology landscape.
DUTIES & RESPONSIBILITIES
Design and implement security controls for cloud, on-premises, and hybrid environments (e.g., AWS, Azure, GCP).
Monitor and review cloud service provider security policies to help ensure compliance with organizational requirements.
Partner with Enterprise Architects and Development teams to ensure security best practices and principles are embedded in their workflows.
Conduct security assessments and risk analysis to identify vulnerabilities and propose mitigation strategies within the Zero Trust framework.
Design and implement Zero Trust principles and frameworks to enhance the security posture of our systems and networks.
Design and maintain robust CI/CD pipelines with integrated security checks to "shift security left," ensuring vulnerabilities are identified early in the development process.
Collaborate with cross-functional teams to define access policies, user authentication mechanisms, and secure connectivity across various environments.
Design and collaborate with cross-functional teams to deploy secure SSO solutions with identity providers (IdPs), directory services, and third-party applications for seamless and centralized authentication and authorization across multiple applications and systems.
Collaborate with stakeholders to understand business requirements and translate them into effective security controls and solutions.
Make recommendations to reduce risks.
Supports administration of the enterprise security infrastructure including, but not limited to, the systems supporting: network security monitoring, two-factor authentication, web application firewalls, vulnerability management, endpoint detection and response, data loss prevention, and enterprise logging.
Supports incident response processes.
Compiles metrics for leadership.
Assists in installing, implementing, and maintaining security software.
Maintains the availability, patching, and operational functionality of assigned security systems.
Evaluates new security tools, products, and solutions for applicability to security needs.
Makes recommendations regarding purchase of security products.
Ensures MDT's reputation is maintained internally and externally.
Ensures appropriate levels of security and confidentiality are always maintained.
Acts as a representative of MDT with business and professional organizations and external IT contacts.
Keeps management informed of area activities and any significant concerns.
Attends and participates in meetings as required.
Completes accurate tickets, reports, records, and other documentation as necessary.
Stay up to date with industry trends, emerging technologies, and security best practices to proactively identify potential threats and vulnerabilities.
Responsible for working with the security team and other departments to ensure work is flowing effectively and timely throughout the organization.
Assists in setting department and company standard practices and procedures.
Responsible for working with company vendors to ensure the delivery of products or services is successful.
Acts as a subject matter expert for co-workers and fosters a culture of continuous learning and cross-training.
Assigned to the on-call rotation to support security operations.
Stays informed of trends and changes in the information security field.
Completes special projects and research studies as required.
Keeps work area clean, secure, and well maintained
EDUCATION & EXPERIENCE REQUIREMENTS
Bachelor's degree in Computer Science or a related field, or an equivalent combination of training and experience in Computer Science.
Professional certifications such as CISSP, CISM, CCSK, or CCSP are highly desirable.
Ten years of experience as a Security Architect or similar role, with a focus on cloud security and Zero Trust architecture.
REQUIRED KNOWLEDGE
Strong knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud) and associated security controls.
Experience designing and implementing Zero Trust architectures, including network segmentation, secure access controls, and strong authentication mechanisms.
Experience with designing and implementing Secure Access Service Edge (SASE) and Software-Defined Wide Area Network (SD-WAN).
Experience with the design and integration of security into the SDLC by implementing secure coding standards, automated security testing (SAST, DAST), and vulnerability scanning.
In-depth understanding of SSO protocols and standards (e.g., SAML, OAuth, OpenID Connect) and their implementation.
Technical understanding of threat actor attack techniques.
Familiarity with security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO 27001, CIS Controls).
Excellent analytical and problem-solving skills, with the ability to assess complex security requirements and recommend appropriate solutions.
Effective communication and interpersonal skills to collaborate with cross-functional teams and communicate security concepts to non-technical stakeholders.
Self-motivated and ability to meet deadlines with minimal supervision.
Well organized and attentive to detail.
Strong leadership abilities.
Project management skills.
Ability to maintain confidentiality.
WORKING CONDITIONS
Special
No hazardous or significantly unpleasant conditions (such as in a typical office).
Additional hours, including on-call with Saturday/Sunday support, as required.
Long duration of computer workstation usage.
INTENT AND FUNCTION OF S
s assist organizations in ensuring that the hiring process is fairly administered and that qualified employees are selected. They are also essential to an effective appraisal system and related promotion, transfer, layoff, and termination decisions. Well-constructed job descriptions are an integral part of any effective compensation system.
All descriptions have been reviewed to ensure that only essential functions and basic duties have been included. Peripheral tasks, only incidentally related to each position, have been excluded. Requirements, skills, and abilities included have been determined to be the minimal standards required to successfully perform the positions. In no instance, however, should the duties, responsibilities, and requirements delineated be interpreted as all inclusive. Additional functions and requirements may be assigned by supervisors as deemed appropriate.
In accordance with the Americans with Disabilities Act, it is possible that requirements may be modified to reasonably accommodate disabled individuals. However, no accommodations will be made which may pose serious health or safety risks to the employee or others or which impose undue hardships on the organization.
Information Security Manager
Security architect job in Detroit, MI
Computech Corporation provides IT and consulting services to various customers across the globe. We are a Minority Certified Company with over 15 years of industry experience. Our global delivery model and proven track record enable companies to realize improved business efficiency and increased profitability.
Job Description
As an Information Security Product Manager, you will work with highly skilled engineers, key business decision makers, and IT leadership. You will define the future direction for our technical security services and bring about the realization of that vision. You will work with vendors and the ecosystem, to help us stay abreast in new security technologies and to identify what capabilities to invest in.
Qualifications
Top 3 Skills required
• Design, architecture, and implementation of centralized security technology solutions at large enterprises - 5 years
• Operations experience in identity management, key management, or other security domains - 3 years
• Leadership role in the development or delivery of information security services - 3 years
Background Required
• In depth knowledge of key information security domains, including authentication, authorization, access control, and encryption
• Demonstrated experience in designing and implementing enterprise class security solutions
• Familiarity with agile and waterfall development methodologies
• Ability to translate the information security domain to IT and business domains, as well as communicate complex technologies in a clear and concise manner
Preferences
• Security operations experience, such as identity management or key management.
• Previous leadership experience, either through leading teams and/or initiatives
• Success in large corporate environments
Role and Responsibilities
• Internalize the team's mission and strategies, including key initiatives
• Distill the technical vision for the team, including the future state for our centralized security technologies. This will span authentication, authorization, encryption, and other related services
• Understand our customers; leverage feedback and learning to guide improvements to the information security customer experience
• Gather, understand, and prioritize the business needs for centralized, shared security technology. This will be a comprehensive and ongoing exercise.
• Build and maintain relationships with service customers and key stakeholders. This includes
o representing the team with stakeholders, communicating on behalf of stakeholders within the team, and being the team's inbound/outbound point of contact
o communicate evangelizing our mission and the value our services deliver
o gather feedback from customers and stakeholders to ensure on-going suitability of service features
o communicating regularly with senior IT leadership on key security metrics and service development successes
• Facilitate and govern the full life-cycle of technical security service components, including
o guiding the technical security control architecture
o approving service life-cycle transitions
• Prioritize and launch service development initiatives,
o interfacing with business and technical stakeholders to define scope
o establishing success criteria
o estimating work efforts
o securing funding
• Seek new business opportunities that are enabled by our services
• Identify potential areas for service improvements, including through
o new technologies and vendor relationships. This also means Influencing selection of security technologies and managing relationships with vendor partners
o partnering with information security research, service development, and security delivery teams
• Assisting in planning for skill, methodology, technology, and facility needs for future services and capabilities
Qualifications - Education and/or experience
• Bachelors degree
• Minimum 7 years of experience in information security architecture or engineering
Qualifications - Other skills and abilities [soft skills]
• Excellent verbal and written communication skills
• Ability to influence and motivate people across a wide range of functional areas
• Strong customer service skills
• Capable in managing conflict and driving win-win outcomes
• Highly organized; prepared to juggle multiple tasks while keeping focus on priorities
• Comfortable switching from big picture to detail oriented activities
• Passionate learner; able to rapidly digest, analyze, and apply new knowledge
Additional Information
All your information will be kept confidential according to EEO guidelines.
Part-Time Information Systems Security Manager (ISSM) - Ann Arbor, MI
Security architect job in Ann Arbor, MI
Resonant Sciences is recruiting for a highly motivated and well- ‐organized individual with prior experience administering US government security policies and procedures to serve as a Part-Time Information Systems Security Manager (ISSM). DUTIES AND RESPONSIBILITIES: Certification & Accreditation of computer networks using government standards, and data contamination management, to include coordinating clean- ‐up efforts and reporting requirements, as well as ensuring auditing requirements are completed. This position is responsible for media control, virus scanning, hardware and software control, and computer security briefings. Must be a strong advocate for all disciplines within the security program, while at the same time ensuring the business needs are met. Candidate will handle the acquisition, installation, operations, maintenance, and usage of a multiuser computer networks in various classified environments. Installs and maintains workstation hardware, software, and peripheral components, and must have knowledge of operating systems including Windows, Windows Server. Interprets and adherence to various federal requirements including (but not limited to): JSIG, ICD 503, ICD 705, and NISPOM. This position works closely with the Facility Security Officer and Customer Program Security Officer to ensure all systems security procedures are being followed. Requires the ability to make sound decisions, take independent action, analyze problems, and provide focused solutions with the ability to effectively communicate information to various audiences both verbally and through written communications. Will be required to interact with internal and external customers or Government security officials to perform security duties; address routine information security matters with employees regarding issues; report preparation, system security access briefings, and other duties as required. Additional Duties Include:
Prepare, update and maintain RMF documentation such as, but not limited to, Authorization to Operate (ATO) packages, System Security Plans (SSP), Risk Assessment
Reports (RAR), Security Control Traceability Matrixes (SCTM) and Plan of Actions and Milestones (POA&Ms) for all networks and systems.
Provide Configuration Management (CM) for IS security software, hardware, firmware and coordinating changes and modifications with the ISSM, SCA and Authorizing Official (AO).
Identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies
Continually evaluate the security posture of all networks and systems, including making recommendations for implementing new security controls as new threats and vulnerabilities are discovered.
Work closely with Security Control Assessors (SCA) to determine effectiveness of current security controls and a path forward to implement future security controls, where potential weaknesses might exist.
Establish, document, and monitor security programs while overseeing the implementation plans, and ensuring compliance with federal security requirements and mandates (e.g., RMF, Federal Information Processing Standards (FIPS), National Standards of Information Technology (NIST)).
Possess a working knowledge of cyber security policies and technical cyber security protection measures.
Serve as the authorizing officer for all cyber security issues.
Conduct periodic scans to verify networks and systems are appropriately baselined with tested and approved system and application patches, hotfixes and updates.
Create, log, and control all customer requests and transactions for data transfers between systems (e.g. Compact Disks (CD) and other high-capacity media, scanning documents, etc.).
Ensure the following activities are required and completed on a periodic basis (e.g. ensuring data is backed up, account management (deactivate unused accounts and validate user access rights).
Evaluate all new software and hardware products for potential security flaws and risks.
Periodically review and analyze audit logs for system deficiencies and anomalies using audit reduction tools.
Perform other duties, as assigned.
QUALIFICATIONS:
Security Plus Certification.
Five years of experience in Information Technology (IT) in a classified environment.
BA/BS degree + 2 years ISSM/ISSO experience, or 6- ‐8 years equivalent ISSM/ISSO experience is required.
Candidate must possess or have the ability to obtain DODI 8570- ‐.01 compliant certification Experience with supporting various system configurations (Stand Alone, Peer to Peer Networks, Local Area Networks, and Wide Area Networks) and security hardening, test, and maintenance of systems.
Experience with various Security Content Automation Protocol (SCAP) tools such as Assured Compliance Assessment Solution (ACAS) (Nessus) and SCAP Compliance Checker (SCC).
CITIZENSHIP/SECURITY CLEARANCE:
U.S. Citizenship required. Must have or be able to obtain and maintain a Secret security clearance. TS/SCI & SAP eligibility is required. Active TS/SCI clearance is desired.
WHAT'S IN IT FOR YOU?
Become part of a high-tech work environment that is highly impactful, exciting, and collaborative.
Flexible working environment that enables our employees to balance work and personal life.
A comprehensive benefits package that includes medical, dental, vision and prescription benefits with extremely low employee cost share for you and your eligible dependents.
A well-funded Health Spending Account with standard account fees paid by Resonant Sciences.
10 Federal Holidays (6 Standard, 4 Floating).
A flexible Paid Time Off plan for employees.
A generous retirement plan, subject to plan, IRS and ERISA rules.
WHO ARE WE? Resonant Sciences is a research and development firm with locations all over the United States, focused on developing and transitioning innovative technologies and solutions to developmental and operational platforms. Our areas of expertise include radome and antenna design and fabrication, custom electronic solutions, and RF measurements of materials, antennas, radomes, and subsystems. Our extensive capabilities include design and analysis, production, and ground and flight testing. A career at Resonant Sciences means that you will be involved in the complete development life cycle, seeing your design evolve from development prototype to incorporating mission requirements to technical specifications into a finished product for field testing. We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
Legal Counsel, Data Privacy Manager and Information Security Officer
Security architect job in Auburn Hills, MI
WHAT WE ARE LOOKING FOR The Legal Counsel, Data Privacy Manager and Information Security Officer will be an integral part of the North American Legal, Compliance and Information Security team. The Legal Counsel, Data Privacy Manager and Information Security Officer responsibility on the one hand is to preview, negotiate and draft commercial contracts. On the other hand, data privacy and information security is a relevant part of the responsibility. The Legal Counsel, Data Privacy Manager and Information Security Officer will also provide day-to-day advice and guidance to help each business unit meets its objectives by developing a deep understanding of the laws and regulations applicable to data privacy. In addition, the Legal Counsel, Data Privacy Manager and Information Security Officer, will also be responsible for implementation and support of data protection activities (Data Privacy Management System) as part of the business, as well as Information Security activities (Information Security Management System). RESPONSIBILITIES include the following. Other duties may be assigned. •Draft, review and negotiate broad range of commercial agreements with our customers and suppliers, including but not limited to, Non-Disclosure Agreements, OEM terms and conditions, Master Services Agreements, subcontractor agreements, Full and Final Releases, licensing agreements etc. •Provide support in defending the organization in lawsuits/legal claims as well as in the prosecution of lawsuits on behalf of the organization against others. •Conduct, research and provide interpretations, opinions and recommendations on business operations issues and on legislation and regulations that may affect the organization. •Enforce adherence to legal guidelines and in-house policies to maintain the company's legality and business ethics. •Support legal entities in the United States and Mexico complying with applicable laws and following Rheinmetall's international requirements related to compliance, especially anti-corruption. •Assess local data protection requirements and activities, e.g. advice all levels of management and employees on data privacy matters and evaluate and advise as to data privacy risk. Maintain and further develop the Data Privacy Management System in close alignment with the Divisional responsible and business. •Data breach management. Attends to general inquiries from supervisory data protection authorities as a first responder. •Provide data protection-related advice and support of business departments. This includes the introduction of new or change of existing processes and/or assets (especially IT solutions). •Develop and enforce the organization's information security policies, standards, and procedures. •Conduct risk assessments to identify and mitigate information security vulnerabilities. •Oversee the implementation of security technologies, including firewalls, intrusion detection systems, and encryption tools. •Lead the response to information security incidents, including investigations and post-incident reviews. •Primary contact with the corresponding legal entity for Rheinmetall's data privacy organization. Primary data protection counterpart for the management and employees within the legal entity. •Nominated as the Data Privacy Regional Manager and Information Security Officer. •Perform other duties that may be assigned.
WHAT QUALIFICATIONS YOU SHOULD HAVE
EDUCATION and/or EXPERIENCE The candidate must be a graduate of an accredited law school with three (3) to six (6) years of related experience and be admitted to the state bar. The candidate should also possess the following: •In-depth knowledge of global data protection regulations and frameworks (e.g. GDPR, CCPA). •Strong understanding of information security principles, practices, and technologies. •Excellent analytical and problem-solving skills. •Certifications such as CIPP/E, CIPM, CISSP, CISM, or equivalent are highly desirable. •Strong communication and interpersonal skills to interact with all levels of the organization. •Ability to manage multiple projects and priorities simultaneously. •High level of integrity and strong commitment to maintaining confidentiality.
Associate Security Systems Engineer - Access Control & CCTV
Security architect job in Plymouth, MI
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities.
Responsibilities
Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries.
Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors
On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements.
Qualifications
Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry.
An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted.
Experience in the design and planning of MEP systems.
Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems.
Ability to manage time and multiple tasks without supervision.
Strong organizational skills and attention to detail.
Excellent analytical and problem-solving skills.
Exceptional presentation, writing, verbal, and written customer communication skills.
Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
#JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
Auto-ApplyVehicle Cyber Security Systems Engineer
Security architect job in Dearborn, MI
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
As a key member of our Information Technology group, you'll play a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are!
The Vehicle Cyber Security Systems Engineer will serve a key role in shaping the future of product development security for vehicles (e.g. Connected Vehicle, Autonomous Vehicle, Electric Vehicle, Ford Smart Mobility, and V2X Security). The engineer will work within cross functional team to do/support the following:
At Ford Motor Company, we believe freedom of movement drives human progress. We also believe in providing you with the freedom to define and realize your dreams. With our incredible plans for the future of mobility, we have a wide variety of opportunities for you to accelerate your career potential as you help us define tomorrow's transportation.
What you'll do...
* Perform product Cyber Security assessments on projects of multiple Ford product lines
* Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols.
* Have the ability to review technical documentation to assess compliance.
* Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables
* Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception
* Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments
* Develop and utilize global supplier expertise to meet cyber security expectations
* Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency.
* Provide presentations to management (program milestones, security governance board, etc.)
What you'll do...
* Perform product Cyber Security assessments on projects of multiple Ford product lines
* Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols.
* Have the ability to review technical documentation to assess compliance.
* Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables
* Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception
* Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments
* Develop and utilize global supplier expertise to meet cyber security expectations
* Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency.
* Provide presentations to management (program milestones, security governance board, etc.)
Auto-ApplyInformation System Security Manager
Security architect job in Warren, MI
Job Details Experienced Warren - DEVCOM - GVSC - Warren, MI Full Time 4 Year DegreeDescription
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.
Overview of position:
We are looking for an Information System Security Manager to work in Warren MI Area. The contractor shall serve as an Information System Security Manager (ISSM) to designated programs, serving as technical advisor to Program Manager/System Manager. The contractor shall be the lead for maintaining the overall cybersecurity program of the systems and platforms for which they are assigned, and accountable for the implementation of applicable Federal, DoD and Component regulations including DoD Instruction 8510.01 and DoDI 5000.02. The contractor shall be responsible for achieving system and platform authorizations to operate (ATO), authority to connect (ATC) and other approval required for operational use of platforms and Information Systems. In addition, the contractor shall perform required continuous monitoring of systems and platforms within their purview to ensure compliance with Cybersecurity policies. Maintain and report Information System (IS) and Platform Information Technology (PIT) systems assessment and authorization status and issues in accordance with DoD component guidance. Provide guidance to the Information System Security Officer (ISSO) in accordance with DoDI 8500.01 Coordinate with the organization's security manager and other stakeholders to ensure issues affecting the system's overall security are addressed appropriately.
An active Secret and a United States Citizenship is required to be considered for this position.
Responsibilities
Maintain a repository for all organizational or system-level Cybersecurity related documentation.
Monitor compliance with cybersecurity policy, as appropriate, and review the results of such monitoring.
Ensure that Cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations, to include follow-up remediation and mitigation actions.
Ensure implementation of IS security measures and procedures including reporting incidents to the Authorizing Official (AO) and appropriate reporting chains and coordinating system-level responses to unauthorized disclosures in accordance with DoD Manual 5200.01, Volume 3 for classified information or DoD Manual 5200.01, Volume 4 for Controlled Unclassified Information (CUI), respectively.
Act as the primary cybersecurity technical advisor to the acquisition program for DoD IS and PIT systems under their purview.
Ensure that Cybersecurity-related events or configuration changes that may impact DoD IS and PIT systems authorization or security posture are formally reported to the AO and other affected parties, such as IOs and stewards and AOs of interconnected DoD ISs.
Ensure the secure configuration and approval of IT below the system level (i.e., products and IT services) in accordance with applicable guidance prior to acceptance into or connection to a DoD IS or PIT system.
Qualifications
Experience/Skills:
3+ years of proven Governance, Risk and Compliance (GRC) experience or related role.
Strong knowledge of security principles, practices, and technologies.
Experience with security assessment tools and techniques.
Excellent problem-solving and analytical skills.
DoD/Military Training 531-25B30-C45, J-3B-0440, DAU ISSM Basic Playlist, RMF Implementers Course or 531-25B40-C46, DAU ISSM Intermediate Playlist, E3AZR1D751 01EE or 4C-FA26A, M09CHN1, A-531-0009, DAU ISSM Advanced Playlist
Education:
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Data Science or Software Engineering, Information Technology (Identified BS degrees must be from an ABET accredited or NCAE-C-designated institution to fulfill the educational requirement for this WRC)
Certifications:
Any of the following certifications are acceptable.
Security+, CASP+, CISSP, CCSP, CISM, CCISO, CGRC/CAP, CISSP-ISSMP, SSCP, GSEC, GCIA, GCIH, GSLC, GICSP, FITSP-M, Cloud+, GCSA.
Clearance:
Active Secret Clearance is required.
Must be a United States Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC'S Client(s)/Customer(s)/Prime contractor(s).
FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran, FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates.
Senior Vehicle Security Validation Engineer
Security architect job in Farmington, MI
Who we are:
The EDAG Group is a globally leading, independent engineering services provider that combines excellent engineering with the latest technology trends.
With a global network of some 60 branches, the EDAG Group realizes projects in the Vehicle Engineering, Electrics/Electronics and Production Solutions segments. Drawing on more than 50 years of engineering experience, EDAG's proprietary 360-degree development approach has become a hallmark of quality in the holistic development of vehicles and smart factories. The company's interdisciplinary expertise in the areas of software and digitization provides it with crucial skills to actively shape dynamic transformation processes as an innovative partner.
With an interdisciplinary team of around 8,600 experts, the EDAG Group develops unique mobility and industrial solutions for customers that include the world's leading automotive and non-automotive companies. The company is listed on the stock exchange since 2015 and generated revenues of € 796 million in 2022.
This is how you will grow:
Own the Security validation of vehicle ECUs
Ensure software requirements are clear, complete, and testable.
Create a comprehensive test plan that outlines the testing approach, objective, scope, resources, and schedule.
Identify opportunities to improve the validation processes, testing methodologies and overall product quality.
Build the test infrastructure and automated testing framework
Document any issues in detail and collaborate with Developers in resolving those issues.
Requirements
This is how you will take us forward:
BS or MS in Computer Science or equivalent.
Must have 5+ years of experience in testing networking and/or automotive products.
Must have 5+ years of experience in automation scripting language such as Python, Shell, or any other scripting languages.
5+ years of developing the system level test cases.
Experience with automotive protocols (DoIP, UDS, LIN and CAN)
Good programming/scripting knowledge for developing automation scripts.
Experience in verification of Security features like Secure Boot, OTP fuzes, Secure Update, JTAG etc.
Passion towards Embedded Systems testing.
Must be fully confident of writing/maintaining test cases and acceptance test plans.
At least 4 years of experience in developing test cases in embedded Linux platforms.
Experience in using Automation test tools and Stress test tools.
Strong debugging and analytical skills.
Senior Vehicle Security Validation Engineer
Security architect job in Farmington, MI
Job DescriptionDescription:
Who we are:
The EDAG Group is a globally leading, independent engineering services provider that combines excellent engineering with the latest technology trends.
With a global network of some 60 branches, the EDAG Group realizes projects in the Vehicle Engineering, Electrics/Electronics and Production Solutions segments. Drawing on more than 50 years of engineering experience, EDAG's proprietary 360-degree development approach has become a hallmark of quality in the holistic development of vehicles and smart factories. The company's interdisciplinary expertise in the areas of software and digitization provides it with crucial skills to actively shape dynamic transformation processes as an innovative partner.
With an interdisciplinary team of around 8,600 experts, the EDAG Group develops unique mobility and industrial solutions for customers that include the world's leading automotive and non-automotive companies. The company is listed on the stock exchange since 2015 and generated revenues of € 796 million in 2022.
This is how you will grow:
Own the Security validation of vehicle ECUs
Ensure software requirements are clear, complete, and testable.
Create a comprehensive test plan that outlines the testing approach, objective, scope, resources, and schedule.
Identify opportunities to improve the validation processes, testing methodologies and overall product quality.
Build the test infrastructure and automated testing framework
Document any issues in detail and collaborate with Developers in resolving those issues.
Requirements:
This is how you will take us forward:
BS or MS in Computer Science or equivalent.
Must have 5+ years of experience in testing networking and/or automotive products.
Must have 5+ years of experience in automation scripting language such as Python, Shell, or any other scripting languages.
5+ years of developing the system level test cases.
Experience with automotive protocols (DoIP, UDS, LIN and CAN)
Good programming/scripting knowledge for developing automation scripts.
Experience in verification of Security features like Secure Boot, OTP fuzes, Secure Update, JTAG etc.
Passion towards Embedded Systems testing.
Must be fully confident of writing/maintaining test cases and acceptance test plans.
At least 4 years of experience in developing test cases in embedded Linux platforms.
Experience in using Automation test tools and Stress test tools.
Strong debugging and analytical skills.
IT SAP Security Engineer
Security architect job in Farmington Hills, MI
The SAP Security Analyst - Role Design & SailPoint will be responsible for the day-to-day management of SAP user access, security role design, and governance processes across the AM region. This includes provisioning SAP accounts, collaborating with functional teams on secure access design, and supporting identity lifecycle management using SailPoint. The analyst will ensure the integrity and compliance of SAP S/4HANA access while providing support for audits, access reviews, and segregation of duties (SoD) monitoring.
Job Summary:
This position plays a vital role in maintaining secure and compliant SAP environments by designing, administering, and reviewing access controls. The ideal candidate will have a deep understanding of SAP security concepts (roles, authorizations, profiles) and hands-on experience with role provisioning, GRC tools, and identity governance platforms such as SailPoint. The analyst will also support global and regional initiatives, participate in SAP rollout projects, and contribute to continuous improvement in SAP security processes.
Job Responsibilities:
Design and maintain SAP security roles (single, composite, derived) for SAP S/4HANA and related systems.
Support new project rollouts, security role mapping, and SoD (Segregation of Duties) compliance.
Collaborate with functional leads to define access requirements and translate them into secure role concepts.
Partner with the Identity & Access Management (IAM) team to support SailPoint provisioning workflows.
Manage day-to-day user provisioning and de-provisioning for all AM Region SAP accounts, ensuring timely and accurate access.
Conduct periodic access reviews, audit support, and remediation of identified risks.
Provide technical guidance for GRC ruleset maintenance and SoD analysis.
Develop documentation for security design, user provisioning processes, and governance procedures.
Perform user and role analysis to identify redundant, obsolete, or excessive access.
Investigate and resolve access issues, violations, or user provisioning errors.
Stay updated on SAP security trends, tools, and regulatory changes impacting access control.
Provide support during go-live cutovers and critical production support windows.
Qualifications:
Knowledge, Skills, and Abilities:
Strong understanding of SAP authorization concepts and role-based access control.
Ability to manage high-volume provisioning and support multiple SAP environments.
Experience supporting manufacturing or regulated industries preferred.
Strong communication skills for collaboration with business users and audit teams.
Familiarity with IT general controls, SOX compliance, and access certification processes.
Ability to prioritize and manage multiple tasks in a fast-paced environment.
Experience working in international or global teams is a plus.
Technical Skills:
Hands-on experience in SAP Security for S/4HANA, Fiori, and ECC systems.
Proficiency in SAP authorization objects, PFCG role maintenance, SUIM, ST01, SU53, and SU24.
Experience with SAP GRC Access Control (ARA, BRM, ARM).
Experience with SailPoint IdentityNow or other Identity Governance tools.
Familiarity with ticketing systems like ServiceNow or SAP Solution Manager.
Understanding of SAP modules such as MM, SD, PP, and FICO from a security perspective.
Education: Bachelor's degree in business, Engineering, Computer Science, Information Systems, or related field.
Experience:
Minimum 5 years of experience in SAP Security administration.
At least 2 years of experience with S/4HANA security and/or Fiori applications.
Experience with SailPoint Identity Governance tools highly preferred.
Experience supporting SAP implementations and working on project teams.
Audit and compliance support experience is a plus.
Working Conditions
Open to travel up to 30%, including extended stays for project implementation.
Ability to work in a professional setting, adhering to company and regulatory safety requirements.
Work in a safe and professional manner while adhering to all regulatory requirements (OSHA, EPA, State, and Federal regulations, etc.).
Comprehend and adhere to management directions and/or safety instructions with no restrictions.
Effectively communicate in Business English language.
Location: Close to at least one of the US plants is highly desirable
Equal Opportunity Employer (EOE) - Qualified applicants will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender, identity, disability, protected veteran status and national origin.
At Astemo, we're challenging the status quo with the power of diversity, inclusion, and collaboration. Our goal is to build an inclusive work environment that celebrates the differences of our employees. We want to ensure that every employee feels valued, respected and empowered. We don't just accept difference-we celebrate it, we support it, and we thrive on it for the benefit of our employees, our products, and our community. Astemo is proud to be an equal opportunity employer.
If you need a reasonable accommodation to apply for a job at Astemo, please send the nature of the request and contact information to ************************* when applying for the position.
Auto-ApplyInformation System Security Officer (Information Assurance)
Security architect job in Sterling Heights, MI
Company Information: General Dynamics is a successful Fortune 100, global aerospace and defense company, with over 90,000 employees world-wide. General Dynamics Land Systems, a business unit of General Dynamics, has a strong foundation of delivering core engineering and manufacturing capabilities to our clients for military vehicles. Our team is focused on continuous process and productivity improvements that reduce product costs, while increasing troop safety and effectiveness. Land Systems continues to work with the US Armed Forces and its Allies to ensure these vehicles remain survivable, relevant, flexible, affordable and capable of addressing a dynamic threat environment.
About the Role:
As a member of the IT Security Team, you will be joining a dynamic group of Information Technology and Information Assurance professionals responsible for the operation, maintenance, and compliance of classified information systems, and its userbase, in support of a Next Generation Vehicle Program. The ISSO will participate in activities covering information assurance lifecycles and user account support.
Due to the nature of the work, this role requires on-site presence up to 100%.
What We Offer:
Whether starting your career or are already an experience professional, we offer a Total Rewards package that is Impactful and built for you.
* Healthcare including medical, dental, vision, HSA and Flex Spending
* Competitive base pay and incentive pay that rewards individual and team performance, and comprehensive benefits.
* 401k Match (6%)
* Educational assistance
* 9-80 Work Schedule (This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off)
* Ongoing learning opportunities within a diverse, inclusive and rewarding work environment
* Onsite cafeteria, fitness center, and outdoor fitness track
Responsibilities to Anticipate/Expect:
* Leads as IT Liaison between GDLS Users and United States Government personnel for Government Cloud Accounts
* Generates, tracks and escalates IT Trouble Tickets to U.S. Government personnel for GDLS-cloud account / application issues
* Issues, tracks, and enforces account training and compliance requirements to GDLS users of unclassified and classified systems
* Designs account workflow and process streamlining with the Information System Security Manager (ISSM)
* Coordinates with System Administrators to create, enable, or disable classified system accounts
* Assists in the creation, implementation, and presentation of Cyber Awareness Campaigns
* Participates in system accreditation documentation reviews in accordance with existing processes and procedures
* Assists the ISSM and Program Protection Officer with need-to-know and verification processes
* Participates in assessments, inspections, and continuous monitoring of classified systems and user compliance
* Perform other duties as assigned
Minimum Qualifications:
* Must possess or be able to obtain and maintain a U.S. Government SECRET or higher clearance.
* MUST be a United States citizen
* 1-3 year minimum of experience in a government/industrial security career field.
* 3-5 year minimum of experience in a compliance and/or account administration role.
* Bachelor of Science degree majoring in Computer Science, Information Science and Technology, Information Assurance, Risk Management, or Cybersecurity required. Equivalent alternates considered.
* Must have one of the following certifications (more advanced certificates considered):
o Security+ CE
o GIAC
o CISA
o CRISC
Additional Information:
* Must have very good written and verbal communication skills.
* Must be detail-oriented, independent and organized.
* Must have experience with Microsoft Office products: Word, Excel, and PowerPoint.
* Must have experience with SCAP Compliance Checker, STIG Viewer, and IAVMs.
* Preferred experience with certification/authorization/compliance requirements as outlined in the NISPOM and DAAPM/DAAG.
* Limited travel may be required.
GDLS considers factors such as, scope/responsibilities of the position, candidate experience and education/training background, in addition to local market comparable and business considerations when extending an offer.
Headquartered in Reston, Virginia, General Dynamics is a global aerospace and defense company offering a broad portfolio of products and services in business aviation; ship construction and repair; land combat vehicles, weapons systems and munitions; and technology products and services. General Dynamics employs more than 100,000 people across 65 countries worldwide and in all 50 U.S. states, more information is available at *********** General Dynamics Land Systems, is a business unit of General Dynamics, and is an innovative leader of ground combat systems' equipment and software for our clients. Our performance-driven team partners with the U.S. Army, U.S. Marine Corp and other militaries across the Globe to ensure that next generation ground combat vehicles are ready to protect our fighting men and women in uniform. General Dynamics Lands Systems provides a competitive compensation package, site specific flexible work schedules, 401(k) with Company Match; Bonus Eligibility, Employee Development Opportunities, Tuition Reimbursement, On-site Amenities, and comprehensive Medical/Dental/Vision Insurance.
As an Equal Opportunity Employer, General Dynamics Land Systems ("GDLS") provides all persons with equal opportunity and access to all aspects of employment process, without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, marital status, age, disability, status as a protected veteran, or membership in any group protected by federal, state, or local anti-discrimination laws. GDLS also is committed to providing reasonable accommodations to individuals with disabilities and disabled veterans.. If, due to a disability, you need an accommodation to search or apply for an opportunity with GDLS, please call ************ or send an e-mail to ***************** for assistance and let us know the nature of your request and your contact information.
Share: mail Tweetshare to twitter Share on Facebookshare to facebook Share on LinkedInshare to linkedin
Apply Now
Similar Jobs
Interested in working for Land Systems? Join our Talent Network Today!
Join our Talent Network
* Search Jobs
* Saved Jobs
* Careers Home
facebook twitter linkedin youtube instagram
2025 General Dynamics US. All rights reserved.
Information Systems Security Officer (ISSO)
Security architect job in Detroit, MI
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyVehicle Cyber Security Systems Engineer
Security architect job in Dearborn, MI
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
As a key member of our Information Technology group, you'll play a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are!
The Vehicle Cyber Security Systems Engineer will serve a key role in shaping the future of product development security for vehicles (e.g. Connected Vehicle, Autonomous Vehicle, Electric Vehicle, Ford Smart Mobility, and V2X Security). The engineer will work within cross functional team to do/support the following:
You'll have...
Bachelor's degree in Electrical Engineering, Computer Engineering, Software Engineering, Computer Science, or Cybersecurity OR a combination of education and experience
5+ years of experience with embedded and/or automotive systems
3+ years of experience with in-vehicle network architecture, modules, and protocols (CAN, etc.)
Ability to develop and maintain engineering documentation including requirements, specifications, test plans, etc.
Ability to work independently and collaboratively
Strong communication and analytical skills
Even better, you may have...
Experience with Hardware Security Module (HSM) and Secure Hardware Extension (SHE)
Experience with coding (i.e., C, C++, C# Python, Java, CAPL, JQL) Experience with JIRA and Kanban boards for project management
Familiar with vehicle system (i.e., capabilities of ECUs on a vehicle)
Familiar with automotive standards (i.e., ISO 14229-1, ISO 21434)
Familiar with quality tools and methodologies (i.e., FMEA, DVP)
Able to work following an agile methodology
Knowledge of Ford's internal engineering systems and requirements
Comfortable working in a fast-paced and innovative environment where problems are not always well-defined.
Experience advocating and driving adoption of industry standard methodologies.
Project management skills, including identifying and scheduling process steps, determining resources and staff required to successfully complete research projects.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:
• Immediate medical, dental, vision and prescription drug coverage
• Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
• Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
• Vehicle discount program for employees and family members and management leases
• Tuition assistance
• Established and active employee resource groups
• Paid time off for individual and team community service
• A generous schedule of paid holidays, including the week between Christmas and New Year's Day
• Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
#LI-Hybrid
What you'll do...
Perform product Cyber Security assessments on projects of multiple Ford product lines
Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols.
Have the ability to review technical documentation to assess compliance.
Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables
Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception
Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments
Develop and utilize global supplier expertise to meet cyber security expectations
Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency.
Provide presentations to management (program milestones, security governance board, etc.)
Auto-ApplyInformation Systems Security Officer (ISSO)
Security architect job in Sterling Heights, MI
Insight Global is seeking a highly skilled Information Systems Security Officer (ISSO) to support a Department of Defense (DoD) customer in Warren, MI. This role is ideal for a cybersecurity professional with a strong background in risk management and system security who thrives in a collaborative, mission-driven environment.
As an ISSO, you will report directly to the Information Systems Security Manager (ISSM) and the Information System Owner (ISO), operating with minimal supervision. You'll play a critical role in maintaining and enhancing the security posture of DoD information systems, ensuring compliance with federal standards and frameworks.
$30/hr to $60/hr : Exact compensation may vary based on several factors, including skills, experience, and education.
Benefit packages while on contract for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 3+ years of experience as a ISSO
- Strong understanding of RMF, NIST standards, and DoD security protocols
- Bachelors Degree in Cybersecurity, Engineering, or related field
- Ability to obtain a DoD Secret Clearance - Active interim or secret clearance
Principal Security Engineer - IAM
Security architect job in Waterford, MI
We are Lennar
Lennar is one of the nation's leading homebuilders, dedicated to making an impact and creating an extraordinary experience for their Homeowners, Communities, and Associates by building quality homes and providing exceptional customer service, giving back to the communities in which we work and live in, and fostering a culture of opportunity and growth for our Associates throughout their career. Lennar has been recognized as a Fortune 500 company and consistently ranked among the top homebuilders in the United States.
Join a Company that Empowers you to Build your Future
The Principal Security Engineer is the highest technical position within the security engineering team, responsible for driving the overall security strategy of the organization. This role is focused on designing cutting-edge security solutions, with a strong emphasis on cloud security, and leading the organization's response to the most complex security challenges.
A career with purpose.
A career built on making dreams come true.
A career built on building zero defect homes, cost management, and adherence to schedules.
Your Responsibilities on the Team
Define and lead the implementation of the organization's security strategy, with a focus on Cloud Security, Identity Access Management, and all other aspects of Cybersecurity
Architect and oversee the deployment of IAM solutions across both on-premise and cloud environments, ensuring they meet the highest standards of security.
Lead the most complex security assessments, including threat modeling, red teaming, and cloud security reviews.
Collaborate with executive leadership to ensure that security initiatives align with the organization's strategic goals and risk appetite.
Act as the technical lead for large-scale security projects, coordinating cross-functional teams to ensure successful delivery.
Architect and implement solutions across workforce IAM, PAM, and customer IAM ecosystems.
Provide thought leadership in adopting passwordless authentication, passkeys, adaptive MFA, and AI-driven access orchestration strategies
Engineer integrations with Agentic AI tools for intelligent decisioning, policy enforcement, and autonomous identity lifecycle operations.
Develop and implement automated provisioning/deprovisioning workflows
Ensure integration of IAM with cloud platforms (Azure, AWS, GCP) and SaaS applications.
Mentor and develop the skills of senior security engineers, fostering a culture of continuous improvement and innovation.
Requirements
Education: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline; Master's degree is highly preferred.
Professional Experience: Minimum of 10 years in security engineering, with significant expertise in Identity and Access Management (IAM).
Project Leadership: Demonstrated success in leading large-scale IAM initiatives and formulating security strategies for complex organizations.
IAM Solutions: Design and hands-on engineering across IAM:
Identity Providers (such as Microsoft Entra ID, Okta, Ping, ForgeRock),
Identity Governance & Administration (SailPoint, Saviynt),
Privileged Access Management (CyberArk, Delinea, HashiCorp Vault), and
Customer IAM (Auth0, PingOne-preferred).
Protocols & APIs: Deep understanding of federation protocols (SAML, OAuth2.0, OIDC), SCIM, and RESTful APIs.
Directory Services & Cloud IAM: Hands-on experience with Active Directory, LDAP, and cloud IAM solutions (Azure, AWS, GCP).
Security Frameworks: Solid foundation in Zero Trust architecture and contemporary security standards.
Automation: Proficient in scripting and automation using PowerShell, Python, Java, or RESTful APIs.
Recognized industry certifications such as CISSP, CCSP, AWS Certified Security - Specialty, or equivalent credentials.
Exceptional leadership and communication abilities, capable of influencing executive decision-makers and directing cross-functional teams.
Physical & Office/Site Presence Requirements
This is primarily a sedentary office position which requires the incumbent to have the ability to operate computer equipment, speak, hear, bend, stoop, reach, lift, and move and carry up to 25 lbs. Finger dexterity is necessary.
This description outlines the basic responsibilities and requirements for the position noted. This is not a comprehensive listing of all job duties of the Associates. Duties, responsibilities and activities may change at any time with or without notice.
Life at Lennar
At Lennar, we are committed to fostering a supportive and enriching environment for our Associates, offering a comprehensive array of benefits designed to enhance their well-being and professional growth. Our Associates have access to robust health insurance plans, including Medical, Dental, and Vision coverage, ensuring their health needs are well taken care of. Our 401(k) Retirement Plan, complete with a $1 for $1 Company Match up to 5%, helps secure their financial future, while Paid Parental Leave and an Associate Assistance Plan provide essential support during life's critical moments. To further support our Associates, we provide an Education Assistance Program and up to $30,000 in Adoption Assistance, underscoring our commitment to their diverse needs and aspirations. From the moment of hire, they can enjoy up to three weeks of vacation annually, alongside generous Holiday, Sick Leave, and Personal Day policies. Additionally, we offer a New Hire Referral Bonus Program, significant Home Purchase Discounts, and unique opportunities such as the Everyone's Included Day. At Lennar, we believe in investing in our Associates, empowering them to thrive both personally and professionally. Lennar Associates will have access to these benefits as outlined by Lennar's policies and applicable plan terms. Visit Lennartotalrewards.com to view our suite of benefits.
Join the fun and follow us on social media to see what's happening at our company, and don't forget to connect with us on Lennar: Overview | LinkedIn for the latest job opportunities.
Lennar is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws.
Auto-ApplyData Privacy Manager & Information Security Officer
Security architect job in Auburn Hills, MI
WHAT WE ARE LOOKING FOR We are seeking an experienced and dedicated Data Privacy Manager and Information Security Officer to join our organization. This dual-role position ensures the confidentiality, integrity, and availability of data, while ensuring compliance with relevant privacy laws, regulations, and best practices.
The ideal candidate will lead efforts to safeguard sensitive data and implement robust information security measures.
Including, but not limited to:
* Assessing local data protection requirements and activities.
Implementing and maintaining the Group-wide data protection management system in his area of responsibility (if applicable, by means of local implementation guidelines).
* Taking on country-wide data protection issues/tasks, supported by the responsible Data Privacy Officer.
* Coordination of data privacy projects.
* Interface to the responsible Data Privacy Officer.
* Data breach management.
* Processing of and/or support with data protection related inquiries.
* If necessary, support during inspections by the relevant authorities.
* Coordination of the Data Privacy Manager in his region
* Identifies the need of further contact partners as potential Data Privacy Manager in the region.
* Attends to general inquiries from supervisory data protection authorities as first responder. At a minimum, the Regional Data Privacy Manager shall act as second responder when, for example, inquiries come directly to management.
* Primary Contact within the legal entity for Rheinmetall's data privacy organization.
* Primary data protection counterpart for the management and employees within the legal entity.
* Regular exchange with the relevant Data Privacy Officer.
* Responsible for data protection related advice and support of business departments.
* Data protection related support of business departments with the introduction of new or change of existing processes and/or assets (especially IT-solutions).
* Develop and enforce the organization's information security policies, standards, and procedures.
* Conduct risk assessments to identify and mitigate information security vulnerabilities.
* Oversee the implementation of security technologies, including firewalls, intrusion detection systems, and encryption tools.
* Lead the response to information security incidents, including investigations and post-incident reviews.
WHAT QUALIFICATIONS YOU SHOULD HAVE
* Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Law, or a related field.
* At least 5 years of experience in data privacy, information security, or a related field.
* In-depth knowledge of global data protection regulations and frameworks (e.g., GDPR, CCPA).
* Strong understanding of information security principles, practices, and technologies.
* Certifications such as CIPP/E, CIPM, CISSP, CISM, or equivalent are highly desirable.
* Excellent analytical and problem-solving skills.
* Strong communication and interpersonal skills to interact with all levels of the organization.
* Ability to manage multiple projects and priorities simultaneously.
* High level of integrity and a strong commitment to maintaining confidentiality.
Information System Security Officer (ISSO)
Security architect job in Warren, MI
Job Details Experienced Warren - DEVCOM - GVSC - Warren, MI Full Time 4 Year DegreeDescription
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.
Overview of position:
FEDITC is seeking an Information System Security Officer (ISSO) to work in Warren, MI. A United States Citizenship and an active Secret DoD Security Clearance is required to be considered for this position.
The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO) / Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense (DoD) policies. In almost all cases, ISSOs will be called on to provide guidance, oversight, and expertise, but they may or may not develop security documents or actually implement any security controls. While ISSOs will not actually perform all functions, they will have to coordinate, facilitate, or otherwise ensure certain activities are being performed. As a result, it is important for ISSOs to build relationships with the SO, technical staff, and other stakeholders.
Responsibilities:
The goal of information security is to help the business process owner accomplish the mission in a secure manner. To be successful, ISSOs need to know and understand the following:
Coordinates with the ISO to ensure the appropriate operations security posture is maintained for the Information system
Servers as principal advisor on all matters involving the security of an Information System
Manage day-to-day security operations of the system
Monitors information system and environment
Manages and controls changes to the system
Handles incidents
Assists in the development of the: Security policies and procedures, Development and ongoing maintenance of the System Security Plan, Security Impact Analysis, Mission and business functions of the Information System
How the system supports the organization's mission - System details, including:
Architecture
System components (hardware, software, peripherals, etc.)
Location of each system component
Data flow
Interconnections (internal and external)
Security categorization, Security requirements, Configuration management processes and procedures
Qualifications
Certifications Required:
CompTIA Security +, ISC2 Certified Accreditation Professional (CAP)
Clearance:
Active Secret clearance is required.
Must be a US Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC'S Client(s)/Customer(s)/Prime contractor(s).
FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran. FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates.
Information Systems Security Officer (ISSO)
Security architect job in Detroit, MI
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyApplication Security Cloud Engineer
Security architect job in Dearborn, MI
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
The Ford Motor Credit Company team helps put people behind the wheels of great Ford and Lincoln vehicles. By partnering with dealerships, we provide financing, personalized service and professional expertise to thousands of dealers and millions of customers in over one hundred countries around the world.
In this position...
Ford Credit is undertaking a massive technology modernization, and at the heart of this transformation is a commitment to building a world-class, secure cloud environment. We are seeking a senior engineer to be a cornerstone of this initiative. This role will have the opportunity to help design, build, and secure our new Zero Trust environment in Google Cloud Platform (GCP).
As a key member of our second line-of-defense security team, you will act as a trusted advisor and technical expert, partnering with development, operations, and architecture teams.
You will have the autonomy and influence to embed security into the fabric of our applications and infrastructure, ensuring we are secure by design. If you are a hands-on builder who is passionate about proactive security and wants to make a tangible impact on a strategic, multi-year program, this is the role for you.
You'll have...
Bachelor's degree in computer science, information security, or a related technical field, or equivalent practical experience.
5+ years of progressive experience in application security, cloud security, or a similar security engineering role.
Demonstrable expertise in securing applications and infrastructure within Google Cloud Platform (GCP).
In-depth understanding of software development lifecycle (SDLC) principles and practices.
Proven experience with vulnerability management, including scanning, analysis, prioritization, and remediation tracking.
Strong knowledge of various security testing methodologies and tools
Proficiency in at least one scripting language (e.g., Python, Go, Bash) for automation and tool development.
Experience with containerization (Docker, Kubernetes) and serverless technologies.
Excellent communication, collaboration, and problem-solving skills.
Even better, you may have...
Master's degree in a relevant technical field.
Relevant industry certifications such as GCP Professional Cloud Security Engineer, CISSP, CCSP, CSSLP.
Experience with Infrastructure as Code (IaC) security practices and tools (e.g., Terraform, Mondoo, Open Policy Agent).
Knowledge of common security frameworks and compliance standards (e.g., NIST, ISO 27001, SOC 2, GDPR).
Experience with security monitoring, logging, and alerting solutions in a cloud environment (e.g., GCP Security Command Center, Cloud Logging, Cloud Monitoring).
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:
Immediate medical, dental, vision and prescription drug coverage
Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
Vehicle discount program for employees and family members and management leases
Tuition assistance
Established and active employee resource groups
Paid time off for individual and team community service
A generous schedule of paid holidays, including the week between Christmas and New Year's Day
Paid time off and the option to purchase additional vacation time.
For more information on salary and benefits, click here: *****************************
This position is a range of salary grades 6-8 .
Visa sponsorship is not available for this position.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
This position is hybrid. Candidates who are in commuting distance to a Ford hub location may be required to be onsite four or more days per week. #LI-Hybrid
#LI-FordCredit #LI-MK2
What you'll do...
Cloud Security Strategy & Oversight:
Partner with Architecture, Developer Experience (DevX), and Site Reliability Engineering (SRE) teams to shape and implement our GCP Zero-Trust security architecture.
Provide expert oversight and validation of security controls, acting as a critical second-line partner to ensure our cloud environment is fundamentally secure.
Drive the operationalization of Google's Security Command Center Enterprise (SCCE), turning its powerful features into a proactive threat detection and compliance engine.
Technical Application & Cloud Security:
Serve as the subject matter expert for securing containerized (Docker, Kubernetes) and serverless applications within GCP.
Collaborate on best practices for the enforcement of security quality gates for Infrastructure as Code (IaC) and Policy as Code (PaC) implementations.
Govern security controls within our CI/CD pipelines, overseeing and adjusting security gates to prevent vulnerabilities from reaching production.
Mature and scale our application security tooling processes (Static and Dynamic Testing, Open-Source Software Scanning, secrets detection), translating raw findings into actionable risk intelligence for development teams.
Develop and automate vulnerability management processes, using a risk-based approach to prioritize and drive remediation.
Collaboration & Security Culture:
Lead by influence, providing expert guidance on secure coding practices and modern security patterns to our engineering teams.
Act as a key liaison for our bug bounty program, coordinating between vendors and internal teams to ensure swift resolution.
Mentor and support our Security Advocate program, empowering them to elevate the security posture across the organization through awareness and training exercises.
Collaborate effectively with cross-functional teams, including development, operations, compliance, and incident response.
Auto-Apply