Security Architect - TikTok Account
Security architect job in San Jose, CA
We are the TikTok Account Team, responsible for the account system of all TikTok brand products. We are currently seeking an Account Security Technical Architect to join our team. Here, there are global business scenarios, challenges posed by hundreds of millions of users, and cutting-edge identity authentication technologies.
* Design account security architecture, plan the core system design for identity authentication, session management, and account protection;
* Counter complex security threats, identify and defend against risks such as credential stuffing, phishing, simulated login, brute force cracking, etc., and build a multi-layered protection system including multi-factor authentication, device fingerprinting, risk control engine, etc.;
* Promote cross-team implementation, closely collaborate with product, R&D, data, and risk control teams, and integrate security design into business scenarios;
* Embrace the industry's cutting-edge trends, explore and implement technical standards such as FIDO2, Passkey, OAuth2.1, OpenID Connect, and Zero Trust Architecture, and promote internationalization and security compliance.Minimum Qualifications
* Bachelor's degree or above, with experience in account security, identity authentication, or large-scale system architecture
* Familiarize with the challenges faced by account security and the corresponding technical countermeasures
* Familiar with protocols such as OAuth2, OIDC, SAML, FIDO2, etc., and have practical experience in architecture or implementation
* Familiar with distributed system architecture, with the ability to design high-concurrency and high-availability systems
Preferred Qualifications:
* Possess excellent cross-team communication and facilitation skills
Network and Security Architect
Security architect job in Fremont, CA
The requirements listed below are representative of the knowledge, skill, and/or ability required: Build the networks by taking into consideration various factors like, bandwidth requirements, infrastructure requirements and security. Responsible for estimating growth and plan for the network upgrade to meet future demands.
Ability to work on multiple priorities and/or projects simultaneously.
Excellent listening and communications skills, both verbal and written.
flexible in working hours to support global project and migration during non-business hours.
Ability to collaborate with multiple teams to achieve project goals.
Organized, detail oriented and self-motivated.
Ability to provide and maintain detailed documentation on each project.
Demonstrate knowledge in advanced networking and infra security domain.
Ability to successfully train the operation team on the new solution(s) implemented.
Problem-solving skills and abilities to meet reasonable deadlines.
Ability to work with little supervision and manage a team.
Identify opportunities and recommend solutions for improving the overall network health by assessing overall effectiveness and efficiency.
Stay current with existing, emerging, and evolving technologies and when appropriate, make recommendations as to how we may best harness a new technology or idea.
BS in Engineering, Computer Science, or related field, with 15+ years of work experience in networking domain Have completed minimum 3 significant network solution designs In-depth knowledge of the OSI network model Experience with different network types (i.
e.
LAN, WAN, WLAN) Network protocols and technologies, e.
g.
DNS, HTTP, SSL, 802.
1x, Load Balancing, WAN optimization, SD-WAN, VPN, PKI Cisco network products (Nexus and Catalyst switches, routers, WLC, ISE) Knowledge of Palo Alto Networks firewall and IPS configuration and troubleshooting Knowledge of F5 load balancer Knowledge of public cloud is highly desirable Knowledge of Zero-Trust networking is highly desirable CCNP certification CCIE certification PCNSE certification Azure Network Engineer Associate
Principal Security Architect
Security architect job in Palo Alto, CA
About the Hiring TeamTencent Overseas IT has the mission to empower Tencent's rapid global growth with future ready, global IT platforms, applications and services. We are chartered to lead the Overseas IT strategy, architecture, roadmap and execution. Satisfying our internal/external customers and becoming a world class global IT team are our top aspirations.What the Role Entails
Tencent Overseas IT is committed to accelerating Tencent's international business growth and enabling its success through the deployment of cutting-edge technology platforms in IT services, cloud, security, and DevOps. As leaders in IT technology, we are responsible for defining and executing on Tencent's Overseas IT strategy, architecture, and roadmap. Our primary focus is to deliver exceptional value to satisfy the diverse needs of our internal and external customers, while striving to build a world-class global IT team.
Responsibilities
We're seeking a Principal Security Architect to drive the overall security architecture of Tencent overseas business. This role will work closely with foundation IT and Business teams to ensure compliance with security best practices, regulatory requirements, and internal policies. Key responsibilities include:
Security Strategy and Planning: Defining and implementing the organization's security strategy, roadmaps, and long-term vision.
Security Architecture Design: Developing and maintaining the overall security architecture, including defining security frameworks, standards, and controls.
Incident Response: Participating in incident response activities, providing expertise in identifying, containing, and recovering from security incidents.
Risk Management: Identifying and assessing security risks, developing mitigation strategies, and ensuring alignment with business objectives.
Security Compliance: Ensuring compliance with relevant security regulations, industry standards (e.g., NIST, ISO 27001, HIPAA), and internal policies.
Who We Look For
Key Skills
• Security Architecture Design: Ability to design and implement secure and scalable architectures across various environments (e.g., cloud, containerized, on-premises), including developing and maintaining threat models and security reference architectures, with a strong emphasis on Zero Trust principles.
• Security Operations & Incident Response: Experience with Security Information & Event Management (SIEM) systems, vulnerability scanners, malware analysis, and handling security incidents. The ability to lead threat modeling activities and support penetration testing is also important.
• Networking: In-depth knowledge of networking principles, including routers, switches, firewalls, load balancers, and wireless devices, as well as network security protocols and technologies like VLANs, VPNs, IDS/IPS, and network segmentation.
• Cloud Security: Expertise in cloud security principles and technologies across major platforms like AWS, Azure, and GCP, including implementing security controls and best practices in cloud environments.
• Identity and Access Management (IAM): Strong understanding of enterprise IAM systems, including platforms like Okta, SailPoint, and Active Directory (AD), and the ability to implement and manage secure access controls based on the principle of least privilege.
• Data Protection: Knowledge of data protection methods like encryption, pseudonymization, and shuffling, and how to apply them effectively to safeguard against data corruption, compromise, and loss.
• Security Testing & Analysis: Experience in conducting penetration testing, vulnerability assessments, ethical hacking, and risk analysis to identify and mitigate security risks.
• Security Automation & DevSecOps: Hands-on experience with security automation tools and scripting languages (e.g., Python, Lambda, Terraform) to streamline security processes and embed security into CI/CD workflows and Infrastructure-as-Code (IaC) processes.
• Security Tools & Technologies: Proficiency in using various security tools and technologies, including SIEM platforms, XDR, cloud-native threat detection tools, vulnerability scanners, and encryption tools.
• Operating Systems: Experience with various operating systems, including Windows, Linux, and UNIX.
• Application Security: Experience in web application security, OWASP, API security, and secure design and testing.
• SaaS Security: Experience with SaaS permission management, experience with SSPM (SaaS Security Posture Management)
• AI for Security: real word experience with AI/LLM/Agentic for security, especially adopt LLM in SIEM rule, SOAR optimization.
• Scripting skills in Python, PowerShell or Bash
Qualifications
• Education: Typically, a master's degree in computer science, Information Security, or a related technical field is required.
• Minimum of 10-12+ years of progressive experience in cybersecurity, including at least 5-7 years in a security architecture or senior-level engineering role.
• Experience securing workspace and key enterprise systems, including IAM, e-mail, DevSecOps, SaaS, and back-office systems.
• Essential soft skills: Analytical Thinking; Problem-Solving; Risk Management; Adaptability & Continuous Learning;Attention to Detail
• Experience working with remote, globally distributed teams
• Previous experience in the gaming industry is a plus.
• Relevant certifications:
Certified Information Systems Security Professional (CISSP)
Certified Cloud Security Professional (CCSP)
Certified Information Security Manager (CISM)
AWS Certified Security - Specialty
Other certifications like AWS Certified SA, Certified Ethical Hacker (CEH), CompTIA Security+, and GIAC Security Essentials Certification (GSEC) can also be beneficial.
Location State(s)
US-California-Palo AltoThe expected base pay range for this position in the location(s) listed above is $141,200.00 to $328,400.00 per year. Actual pay may vary depending on job-related knowledge, skills, and experience. Employees hired for this position may be eligible for a sign on payment, relocation package, and restricted stock units, which will be evaluated on a case-by-case basis. Subject to the terms and conditions of the plans in effect, hired applicants are also eligible for medical, dental, vision, life and disability benefits, and participation in the Company's 401(k) plan. The Employee is also eligible for up to 15 to 25 days of vacation per year (depending on the employee's tenure), up to 13 days of holidays throughout the calendar year, and up to 10 days of paid sick leave per year. Your benefits may be adjusted to reflect your location, employment status, duration of employment with the company, and position level. Benefits may also be pro-rated for those who start working during the calendar year.Equal Employment Opportunity at Tencent
As an equal opportunity employer, we firmly believe that diverse voices fuel our innovation and allow us to better serve our users and the community. We foster an environment where every employee of Tencent feels supported and inspired to achieve individual and common goals.
Auto-ApplyInformation Security Architect
Security architect job in San Francisco, CA
Job Description
We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices.
This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
To be Successful in this Role
Develop an architectural vision to support the continued growth of the product suite
Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use
Experience with privacy-enhancing technologies and encryption techniques.
Working knowledge of cloud security architecture strategies, frameworks, and reference models
Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives
Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management
Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc.
Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure
Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design.
Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture
Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward.
Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans.
Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally
Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security.
Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment.
Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives.
Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs
Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components.
You Will Have
8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture
Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.)
Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations.
Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics.
Hands-on experience with Cloud Technologies AWS, Azure & GCP
Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks
Experience in managing and contributing to incident response
Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation.
Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
System Engineer - Security
Security architect job in Cupertino, CA
The TV u0026 Sports Engineering team delivers the Apple TV+ streaming service, bringing customers Apple Original shows and movies, and live sports from MLS and MLB on Apple, Windows, Android, and third-party TV platforms. The team works on the Apple Sports app, the ultra-fast and easy-to-navigate app with real-time scores and stats for sports fans. This team is also responsible for ensuring the security of our Apple devices, users' identity, and content with FairPlay technologies.
Our team is seeking a Software System Engineer to work on our software security technologies to develop and launch new products. You'll work on projects that touch all aspects of Apple products, and will demonstrate your strong software and interpersonal skills as you integrate new technology on multiple platforms and architectures. We are looking for someone who has a track record of software developement. You have a familiarity with various architectures (x86/ARM, mac OS/iOS, Android and others), and the ability to work with dynamic teams to produce reliable, robust code. Familiarity with security technologies (DRM, TrustZone, cryptography) is a huge plus. This is an outstanding opportunity to be involved in something new from the beginning. Show us your talent. It's meaningful, fun, and exciting. It's what makes us Apple.
5+ years of Experience with or passion for Systems security 5+ years of Experience with containerized server applications and their deployment
Strong Software Engineering programming skills (C, C++) Experience with Embedded Systems Development Experience with or passion for Systems Security Experience with Android development Able to clearly communicate ideas and concerns Able to work effectively with different teams
QA Automation and Security Test Architect
Security architect job in Pleasanton, CA
QA Automation and Security Test Architect Job ID: 21-14390 Top must haves are: * 5+ years of experience as Automation Architect and doing web application security testing as per OWASP standards * 5+ years of experience designing, developing and executing Automation Scripts using Selenium
* Ability to provide application security risk assessment of technologies stack used in cloud or web applications.
TECHNICAL KNOWLEDGE AND SKILLS:
* 5+ years of experience as an Automation Architect and doing web application security testing as per OWASP standards
* 5+ years of experience designing, developing and executing Automation Scripts using Selenium
* Knowledge and experience in other Automation tools (like QTP, Rational Robot, AutoIT)
* Understanding and working knowledge with Data Driven, Keyword Driven and Hybrid frameworks
* Knowledge of Defect Management Tool (Quality Center, JIRA)
* Exploit application security flaws and vulnerabilities with attack simulations on multiple projects working against specific client-focused scopes of work.
* Ability to provide application security risk assessment of technologies stack used in cloud or web applications.
* Ability to perform application vulnerability assessments or application penetration testing, utilizing tools commercial and open source tools.
* Perform, review and analyze security vulnerability data to identify applicability and false positives.
* Create risk based security code reviews (Static, Dynamic and Interactive).
* Conduct application security testing in line with OWASP (Open Web application Security Project)
* Mentor junior engineers to build their skills and contribution levels
* Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment.
* Perform Proof of Concept testing and do evaluation of new security technologies and tools.
* Assist and support Security Test Analysts as they perform vulnerability, network and network security assessments.
* Experience DevOps tools like DynaTrace, Chef, Splunk and Vagrant.
* Experience with scripting languages (e.g. python, PERL, SQL) a plus
* Ability to perform below tasks:
o Dynamic Application Security Testing (DAST)
o Static Application Security Testing (SAST)
o Interactive Application Security Testing (IAST)
o Web Application Penetration Testing
o Product Security Testing
o Cloud Application Security Testing
o Web Services Security Testing
o Security Code Review
o Network Security Assessment
* Application Security Testing Tools: VeraCode, Synopsys, Contrast IAST, Burp Suite, Tamper Data, Live http Headers, Client Fortify, VeraCode, OWASP Top 10, N-Stealth, Hailstorm, Paros, SANS Top 20, Acunetix, Nessus
* Fast learning, problem solving and analytical skills
* Excellent communication, presentation, and interpersonal skills
* Track record of good time management
* Efficient in effort estimation, planning and prioritization
* Ability to understand Business Requirements and transform them to functional units
* Knowledge of SDLC and implementation
* Knowledge of SoapUI
* Proficiency in Java language
* Proficiency in SQL
* Job details
*
Sr. Security Portfolio TPM
Security architect job in San Francisco, CA
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
The Opportunity
The Adobe Security organization seeks a proactive force multiplier with experience skillfully leading multiple technical programs, running a healthy portfolio, working directly with leadership, and delighting stakeholders. Our ideal candidate has superb communication and relationship-building skills and a solid track record of driving business outcomes through managing large programs. In addition, familiarity with fundamentals in key security operations and related security compliance frameworks could help this candidate have an immediate impact. If you excel at navigating complexity with multiple internal customers, are a master planner who helps teams foresee challenges and risks and guides them through them, and are equipped with a diverse technical program management toolbox, we can't wait for you to join our Security PMO team!
What you'll Do
* Partner directly with security leadership to build a portfolio of key programs. Lead and monitor the health and execution of several key initiatives with insights into status, risks, dependencies, roadblocks, and budget across the organization's program portfolio.
* Ensure a healthy program portfolio in Adobe's Technology GRC (Governance, Risk, and Compliance) organization with a clearly defined roadmap.
* Bring together cross-functional teams to deliver business outcomes for high-priority programs through clear planning, execution, partnership, and communication.
* Make things easier for all collaborators of your program portfolio by driving simplicity, clarity, and efficiency in all aspects of your work.
* Reduce program risk by proactively identifying, communicating, and removing roadblocks.
* Build trust through visibility. Provide accurate and timely data-driven status reports for a broad audience and lead executive governance meetings.
* Effectively handle program financials, including driving accurate budget forecasts.
What you need to succeed
* Exceptional communication skills for effective engagement with both engineers and executives in meetings, presentations, and writing. Excel at building strong and trusted partner relationships.
* 7+ years as a program manager in the security domain with portfolio-level oversight experience. Demonstrate strong knowledge in the compliance field and have worked closely with the compliance teams on projects.
* Experience leading programs involving AI systems and workflows (e.g., MCP servers, RAG capabilities, LLM integrations, or related AI infrastructure).
* Established history of effectively managing programs from inception, prioritizing, and strategizing to implementation, reporting, and successful delivery of intricate projects with many significant internal customers.
* Demonstrated Agile practice experience in software projects and familiarity with Jira (including query and dashboarding), O365 Suite, MS Teams, SharePoint, MS Project, Excel, and Miro or equivalent experience
* Familiarity with compliance frameworks such as ISO 42001, SOC2, HIPAA, PCI DSS, ISO27001, ISO27017/18, ISO22301, and Geo-compliance programs.
* Preferred Certifications: CISSP, CISM, PMP, or equivalent credentials demonstrating expertise in cybersecurity and program leadership.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $124,300 -- $228,400 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process.
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
Urgent Job Opening for a SAP Security Consultant in San Francisco, CA
Security architect job in San Francisco, CA
Hello, Greetings for the day, We have an urgent job opening for a SAP Security Consultant in San Francisco, CA. Please find the complete below and consultant information details below to the job description. Duration: 5Months+ Job Title: SAP Security
Duties:
Provides the technical guidance in development of security roles and authorizations to SAP projects and production support for R3, BW, EBP, SMP, PI, AII/OER systems Ensures development and maintenance of SAP roles and authorizations are aligned with enterprise security best practices and corporate standards Delivers and manages overall SAP security standards and designs Works closely with SAP functional and technical teams in the identification and resolution of gaps in the security authentication and authorization processes Provides day-to-day support for GRC 5.3 CUP, FireFighter Works closely with security and technical teams in architecting and implementing Identity and Security best practices in SAP environment; Partners with teams in support of internal and external auditing of SAP environment Performs annual SAP licensing for all the systems onsite Skills: Minimum of 5 years of experience implementing and delivering SAP Security Solutions; Must have strong demonstrated knowledge of SAP Security and experience with GRC Analysis and Administration. Experience in implementing/upgrading/managing SAP GRC Access Controls, Access Risk Analysis and Emergency Access Management a plus; Must have excellent troubleshooting and resolution skills; Strong attention to detail. Strong technical knowledge of SAP Security architecture and role based authorization models; Strong analytical, problem solving and conceptual. Strong oral and written communication skills, with an ability to express complex technical concepts; Strong understanding of data privacy concepts. Strong Security and Risk mitigation mindset.Understanding of process re-engineering, segregation of duties, application security implementation, security auditing techniques Keywords: Education: Bachelor's degree in Computer Science or related field, OR equivalent combination of education and/or experience Skills and Experience: Required Skills: AUDITING MITIGATION PROBLEM SOLVING SAP Security GRC Additional Skills: RE-ENGINEERING RISK ANALYSIS ARCHITECTURE SAP SECURITY SECURITY ARCHITECTURE SECURITY IMPLEMENTATION SOLUTIONS AUTHENTICATION EBP MAINTENANCE R3
Thanks & Regards,
Srikanth
************
800 W, Fifth Avenue, Suite 208A
Naperville, IL - 60563
"
A Certified MBE & Women's Business Enterprise Alliance (WBEA)"
Additional Information
All your information will be kept confidential according to EEO guidelines.
Director of Information and Data Security
Security architect job in Santa Clara, CA
Role Purpose The Director of Information and Data Security will establish and lead Eltropys IT and Cybersecurity function, responsible for developing foundational systems, processes, and
governance across infrastructure, data protection, and compliance. This leader will drive
security maturity across the organization, balancing hands-on execution with long-term
strategic planning, and partnering with external GRC consultants to build a scalable security
and compliance framework aligned with industry standards (e.g., SOC 2, ISO 27001).
Key Responsibilities
IT and Infrastructure Security
Oversee endpoint management, asset inventory, and identity and access management
(IAM).
Establish standards for device hardening, patch management, and secure configuration.
Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
Lead threat detection, vulnerability management, and incident response operations.
Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
Conduct regular penetration testing, track remediation, and drive security awareness
programs.
Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
Partner with external GRC consultants to design and operationalize Eltropys information
security and compliance framework.
Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
Maintain a centralized risk register and oversee remediation tracking.
Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
Establish and operationalize the companys Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
Develop and implement a company-wide security awareness program.
Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
Define structure, roles, and hiring priorities aligned with the companys growth stage.
Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
Asset Visibility: 100% endpoint and asset inventory completeness.
Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
Independent, self-starter with strong ownership and execution bias.
Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to: VP of Operations
Level: Senior Leadership
Direct Reports:
- IT Team
- Cybersecurity Engineer(s)
Director of Information and Data Security
Security architect job in Santa Clara, CA
Role Purpose The Director of Information and Data Security will establish and lead Eltropy's IT and Cybersecurity function, responsible for developing foundational systems, processes, and governance across infrastructure, data protection, and compliance. This leader will drive
security maturity across the organization, balancing hands-on execution with long-term
strategic planning, and partnering with external GRC consultants to build a scalable security
and compliance framework aligned with industry standards (e.g., SOC 2, ISO 27001).
Key Responsibilities
IT and Infrastructure Security
* Oversee endpoint management, asset inventory, and identity and access management
(IAM).
* Establish standards for device hardening, patch management, and secure configuration.
* Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
* Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
* Lead threat detection, vulnerability management, and incident response operations.
* Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
* Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
* Conduct regular penetration testing, track remediation, and drive security awareness
programs.
* Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
* Partner with external GRC consultants to design and operationalize Eltropy's information
security and compliance framework.
* Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
* Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
* Maintain a centralized risk register and oversee remediation tracking.
* Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
* Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
* Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
* Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
* Establish and operationalize the company's Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
* Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
* Develop and implement a company-wide security awareness program.
* Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
* Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
* Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
* Define structure, roles, and hiring priorities aligned with the company's growth stage.
* Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
* Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
* Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
* Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
* Asset Visibility: 100% endpoint and asset inventory completeness.
* Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
* Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
* Independent, self-starter with strong ownership and execution bias.
* Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
* Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
* Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
* Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
* Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
* Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
* Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
* Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to: VP of Operations
Level: Senior Leadership
Direct Reports:
* IT Team
* Cybersecurity Engineer(s)
Information Security & Compliance, Manager (1 Year Contract)
Security architect job in Palo Alto, CA
Job Description
About us:
Lucence is a pioneering precision oncology company with a bold vision: a world where cancer is defeated through early detection and timely treatment. Our cutting-edge liquid biopsy tests use advanced molecular profiling to guide personalized cancer therapies, transforming how cancer is diagnosed and treated. At Lucence, we are shaping the future of precision medicine by capturing both genetic and cellular data from a single blood draw, bringing us closer to our mission of overcoming cancer.
We are looking for an Information Security & Compliance Manager to lead Lucence's SOC 2 compliance programmes. You will own our internal controls, audits, and security governance frameworks, ensuring the company meets the standards required for global diagnostics operations.
Key Responsibilities
Compliance Ownership
Own SOC 2 Type I/II, and build on HIPAA and cybersecurity certification roadmaps. Maintain documentation, evidence repositories, and ongoing readiness.
Internal Controls & Policies
Build, refine, and enforce security policies, risk registers, and access-control processes.
Audit Management
Partner with external auditors, coordinate internal contributors, drive remediation plans, and ensure timely closure of findings.
Vendor & Data Protection Reviews
Conduct security due diligence for vendors, manage DPAs, and ensure data-flow compliance for global partners.
Security Governance
Implement quarterly control testing, internal audits, DR/BCP drills, and continuous monitoring of compliance gaps.
Cross-Functional Partnering
Work closely with external vendors, Informatics, IT, Lab Ops, and Commercial teams to embed security into product and operational workflows.
Preferred Qualifications
Experience owning SOC 2 or ISO audit cycles end-to-end.
Familiarity with cloud environments (AWS/Azure/GCP) and modern security tooling.
Attention to detail to improve policies, controls, and audit documentation.
Certifications: ISO Lead Auditor, CISA, CISSP, or equivalent.
Information Security
Security architect job in Pleasanton, CA
This job requires relocation to the United States, Silicon Valley, through the use of a TN visa. If selected for this job, the process of coming to the United States will be handled by Tech-Mex.
The Information Security Engineer maintains 24x7 support, responds to vendor security questionnaires, performs monitoring and maintenance of the security infrastructure and components, participates in project planning and deployment of new technologies and will be responsible for remediation of identified compliance and risk gaps. He/she works independently, operating under the defined guidelines established by the Director of Information Technology and Security.
ESSENTIAL Job Duties & Responsibilities
Monitor and advise on information security issues related to the systems and workflow to ensure the internal and external security controls for the company are appropriate and operating as intended
Documenting gaps between vendor requirements and National MIs infrastructure
Coordinate and execute IT security projects
Coordinate response to information security incidents
Conduct company-wide audits and manage remediation plans
Collaborate with other areas of IT to manage security vulnerabilities
Conduct research to keep abreast of latest security issues
Ensures that system documentation is accurate and updated as needed
Participates in disaster recovery (DR) exercises as directed
Logfile review and analysis
Install and maintain new systems
Prioritize remediation of gaps based on internal and external audits
Prepares compliance reports by collecting, analyzing, and summarizing data
Evaluates information to determine compliance with laws, regulations, or standards
MINIMUM QUALIFICATIONS
3-5 plus years related work experience
Vendor audit and compliance experience, preferably with the SIG framework
Strong technical skills in anti-virus, DLP, and PKI
Strong experience with the McAfee suite of products
Solid understanding of networking concepts and system administration
Experience with Nessus, RSA envision, RedHat Linux and database security
Knowledge of data compliance and privacy standards and regulations as they apply to insurance and banking industries
Knowledge of Information Security Standards (ISO27001, NIST, etc)
Self-motivated, self-directed and shows attention to detail while working
Ability to effectively prioritize and execute reporting tasks in a fast-paced, results-driven environment
Extensive experience working in a team-oriented, collaborative environment with a diverse team of business and IT staff
Bachelor's degree in Computer Science or Information Systems preferred; Professional certifications are an advantage
Essential Worker Competencies
The ability to function independently with minimal supervision.
Works ethically and with integrity supporting organizational goals and values
Displays commitment to excellence
Completes work in a timely manner and meets deadlines
Good verbal and written communication skills
Meets productivity standards and achieves key outcomes
Is dependable and keeps commitments
Contributes to building a positive team spirit and treats others with respect
Candidate will be relocated to the United States
Chief Information Security Officer (0933 Manager V) - Department of Public Health
Security architect job in San Francisco, CA
The Department of Public Health prioritizes equitable and inclusive access to quality healthcare for its community and values the importance of diversity in its workforce. All employees at the Department of Public Health work to advance equity, inclusion, and diversity with a specific lens and focus on race, ethnicity, gender, sex, sexuality, disability, and immigration status.
This is a Position-Based Test conducted in accordance with CSC Rule 111A. Learn more about the City's hiring process here: *****************************************
* Application Opening: Friday, November 21, 2025
* Application Deadline: Application filing will close on or after Friday, January 9, 2026.
* Salary: $180,440 - $230,308 Annually (Range A)
* Appointment Type: Permanent Civil Service
* Recruitment ID: PBT-0933-160818
Becoming a City employee means being a part of a team that cares about making a difference. Your work will shape both the present and future of San Francisco. When you work for the City, you're choosing a job with purpose.
The mission of the San Francisco Department of Public Health (SFDPH) is to protect and promote the health of all San Franciscans. SFDPH strives to achieve its mission through the work of several divisions - the San Francisco Health Network, Population Health Division, Behavioral Health Services, and Central Administration. The San Francisco Health Network is the City's only complete system of care and has locations throughout the City, including Zuckerberg San Francisco General Hospital and Trauma Center, Laguna Honda Hospital and Rehabilitation Center, and over 15 primary care health centers. The Population Health Division (PHD) provides core public health services for the City and County of San Francisco: health protection, health promotion, disease and injury prevention, disease surveillance, and disaster preparedness and response. Behavioral Health Services operates in conjunction with SFHN and provides a range of mental health and substance use treatment services. Central Administration houses core support organizations, including Finance, Information Technology (IT), Human Resources, Privacy and Compliance, Business Office, Facilities Management, and Security Services.
Role description
The San Francisco Department of Public Health is seeking a dynamic and experienced cybersecurity professional to join its IT leadership team. As a key strategic leader, the Chief Information Security Officer (CISO) (0933 Manager V) will be responsible for developing and executing a comprehensive information security strategy that safeguards the department's systems, data, and services.
This role leads the implementation of an enterprise-wide security program that promotes collaboration, strengthens governance, and aligns cybersecurity initiatives with organizational goals. The CISO serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development. The CISO oversees a team of cybersecurity professionals within the SFDPH IT division and collaborates extensively with the CISO for the City and County of San Francisco.
We are looking for a visionary and collaborative leader who can balance innovation with risk mitigation, and who thrives in a complex, mission-driven environment. The CISO reports directly to the Chief Information Officer (CIO).
The Chief Information Security Officer (0933 Manager V) performs the following essential job functions:
* Provides strategic leadership in evaluating and mitigating information security threats across the organization using a structured, risk-based methodology. Advises executive leadership on identified risks and ensures timely execution of mitigation and remediation plans with integrity and discretion
* Directs the ongoing development of the department's information security program, including project portfolio management, incident response, policy frameworks, compliance activities, threat and vulnerability management, and third-party risk management
* Allocates and manages resources to support a robust security strategy. Identifies and advocates for strategic investments, oversees capital and operating budgets, and delivers ROI analyses and budget recommendations
* Partners with the Office of Compliance and Privacy Affairs to assess data security risks related to contracts, projects, artificial intelligence solutions, and other initiatives. Develops tools and interventions to mitigate risks, establishes performance metrics, and monitors compliance through audits and assessments
* Builds alignment and support for security goals and initiatives across internal and external stakeholders. Communicates effectively with leadership at all levels on trends, risks, and the overall effectiveness of the security program
* Promotes awareness and understanding of regulatory requirements across the organization. Leads or collaborates on testing and auditing activities to ensure ongoing compliance and successful certifications
* Analyzes security requirements and ensures compliance with industry standards such as HIPAA, NIST, and PCI-DSS
* Establishes and maintains comprehensive policies and procedures to support effective and sustainable security operations
* Serves as the department's representative in security-related matters with City agencies and partners
* Continuously monitors emerging trends, technologies, and best practices in cybersecurity to ensure the department's security posture remains current and effective
The Chief Information Security Officer (0933 Manager V) may perform other duties as assigned/required.
How to qualify
1. Education: Bachelor's degree from an accredited college or university; AND
2. Experience: Five (5) years of professional healthcare information systems security experience, of which three (3) years must include supervising IT professionals.
Education Substitution: Additional experience as described above may be substituted for the required degree on a year-for-year basis. One (1) year is equivalent to thirty (30) semester units / forty-five (45) quarter units.
Applicants must meet the minimum qualification requirements by the final filing date unless otherwise noted.
One-year full-time employment is equivalent to 2,000 hours (2,000 hours of qualifying work experience is based on a 40-hour work week).
Desirable Qualifications:
The stated desirable qualifications may be considered at the end of the selection process when candidates are referred for hiring:
* Possession of a Certified Information Systems Security Professional (CISSP) and/or Certified Information Security Manager (CISM) certification
Verification of Education and Experience:
Every application is reviewed to ensure that you meet the minimum qualifications as listed in the job ad. Review SF Careers Employment Applications for considerations taken when reviewing applications.
Applicants may be required to submit verification of qualifying education and experience at any point during the recruitment and selection process. If education verification is required, information on how to verify education requirements, including verifying foreign education credits or degree equivalency, can be found at *******************************************************
Note: Falsifying one's education, training, or work experience or attempted deception on the application may result in disqualification for this and future job opportunities with the City and County of San Francisco.
What else should I know?
Selection Procedures:
After application submission, candidates deemed qualified must complete all subsequent steps to advance in this selection process, which includes the following:
Supplemental Questionnaire (SQ) Examination (Weight: 100%)
Candidates that meet the minimum qualifications will be invited to participate in a Supplemental Questionnaire (SQ) examination that is designed to measure the knowledge, skills, and abilities in job related areas which may include but not be limited to: Knowledge of local, State and Federals laws and regulations relating to information security, including but not limited to HIPAA and HITECH; Knowledge of information security technology frameworks and standards, including but not limited to NIST, HITRUST, COBIT, ISO 27001, PCI-DSS or similar cyber security frameworks; Knowledge of technology relating to enterprise wide information security protection; Knowledge of structured systems analysis and design practices and techniques; common operating systems software and relational database systems; hospitals or community health network environments; Ability to apply principles and practices of management, administration, budgeting, training, and personnel management; Ability to manage, supervise, train and coordinate complex functional area of responsibility and groups of employees; Ability to analyze and report on activities, issues and problems and recommend appropriate solutions; Ability to communicate effectively orally; Ability to communicate effectively in writing; Ability to exercise judgement, decisiveness and creativity required in situations involving the direction, control and planning of a program(s); manage critical timelines effectively; Ability to establish and maintain good working relationships with department personnel, staff, vendors, peers, and management, and engage and influence a broad range of stakeholders (e.g. HR, IT, Legal, Compliance, senior management, etc.)
Candidates must achieve a passing score on the Supplemental Questionnaire exam in order to continue in the selection process and will be placed on the confidential eligible list in rank order according to their final score.
Additional selection processes may be conducted by the hiring department prior to making final hiring decisions.
Certification
The certification rule for the eligible list resulting from this examination will be the Rule of the List.
Eligible List/Score Report:
A confidential eligible list of applicant names that have passed the civil service examination process will be created and used for certification purposes only. An examination score report will be established, so applicants can view the ranks, final scores, and number of eligible candidates. Applicant information, including names of applicants on the eligible list, shall not be made public unless required by law. However, an eligible list shall be made available for public inspection, upon request, once the eligible list is exhausted or expired and referrals resolved. The eligible list/score report resulting from this civil service examination process is subject to change after adoption (e.g., as a result of appeals), as directed by the Human Resources Director or the Civil Service Commission.
The duration of the eligible list resulting from this examination process will be of six months and may be extended with the approval of the Human Resources Director.
To find Departments which use this classification, please see the city's Position Counts by Job Codes and Departments.
Terms of Announcement and Appeal Rights:
Applicants must be guided solely by the provisions of this announcement, including requirements, time periods and other particulars, except when superseded by federal, state or local laws, rules, or regulations. Clerical errors may be corrected by the posting the correction on the Department of Human Resources website at ************************
The terms of this announcement may be appealed under Civil Service Rule 111A.35.1. The standard for the review of such appeals is 'abuse of discretion' or 'no rational basis' for establishing the position description, the minimum qualifications and/or the certification rule. Appeals must include a written statement of the item(s) being contested and the specific reason(s) why the cited item(s) constitute(s) abuse of discretion by the Human Resources Director. Appeals must be submitted directly to the Executive Officer of the Civil Service Commission within five business days of the announcement issuance date.
Additional information regarding Employment with the City and County of San Francisco:
* Information about the Hiring Process
* Conviction History
* Employee Benefits Overview
* Equal Employment Opportunity
* Disaster Service Workers
* ADA Accommodation
* Right to Work
* Copies of Application Documents
* Diversity Statement
* Veterans Preference
* Seniority Credit in Promotional Exams
Where to Apply
All job applications for the City and County of San Francisco must be submitted through our online portal. Please visit *********************** to begin your application process.
Applicants may be contacted by email about this recruitment. Please consider using a personal email address that you check regularly rather than a work or school account.
Computers are available for the public (9:00 a.m. to 4:00 p.m. Monday through Friday) to file online applications in the lobby of the Dept. of Human Resources at 1 South Van Ness Avenue, 4th Floor and at the City Career Center at City Hall, 1 Dr. Carlton B. Goodlett Place, Room 110.
Ensure your application information is accurate, as changes may not be possible after submission. Your first and last name must match your legal ID for verification, and preferred names can be included in parentheses. Use your personal email address, not a shared or work email, to avoid unfixable issues.
Applicants will receive a confirmation email from ******************************** that their online application has been received in response to every announcement for which they file. Applicants should retain this confirmation email for their records. Failure to receive this email means that the online application was not submitted or received.
If you have any questions regarding this recruitment or application process, please contact the analyst, Marielle Saldajeno at **************************** or **************.
We may use text messaging to communicate with you on the phone number provided in your application. The first message will ask you to opt in to text messaging.
The City and County of San Francisco encourages women, minorities and persons with disabilities to apply. Applicants will be considered regardless of their sex, race, age, religion, color, national origin, ancestry, physical disability, mental disability, medical condition (associated with cancer, a history of cancer, or genetic characteristics), HIV/AIDS status, genetic information, marital status, sexual orientation, gender, gender identity, gender expression, military and veteran status, or other protected category under the law.
Easy ApplyInformation Security Manager
Security architect job in San Francisco, CA
ABOUT THE ROLE
You'll be our first dedicated security leader, owning the technical execution of our security and compliance program. You'll drive SOC 2 and PCI DSS compliance, manage our vulnerability program, and build security capabilities that enable our engineering teams to move fast while staying secure. This is a hands-on role-you'll design controls, write policies, respond to incidents, and work directly with auditors.
This is initially an individual contributor role with high impact and visibility. As our security program matures, you'll have the opportunity to build and lead a security team.
IN THIS ROLE, YOU WILL
Own Compliance
Lead SOC 2 Type II and PCI DSS programs through successful audit
Design and implement security controls without blocking velocity
Serve as primary technical contact for external auditors and assessors
Manage third-party vendor security assessments and ongoing monitoring
Build automated evidence collection and continuous compliance monitoring
Report security metrics and program status to executive leadership
Manage Security Operations
Establish vulnerability management program with defined SLAs and remediation workflows
Own end-to-end vulnerability management: identify, assess, prioritize, and drive remediation to completion across infrastructure and applications
Manage external penetration testing program with third-party vendors, including scoping, assessment review, and remediation tracking
Perform internal penetration testing and security assessments of applications, APIs, and infrastructure
Build SIEM detection rules, security dashboards, and alert triage processes
Develop and test incident response runbooks
Conduct threat modeling for critical systems and architectural changes
Lead security assessments of new technologies and third-party integrations
Enable & Collaborate
Partner with platform engineering to implement security roadmap: AWS landing zone design, PAM/JIT workflows, account segmentation, disaster recovery testing
Enforce enterprise security controls (SSO, secrets management, RBAC)
Build and deliver security awareness training program for all employees
Develop and maintain security policies, standards, and procedures
Translate compliance requirements into actionable engineering tasks and drive completion
YOU HAVE
Security & Compliance:
5+ years in information security, with 2+ years in fintech or highly regulated industry
CISSP certification (or actively pursuing - must obtain within 12 months of hire)
Hands-on experience leading SOC 2 and PCI DSS audits from start to finish
Strong incident response background-you've led real security incidents
Experience with vulnerability management platforms (Wiz, Snyk, Tenable)
Technical Skills:
Solid understanding of AWS security: IAM, Security Hub, GuardDuty, CloudTrail, KMS
Experience with SIEM platforms (Splunk, Datadog, Elastic)-you can write detection rules and build dashboards
Hands-on experience with vulnerability assessment and penetration testing tools (Burp Suite, Nessus, Qualys, or similar)
Ability to read code (Ruby, JavaScript, Python) and assess security implications
Knowledge of web application security, API security, and OWASP Top 10
Understanding of access control patterns (PAM, SSO, RBAC, least privilege)
Core Competencies:
Strong communication-you can explain risks to engineers and executives alike
Pragmatic risk management in fast-paced environments
Self-starter who builds programs from scratch
Collaborative mindset-security as enabler, not blocker
Ability to drive remediation to completion across teams
NICE TO HAVE
Additional certifications (CISM, CISA, CCSP, CEH, OSCP, CRISC)
Experience managing WAF deployments (Palo Alto, Cloudflare, AWS WAF)
Infrastructure-as-code experience (Pulumi, Terraform)
Kubernetes security knowledge
SOAR platform experience
DevSecOps or security automation background
Scripting skills (Python, Bash) for security tooling and automation
Kikoff: A FinTech Unicorn Powering Financial Progress with AI
At Kikoff, our mission is to provide radically affordable financial tools to help consumers achieve financial security. We're a profitable, high growth FinTech unicorn serving millions of people, many of whom are building credit or navigating life paycheck to paycheck. With innovative technology and AI, we simplify credit building, reduce debt, and expand access to financial opportunities to those who need them the most. Founded in 2019, Kikoff is headquartered in San Francisco and backed by top-tier VC investors and NBA star Stephen Curry.
Why Kikoff:
This is a consumer fintech startup, and you will be working with serial entrepreneurs who have built strong consumer brands and innovative products. We value extreme ownership, clear communication, a strong sense of craftsmanship, and the desire to create lasting work and work relationships. Yes, you can build an exciting business AND have real-life real-customer impact.
🏥 Medical, dental, and vision coverage - Kikoff covers the full cost of health insurance for the employee!
📈 Meaningful equity in the form of RSU's
🏝 Flexible vacation policy to help you recharge
💰 Competitive pay based on experience consisting of base + equity + benefits
Location: Hybrid, 3 days onsite in San Francisco, CA.
Visa sponsorship available: Kikoff is willing to provide sponsorship for H1-B visas and U.S. green cards for exceptional talent.
Equal Employment Opportunity Statement
Kikoff Inc. is an equal opportunity employer. We are committed to complying with all federal, state, and local laws providing equal employment opportunities and considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
Please reference the following for more information.
If you need reasonable accommodation for a job opening please connect with us at ***************** and describe the specific accommodation requested for a disability-related limitation. Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process.
San Francisco Fair Chance Ordinance: Pursuant to the San Francisco Fair Chance Ordinance, Kikoff will consider for employment qualified applicants with arrest and conviction records.
Auto-ApplySenior Security GRC Analyst
Security architect job in San Francisco, CA
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplyProduct Security Engineer, Operating System
Security architect job in Palo Alto, CA
Palo Alto, CA (on-site) About 1X We build humanoid robots that work alongside people to solve labor shortages and create abundance. The Role We are seeking a Product Security Engineer with expertise in operating system security to strengthen the foundation of our robotics platform. In this role, you will design and implement security features such as secure boot, trusted execution environments, and system service hardening. Your work will ensure that sensitive operations and data remain protected while enabling developers to follow security best practices. This position is critical to increasing the resilience and trustworthiness of our systems.
You Will
* Develop and maintain secure critical services for Linux systems
* Implement secure boot chains using fused hardware keys with rollback protection
* Integrate OP-TEE to safeguard sensitive assets including mTLS certificates and disk encryption keys
* Harden system services using least-privilege operations, systemd features, namespacing, and syscall filtering
* Build hardening templates and automation tools to streamline security enforcement for developers
* Automate security validation processes within CI/CD pipelines
* Design and enforce device access controls for Linux systems
* Contribute and ship C/C++ code (or similar) to production environments
Security System Engineer
Security architect job in San Francisco, CA
Seeking a candidate with the ability to demonstrate expertise in both the practical implementation and the administration of noted tools. The basis of the work will be to backfill daily operations management as well as assess the current state implementation for completeness and currency. The candidate will also be responsible for the identification and execution of implementation improvement efforts that will allow for the transition of such tools to a managed service provider including the documentation of run books, incident response and remediation support, and developing continuity plans. Has demonstrated expertise in one or more of the following tools:
Qualys Vulnerability Scanner
LogRhythm
Tripwire
Essential Functions:
Manage and maintain key Information Security tools to help mature and improve the overall effectiveness of solutions across the organization to safeguard information systems, intellectual property assets and customer data.
Design, implement and support integration of information security solutions including security architectures, firewall analysis, and developing and coordinating security implementation plans to improve monitoring and compliance functions and drive automation and efficiencies.
Manage remediation of security issues with technology and business teams to ensure remediation is completed timely and effectively.
Analyze existing processes to identify improvement opportunities, recommend solutions and lead implementation.
Establish and implement a repeatable process for tracking, reporting and driving remediation of security issues.
Assist with the PCI DSS security compliance program including scoping, testing, and remediation activities.
Help train associates, contractors, alliance or other third parties on information security policies and -procedures.
Provide skill-set knowledge transfer that ensures necessary cross-training of other IT Security team members.
Monitors compliance with information security policies and procedures and monitors access control systems to assure appropriate access levels are maintained.
Develop, support and manage Security metrics & reporting.
Develop, maintain and enforce standardized, repeatable administrative and operational policies, processes and procedures.
Serves as enterprise information security consultant, conduct information security risk assessments.
Lead computer forensic analysis, cyber-crime investigation, incident emergency response and investigations.
Perform other responsibilities and duties as assigned.
Additional expertise in the following tools is a plus;
Imperva DB Monitoring
Ingrian HSM
LogRhythm
McAfee IDS/IPS
McAfee Solid Core
NETIQ
PGP Desktop, WDE, Netshare
PGP Universal Server & KMS
Qwest Password Manager
RedSeal
RSA Authentication Manager
RSA Envision
Symantec DLP
Varonis Data Privilege & DWebsense
websense
Manager, Information Security - Detection Engineering
Security architect job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. This role may be remote or hybrid. At LinkedIn, hybrid roles are performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. Remote roles are performed from the designated home work location upon time of hire, and any changes to this home work location requires a review of remote status and approval.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Engineering Manager to lead the Detection Engineering team in the US and to be an integral part of our Information Security organization. The Detection Engineering team is responsible for developing and maintaining threat detection capabilities, security monitoring systems, and detection rules to protect our infrastructure, applications, and, most importantly, our members. This is a key role in supporting and growing our security detection and monitoring capabilities.
Responsibilities:
Leadership and Team Management
+ Lead and manage the detection engineering team, including hiring, training, and mentoring team members.
+ Develop and maintain detection engineering policies, procedures, infrastructure, and guidelines.
+ Coordinate and oversee all activities of the detection engineering team during threat detection development and implementation.
Detection Development and Management
+ Serve as the primary point of contact for all threat detection development and enhancement initiatives.
+ Ensure timely development, testing, and deployment of detection rules and monitoring capabilities.
+ Conduct post-deployment analysis and create detailed reports on detection effectiveness with KPIs, including tuning recommendations and optimization strategies.
Communication and Coordination
+ Communicate detection development status, updates, metrics and reporting, and capabilities to senior management, stakeholders, and security teams regularly.
+ Coordinate with internal and external teams, including security operations, defense infrastructure, incident response, and product engineering teams to develop and maintain effective detection capabilities.
+ Develop and maintain an effective detection engineering communication plan.
Continuous Improvement
+ Continuously evaluate and improve detection engineering processes, tools, and capabilities.
+ Conduct and report on regular detection testing and validation exercises to test and refine detection rules and monitoring systems.
+ Stay current with emerging threats, attack techniques, and detection technologies to enhance the detection engineering program.
Reporting and Documentation
+ Maintain comprehensive documentation of all detection rules, including development rationale, testing results, and performance metrics.
+ Prepare and present detection engineering reports and metrics to senior leadership and stakeholders.
+ Ensure compliance with regulatory requirements and industry standards related to threat detection and monitoring.
Training and Awareness
+ Develop and deliver detection engineering training programs for team members and other relevant personnel.
+ Promote security detection awareness and best practices across the organization.
+ Ensure the detection engineering team is up-to-date with the latest tools, techniques, and procedures.
Budget and Resource Management
+ Manage the detection engineering budget and allocate resources effectively.
+ Evaluate and recommend tools, technologies, and services to enhance the detection engineering program.
+ Ensure the team has the necessary resources and support to perform their duties effectively.
Basic Qualifications:
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related technical discipline, or equivalent practical experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 7+ years of experience in cybersecurity, with a focus on detection engineering, security monitoring, threat intelligence, incident response, or related security roles.
+ Experience leading or managing a cybersecurity, incident response, or detection engineering team.
+ Experience in cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK, OCSF).
+ Experience in detection engineering tools and technologies (e.g., Query Languages, CI/CD, YARA, Sigma rules, threat intelligence platforms).
+ Experience with threat analysis, detection rule development, automation engineering, and security monitoring optimization.
+ Project management experience with managing budgets and resources.
Preferred Qualifications:
+ Master's degree in Cybersecurity, Information Assurance, or a related field.
+ 10+ years of experience in cybersecurity, with significant experience in detection engineering, threat intelligence, or incident response.
+ 3+ years of management experience in building small to medium-sized teams, demonstrating growth and a track record of successful deliveries.
+ Ability to work under pressure and manage multiple detection development projects simultaneously as well as managing an oncall team.
+ Relevant certifications (e.g., CISSP, CISM, GCIH, GCFA, SANS).
+ Experience in developing and delivering detection engineering training and awareness programs.
+ Strong proficiency in Kusto Query Language (KQL) and SQL.
+ Proficiency in programming or scripting languages (e.g., Python, Go, etc.) for automating detection development and testing processes.
+ Experience with cloud security and detection engineering in cloud environments especially Azure.
+ Knowledge of advanced threat detection techniques, including threat hunting and behavioral analysis as well as applied threat intelligence.
+ Familiarity with detection engineering frameworks and best practices (e.g., Sigma, YARA, STIX/TAXII, OCSF).
+ Strong communication skills, both written and verbal, with the ability to convey complex technical information to non-technical stakeholders.
Suggested Skills :
+ Security Information and Event Management (SIEM)
+ Query languages (KQL, SPL, SQL, Elastic, etc.)
+ Detection Rule Development (YARA, Sigma)
+ Scripting and Automation (e.g., Python, PowerShell, SQL)
+ Threat Intelligence Integration
+ Cloud Security (e.g., Azure, GCP)
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
**Equal Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
**Global Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
Distributed Systems Engineer: Secure Sandboxes
Security architect job in San Francisco, CA
Magic's mission is to build safe AGI that accelerates humanity's progress on the world's most important problems. We believe the most promising path to safe AGI lies in automating research and code generation to improve models and solve alignment more reliably than humans can alone. Our approach combines frontier-scale pre-training, domain-specific RL, ultra-long context, and inference-time compute to achieve this goal.
About the role
As a Software Engineer on the Supercomputing Platforms and Infrastructure team, you will build the next generation systems that power large scale AI research and deployment. You will focus on sandboxed execution environments, distributed systems orchestration, and performance optimized compute workflows. You will work closely with ML and Research teams and infrastructure teams to deliver both high throughput, scale, and strong isolation guarantees in a cluster environment.
What you might work on
Build highly scalable, highly performant, software that facilitates arbitrary code execution with strong isolation guarantees.
Design and build systems that allow our AI models to interface with machines in various modes, interactive terminal, GUI applications, etc.
Provision and operate high density compute and storage nodes (NVMe, high IOPS SSDs, high bandwidth networks), and build software that performs efficient load balancing, and resource utilization across them.
Instrument and optimize end to end performance including storage IO, network bandwidth, CPU, memory, and endurance constraints.
Develop APIs, self service platforms, and automation and tools so researchers and engineers can deploy and monitor workloads at scale.
Troubleshoot complex infrastructure issues across OS, drivers, hardware, storage systems (local NVMe, block storage, NFS), networking, namespace isolation, and cloud or hybrid environments.
Produce clean, documented code and developer workflows, and collaborate with SRE and security teams to ensure safe, reliable, and self serviceable compute offerings.
What we are looking for
Strong software engineering background (C, C++, Go, Rust, or similar systems languages).
Experience designing or operating sandboxed or isolated execution environments (namespaces, cgroups, container runtime internals), or strong interest in this area.
Experience building or operating distributed systems or parallel processing frameworks (scatter aggregate processing, worker pools, multi thread and multi process coordination, shared memory, atomics, merging strategies).
Solid understanding of storage and IO subsystems (NVMe, SSD endurance, write amplification), network performance, CPU and memory resource constraints in high performance compute clusters.
Comfortable working on low level systems (OS, threading, memory management, synchronization) as well as higher level orchestration or automation.
Experience with cloud infrastructure (GCP, AWS, Azure, etc.) including IaC tools such as OpenTofu, Terraform, Pulumi, or CDK is a plus.
Intellectual curiosity, strong ownership, and the ability to make tradeoffs in ambiguous environments such as latency versus throughput and isolation versus performance.
Nice to haves
Prior experience with GPU scheduling, RDMA networking, or bare metal HPC clusters
Contributions to open source container runtimes or sandboxing frameworks
Experience with kernel internals, device drivers, or SSD and NVMe endurance modeling
Familiarity with Rust for systems programming or Go for infrastructure orchestration
Why join us
You will work at the cutting edge of AI infrastructure including large compute clusters, advanced metrics engines, and next generation sandboxing systems for untrusted workloads.
The problems you solve will be foundational, for example how to securely and efficiently run arbitrary research code across thousands of GPUs or high end SSDs.
You will join a collaborative and hands-on team where you are building rather than only modeling.
Excellent compensation and equity, generous benefits, and high impact.
Our culture:
Integrity. Words and actions should be aligned
Hands-on. At Magic, everyone is building
Teamwork. We move as one team, not
N
individuals
Focus. Safely deploy AGI. Everything else is noise
Quality. Magic should feel like magic
Compensation and benefits (US)
Annual salary range: 200,000 USD to 550,000 USD depending on seniority
Significant equity component
401(k) with matching, comprehensive health, dental, and vision insurance, unlimited paid time off, visa sponsorship and relocation support
Fast paced, mission driven environment focused on safely advancing AGI for humanity
Auto-ApplySecurity Engineer, Operating Systems
Security architect job in San Francisco, CA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-Apply