Systems Engineer - Systems Engineer II
Security engineer job in Bellevue, WA
We're seeking a hybrid SDE + Systems Engineer profile
The successful engineer in this role will:
Understand how commodity servers, operating systems and networks function, perform and scale.
Possess superb troubleshooting, project management and problem analysis skills.
Drive technical innovation and efficiency in infrastructure operations via automation.
Design server monitoring and management solutions using automation and self-repair.
Create processes that enhance operational workflow and provide positive customer impact.
Dive deep to resolve problems at their root, looking for failure patterns amenable to long-term solutions via simplification and automation.
Avoid re-inventing the wheel and prefer appropriately simple, repeatable solutions over more complex and failure prone ones.
Recognize and adopt best practices in documentation, testing, security, operational support at scale, and efficient use of resources.
Develop appropriate metrics to demonstrate performance at improving operational efficiency.
Core Requirements:
In depth knowledge of & experience deploying and operating Linux or other UNIX variants in a datacenter environment.
Relentless passion for frugality and out-of-the-box engineering.
Strong system troubleshooting skills.
Proficiency and experience in automation via Perl/Python programming and shell scripting.
Good understanding of standard internet protocols (Ethernet, ARP, IP, ICMP, UDP, TCP, SSL, DNS, HTTP, etc.)
Demonstrable grasp of security best practices in server configuration, tool development, and access controls.
Experience in building SQL queries.
Typical Task Breakdown:
Understand how commodity servers, operating systems and networks function, perform and scale.
Possess superb troubleshooting, project management and problem analysis skills.
Drive technical innovation and efficiency in infrastructure operations via automation.
Design server monitoring and management solutions using automation and self-repair.
Create processes that enhance operational workflow and provide positive customer impact.
Dive deep to resolve problems at their root, looking for failure patterns amenable to long-term solutions via simplification and automation.
Avoid re-inventing the wheel and prefer appropriately simple, repeatable solutions over more complex and failure prone ones.
Recognize and adopt best practices in documentation, testing, security, operational support at scale, and efficient use of resources.
Develop appropriate metrics to demonstrate performance at improving operational efficiency.
Degrees / Certs and/or Experience Required:
In depth knowledge of & experience deploying and operating Linux or other UNIX variants in a datacenter environment.
Relentless passion for frugality and out-of-the-box engineering.
Strong system troubleshooting skills.
Proficiency and experience in automation via Perl/Python programming and shell scripting.
Good understanding of standard internet protocols (Ethernet, ARP, IP, ICMP, UDP, TCP, SSL, DNS, HTTP, etc.)
Demonstrable grasp of security best practices in server configuration, tool development, and access controls.
Experience in building SQL queries.
Preferred Qualifications:
Knowledge of C, C++ or Java.
Knowledge of VCS (git, mercurial, svn).
Understanding of AWS technologies.
Experience deploying or managing servers in large-scale, geographically diverse environments.
Understanding & experience of managing and monitoring large scale disk sub-systems.
Operational knowledge of common enterprise switching and routing platforms
About US Tech Solutions:
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit ************************
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Recruiter Details:
Name: Shweta
Email: ***********************************
Internal Id: 25-54454
Systems Engineer III: 25-07001
Security engineer job in Bellevue, WA
Primary Skills: Electrical-Mechanical (Expert), Control Engineering (Expert), PLC Programming (Expert), Industrial Networking (Advanced), Automation Systems (Advanced) Contract Type: W2 Only Duration: 11 Months with Possible Extension
Pay Range: $70.00 - $79.00 per hour
#LP
Job Summary:
We are seeking a Systems Engineer III to join our AFT business group to work on crucial projects, focusing on automation and control systems within our operations. The ideal candidate will be responsible for working independently to deliver high-quality, cross-functional projects on time and within budget, and will be instrumental in managing material handling or automation projects from design through execution. This role is fully onsite in Bellevue, WA, with a possibility of domestic travel up to 20%.
Key Responsibilities:
Partner with project managers and external vendors to set priorities, establish milestones, and drive schedules.
Influence technical documentation, perform reviews, and provide detailed project summaries.
Develop working relationships with vendors, engineers, managers, and peers across multiple sites.
Manage change orders, purchase orders, and invoicing to support execution efforts.
Lead process improvement initiatives in support of operations teams.
Must-Have Skills:
Solid electrical mechanical skills for hardware system support.
Proficiency in PLC programming and understanding of electrical diagrams.
Hands-on ability in building and disassembling hardware systems, with a capability of interpreting electrical diagrams.
Industry Experience Required:
Experience in automation, deploying, and supporting large-scale infrastructure.
Familiarity with CI/CD pipelines and basic coding skills in modern PLC programming languages preferred.
Previous experience in an operations management/distribution center environment is a plus.
ABOUT AKRAYA
Akraya is an award-winning IT staffing firm consistently recognized for our commitment to excellence and a thriving work environment. Most recently, we were recognized Inc's Best Workplaces 2024 and Silicon Valley's Best Places to Work by the San Francisco Business Journal (2024) and Glassdoor's Best Places to Work (2023 & 2022)!
Industry Leaders in IT Staffing
As staffing solutions providers for Fortune 100 companies, Akraya's industry recognitions solidify our leadership position in the IT staffing space. We don't just connect you with great jobs, we connect you with a workplace that inspires!
Join Akraya Today!
Let us lead you to your dream career and experience the Akraya difference. Browse our open positions and join our team!
Offensive Security Researcher
Security engineer job in Seattle, WA
NVIDIA is looking for security researchers passionate about offensive research across different platforms. Do you have experience with identifying hardware and software vulnerabilities, developing PoC, and tools for automation in vulnerability research? Are you creative and devious in your offensive approach? We want to hear from you!
You should demonstrate ability to excel in an environment with innovative and fast paced development on the worlds most powerful integrated software and hardware computing platform.
What you'll be doing:
* Core job duties will identify vulnerabilities in our embedded firmware and critical system software, building proof of concepts, and collaborating with development teams to remediate them.
* Candidates will invest in improving current tools and offensive practices for bug discovery and evaluation while supporting remediation efforts. We expect team members to exercise modern tools for modeling new attack vectors on unreleased and emerging technology platforms.
* The most impactful candidates can simulate real attacker behaviors, break systems by exploiting design assumption and effectively communicate their findings for action. Focus will be to increase resilience of the end products against all forms of attack through close collaboration with extended SW and HW offensive security teams.
* Products targets span HPC data centers, consumer electronics, autonomous platforms, AI/cloud solutions, and a variety of embedded/IOT platforms providing a rich and complex target space to exercise your skills.
What we need to see:
* We'd like to see proven experience and offensive security research (CVE's, publications, patents, tools, bounties) with demonstrated responsible disclosure practices.
* Strong skills in reverse engineering and automation (IDA, Ghidra), fuzzing (AFL, WinAFL, Syzcaller) and exploitation (ROP, memory corruption) are important to success; as well as understanding of modern embedded cryptography and common security issues.
* Experience with ARM/X86/RISCV assembly (include shellcode development) and low-level C programming paired with understanding and experience with micro-architectural attacks (side channels, fault injection, etc) is critical.
* Demonstrated skill for secure code reviews of complex source projects, and exposure to code quality practices (SDL, threat modeling) that support development goals.
* Candidates should be comfortable working collaboratively and remotely with others to accomplish complex team goals, enabling delivery of outstanding security for our products.
* BS/BA degree or equivalent experience
* 12+ years in a security related field
Ways to stand out from the crowd:
* Navigating complex platform concerns and ability to analyze composed systems to identify high risk components and established testing targets and objectives.
* Practical skills using Hex-Rays IDA Pro and plugin/loaders development (or similar experience with Ghidra) is valuable
* Leveraging innovative strategies and AI advancements to accelerate discovery and resolution of security risks.
* Experience with enclave models such as NVIDIA CC, ARM TEE, Intel SGX/TDX, AMD SEV-SNP and other isolation technologies.
* Development and integration of AI tooling and skills to accelerate and improve activities and or experience with offensive actions targeting AI models (LLM or other) components within those platforms.
NVIDIA has continuously reinvented itself over two decades. Our invention of the GPU in 1999 fueled the growth of the PC gaming market, redefined modern computer graphics, and revolutionized parallel computing. More recently, GPU deep learning ignited modern AI - the next era of computing. NVIDIA is a "learning machine" that constantly evolves by adapting to new opportunities that are hard to solve, that only we can pursue, and that matter to the world. This is our life's work, to amplify creativity and intelligence. Make the choice to join us today!
Your base salary will be determined based on your location, experience, and the pay of employees in similar positions. The base salary range is 224,000 USD - 356,500 USD for Level 5, and 272,000 USD - 425,500 USD for Level 6.
You will also be eligible for equity and benefits.
Applications for this job will be accepted at least until October 5, 2025.
NVIDIA is committed to fostering a diverse work environment and proud to be an equal opportunity employer. As we highly value diversity in our current and future employees, we do not discriminate (including in our hiring and promotion practices) on the basis of race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law.
Auto-ApplyCyber Security Analyst - Full time must include working one weekend day (Sunday)
Security engineer job in Washington
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Event Security, Security Audit, Splunk (Inactive)
Certifications:
None
Experience:
8 + years of related experience
US Citizenship Required:
Yes
Job Description:
Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday)
Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow.
At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT
Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information.
Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations.
Identify acceptable use policy infractions.
Review event logs to determine events of interest.
Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).
Prepare case evidence and incident reports.
Work on special projects as assigned.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.
DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date.
DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date.
Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph
Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems
Saturday and Sunday weekend Day Shift work required.
Willing to work holidays supporting your assigned shift.
Location: 100% On Customer Site
Bolling AFB, Washington D.C.
Reston, VA
Colorado Springs, CO
Riverdale, MD
Pearl Harbor, HI
Tampa is available for part time weekend only support
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
Less than 10%
Telecommuting Options:
Onsite
Work Location:
USA DC Washington
Additional Work Locations:
USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplySenior Manual Ethical Hacker
Security engineer job in Seattle, WA
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank's applications to malicious hacking activity.
This senior technical role is responsible performing and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. These individuals are expected to perform application security-oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code.
Key Responsibilities in order of importance:
* Perform assigned analysis of internal and external threats on information systems and predict future threat behavior.
* Incorporate threat actors' tactics, techniques, and procedures into offensive security testing to identify high-value vulnerabilities/chained attacks.
* Developing Proof-of-concepts for exploitation.
* Perform assessments of the security, effectiveness, and practicality of multiple technology systems.
* Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
* Prepare and present detailed technical information for various media including documents, reports, and notifications.
* Provide clear and practical advice regarding managing risks.
* Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills.
* Respond to security incidents and provide technical assistance to leadership across the Information Security organization.
Required Skills:
* Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
* Detailed technical knowledge in at least 5 of the following areas:
* security engineering
* application architecture
* authentication and security protocols
* application session management
* applied cryptography
* common communication protocols
* mobile frameworks
* single sign-on technologies
* exploit automation platforms
* Web APIs
* Cloud environments
* LLM security
* Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
* Experience performing manual web application assessments i.e., must be able to simulate a OWASP Top 10 vulnerabilities without the use of tools
* Experience performing manual code reviews for security relevant issues
* Experience working with DAST and SAST tools to identify vulnerabilities
* Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
* Experience with vulnerability assessment tools and penetration testing techniques.
* Solid programming/debugging skills, development frameworks, CVE and CWE research/reproduction
* Threat Analysis, threat modelling and SBOM analysis
* Innovative thinking, threat actor simulation
* Technology Systems Assessment
* Technical Documentation
* Advisory
Desired:
* CEH, OSCP/OSCE/OSWE/GXPN/GPEN/GWAPT/GMOB/All Practitioner Certs [Port Swigger BSP Academy]/Cloud Cert(s)/ eWPT; eWPTX; eMAPT [INE Pentester Academy]
* Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)
Hours Per Week:
40
Security Engineer
Security engineer job in Seattle, WA
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides technical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Title:
Security Engineer/ System Security Engineer
Location:
Seattle WA
Duration:
12 Months (Chances for extension)
Job Description:
Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise.
Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).
Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses.
Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.
Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for security related issues.
Educates IT and the business about security policies and consults on security issues regarding user built/managed systems.
Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues.
Must have extensive knowledge in networking, databases, systems and/or Web operations.
More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.
Bachelor's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
Typically has 3 - 6 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, database design and administration; 3+ years of experience with information security.
Requires knowledge of security issues, techniques and implications across all existing computer platforms.
Position Comments: This is a security jack of all trades that will help with hardware patching, web app security, policy, RFP response, audits, facility security, etc.
Additional Skill: Linux experience required MPAA, Privacy Shield or Safe Harbour experience a plus
Additional Information
For more information, Please contact
Pankhuri Razada
Associate Recruiter
Artech information Systems LLC
360 Mt. Kemble Avenue, Suite 2000 Morristown, NJ 07960
************
[email protected]
om
Security Engineer -Level L2
Security engineer job in Bellevue, WA
Arete Technologies, Inc. offers set of innovative Consulting and Outsourcing services, bridging the gap between requirements and outputs of various dexterous and facile companies worldwide. The thrust of providing global deliverables with focus on providing paramount and unsurpassed services combined with cost saving solutions to the clients
We understand the business requirements in the present day corporate scenario and aspire to provide world-class services enabling the organization to burgeon and flourish while keeping the work-life balance intact. The Global delivery mechanism followed at Arete Technologies, Inc. saddles proficient schemas and unconventional channels to provide one-stop solutions for all your workforce needs.
our Team is an exquisite amalgamation of vast experiences of over 30 years in IT Consulting and Staffing industry. Connoisseurs in the field of staff augmentation for IT, we operate on 24 by 7 model with an aim of providing affordable and adept professionals with an assurance of satisfaction for both Consultants and Clients.
We are pre-eminent service providers in the field of staff augmentation, IT Consultancy, Software development, Web Development providing unexcelled services and focusing on both the employers and employees.
L2: Job Description
Resource should be able to perform security assessments of different IT functional areas (e.g., applications, systems, network and/or Web) in conformance with industry wide best practices. He should be able to work on multiple projects as a team member and make assessment reports on different standards.
He should work cohesively with senior team members
to gathera full understanding of projectscope and business requirements.
Responsibility & technical skills
: -
Participate in security planning and analyst activities.
Performs security assessments andsecurity attestations.
Participates in security investigations and compliancereviews as requested.
Make security analysis reports for security vulnerabilities and recommends feasible andappropriate options.
Evaluate all design documentations and perform design assessments to ensure appropriate security controls are implemented within designs.
Additional Information
Best Regards
Alka Bhatia
Cyber Security Analyst
Security engineer job in Seattle, WA
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplyEnterprise Security Engineer
Security engineer job in Seattle, WA
About the Team Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions. As an Enterprise Security Engineer, you will work in a highly technical and employee-focused environment.
Our IT team is a small and nimble team, where you'll have the opportunity to dive into a wide breadth of areas and build from the ground up. We're well supported and well resourced, and have a mandate to deliver a world-class enterprise security program to our teams.
About the Role
As an Enterprise Security Engineer, you will be responsible for implementing and managing the security of OpenAI's internal information systems' infrastructure and processes. You will work closely with our IT and Security teams to develop security capabilities, enforce security policies, and monitor internal systems for security threats.
This role is open to remote employees, or relocation assistance is available to Seattle.
In this role, you will:
* Develop and implement security measures to protect our company's information assets against unauthorized access, disclosure, or misuse.
* Monitor internal and external systems for security threats and respond to alerts.
* Contribute to and enforce our company's IT and Security policies and procedures.
* Work closely with our IT department to harden our infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling.
* Advise our employees on best practices for maintaining the security of their endpoints, and office AV and network infrastructure.
* Devise novel sharing controls and associated monitoring to protect company data, including intelligent groups management, Data Loss Prevention (DLP) and other security controls as appropriate.
* Employ forward-thinking models like "secure by default" and "zero trust" to create sustainably secure environments for knowledge workers and developers.
* Identify and remediate vulnerabilities in our internal systems, adhering to best practices for data security.
* Use our own AI-driven models to develop systems for improved security detection and response, data classification, and other security-related tasks.
* Educate employees on the importance of data security, and advise them on best practices for maintaining a secure environment.
* Contribute to OpenAI's endpoint and cloud security roadmaps by staying up to date with the latest security threats, and making recommendations for improving our security posture.
You might thrive in this role if you have:
* Experience in protecting and managing mac OS fleets.
* Experience deploying and managing endpoint security solutions (e.g. management frameworks, EDR tools).
* Experience with public cloud service providers (e.g. Amazon AWS, Microsoft Azure).
* Experience with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM.
* Experience with e-mail security protocols (e.g. SPF, DKIM, DMARC) and controls.
* Intermediate or advanced proficiency with a scripting language (e.g. Python, Bash, or similar).
* Knowledge of modern adversary tactics, techniques, and procedures.
* Ability to empathize and collaborate with colleagues, independently manage and run projects, and prioritize efforts for risk reduction.
.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's Affirmative Action and Equal Employment Opportunity Policy Statement.
Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
Security Engineer
Security engineer job in Federal Way, WA
* Bot Attacks Analytics. Akamai hands on experience. * Experience on security tools like OWASP ZAP, Burp Suite, Nessus, or others. Roles & Responsibilities: * Analyze Bot Attacks: Independently analyze and respond to bot attacks in real-time, ensuring minimal disruption to our services.
* Pattern Analysis: Identify and analyze attack patterns using Akamai, security logs, and other tools. Query data across various systems to gain comprehensive insights into attack vectors.
* Technical Expertise: Utilize your deep understanding of e-commerce applications to contribute to the design and implementation of security features on our platform.
* SRE Practices: Apply Site Reliability Engineering (SRE) principles to enhance the reliability, scalability, and security of our infrastructure.
* Technology Proficiency: Work with technologies such as Java, Python, SQL. work with monitoring tools like Dataset (centralized logging) and New Relic (observability)
* Continuous Learning: Stay updated with the latest security trends, SRE practices, and technologies. Be willing to learn and implement new tools and techniques.
* Analytical Skills: Employ strong analytical skills to dissect complex security issues and develop effective mitigation strategies. Create detailed reports and alerts based on system logs and data analysis.
* Security Assessment: Conduct thorough security assessments to identify potential vulnerabilities in our features and infrastructure. Propose and drive conversations on necessary feature changes to enhance security.
* Vendor Collaboration: Lead discussions with vendors like Akamai and Riskified, ensuring that we leverage their solutions effectively to bolster our security posture.
TCS Employee Benefits Summary:
* Discretionary Annual Incentive.
* Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans.
* Family Support: Maternal & Parental Leaves.
* Insurance Options: Auto & Home Insurance, Identity Theft Protection.
* Convenience & Professional Growth: Commute r Benefits & Certification & Training Reimbursement.
* Time Off: Vacation, Time Off, Sick Leave & Holidays.
* Legal & Financial Assistance: Legal Assistance, 401K Plan, Performance Bonus, College Fund, Student Loan Refinancing.
# LI-RJ2
Salary Range - $100,000-$125,000 a year
Security Engineer
Security engineer job in Seattle, WA
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
Join a team using leading edge security technology and processes to protect the F5 enterprise
and product environment. The Security Engineer position will execute strategic processes
and implement technical solutions to enable our information security program and address day-to-day security challenges amidst the industry's evolving technology landscape.
Primary Responsibilities
Build and implement new security controls, processes and tools.
Identify organizational risks to confidentiality, integrity, and availability, and determine appropriate mitigations.
Leverage native Azure, GCP, and AWS cloud services to automate and improve existing security and control activities.
Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats.
Perform technical security assessments against product and enterprise cloud hosted, virtual, and on-premise systems including static and dynamic analysis, and threat modeling.
Review and test changes to services, applications, and networks for potential security impacts.
Collaborate with Architecture, Site Reliability Engineering and Operations teams to develop and implement technical solutions and security standards.
Stay abreast on security best practices and secure design principles.
Review changes to and ongoing operations of enterpise environments and supporting systems for security and compliance impacts.
Assist in incident detection and response efforts.
Implement zero-trust patterns with cloud agnostic tools to support enterprise business units.
Implement, design, develop, administer, and manage enterprise security tooling.
Knowledge, Skills and Abilities
Experience working with high-availability enterprise production environments
Familiarity with scripting languages (e.g., (Go, Python, Ruby, Rust,etc.). and building scripts for process improvements
Experience automating security testing and reporting outputs
Technical knowledge and hands-on experience with security and networking security, basic networking protocols, cloud security, network security design, intrusion prevention/detection, and firewall architecture
Experience assessing and implementing technical security controls
Willingness to innovate and learn new technologies
Excellent interpersonal and relationship skills with a collaborative mindset
Knowledge or familiarity with technological stack (Big-IP, Azure, AWS, GCP, CentOS, Hashicorp Vault, Palo Alto, Qualys).
Experience with network and application vulnerability and penetration testing tools.
Baseline competency in administration of Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) or equivalent public cloud infrastructure.
Exposure to DevOps tooling, CI/CD pipelines, container orchestration, and infrastructure as code approach (e.g. Puppet, Chef, Ansible, Terraform, Jenkins, CircleCI, Artifactory, Git)
Strong written and verbal cowimmunication skills.
Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance and professionalism.
Agile, tactful, and proactive attitude that can manage prioritization and know when to escalate.
Qualifications
B.S. or M.S. in Computer Science, Engineering, or related field, or equivalent experience.
3+ years of relevant security and networking experience
LI-KT1
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
The annual base pay for this position is: $120,000.00 - $180,000.00
F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change.
You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link:
*******************************************
. F5 reserves the right to change or terminate any benefit plan without notice.
Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com).
Equal Employment Opportunity
It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Auto-ApplyInformation Security Analyst I
Security engineer job in Portland, OR
TITLE: N/A JOB CODE: FLSA: Exempt SALARY GRADE: 7 CATEGORY: Full-time UNION REPRESENTATION: NA SCHEDULE: Hybrid SUPERVISORY ROLE Y/N: 11.2025 The Information Security Analyst I plays a critical role in safeguarding the organization's systems and information assets. This position supports the development and implementation of security strategies, tools, and guidelines to protect against unauthorized access, data breaches, and system disruptions.
Responsibilities include monitoring and responding to Information Security-related alerts, supporting audit and risk assessment activities, evaluating internal controls, and recommending improvements to enhance security posture.
The analyst assists in migrating non-compliant environments to meet regulatory standards and ensures adherence to data protection laws and banking industry compliance requirements. This role is foundational to maintaining the confidentiality, integrity, and availability of sensitive financial data and supporting the organization's overall cybersecurity framework.
ESSENTIAL DUTIES
Identity and Access Management
Support access provisioning, modification, and termination processes to ensure timely and secure access control.
Conduct administrator activity and user access reviews across IT systems, including privileged access audits and firewall/cloud app usage monitoring.
Maintain asset and access inventories, perform recurring audits of critical systems, and reconcile against endpoint and network tools.
Security Monitoring and Incident Response
Monitor and respond to alerts from SIEM, IDS, firewalls, and endpoint protection systems.
Conduct vulnerability scans, track remediation efforts, and facilitate related meetings.
Maintain readiness for incident response activation, including participation in tabletop exercises.
System Administration and Tool Management
Administration of cloud computing environments, conditional access, and guest provisioning following established best practices.
Manage software controls, browser extensions, and patching processes.
Administer security camera system and ensure system uptime.
Administer Mobile Device Management system.
Threat Intelligence and Continuous Improvement
Stay informed on emerging threats in the banking sector and contribute to threat intelligence reporting.
Research and test new security tools, controls, and AI applications to enhance the Bank's security posture.
Correctly identify true and false positives in alerting systems and tune these systems for continuous improvement.
Security Awareness and Training
Support phishing simulations and training campaigns, track completion, and report metrics to management.
Documentation and Reporting
Log findings, remediation efforts, and audit results in a structured ticketing system.
Assist with vendor management program administration and reporting.
Data Protection and Compliance
Ensure compliance with GLBA, FFIEC, and other applicable regulations through log retention, configuration management oversight, and DLP monitoring.
Administer data classification tools and respond to violations involving PII or sensitive data.
Audit VPN usage and test controls across email, endpoint, and network security platforms.
Completes mandatory compliance training in accordance with established deadlines.
The position performs duties specific to the position and other functions as assigned.
ROLE COMPETENCIES/SKILLS
Attention to Detail
Collaboration & Communication
Diversity & Inclusion
Execution & Ownership
Time Management
Compliance
Innovation
Systems Thinking
Data Analysis & Management
Information Security
Network Operations
Critical Thinking
Consulting
Analytical Thinking
ENVIRONMENT, PHYSICAL & MENTAL ACTIVITIES
The incumbent is in a non-confined office-type setting in which they are free to move about at will. It may include some minor annoyances such as noise, odors, drafts, etc. For Hybrid and Remote roles, work may also be performed away from BSB worksites depending on the position and requirements. For Hybrid/Remote work, employees are required to have an environment when working at home that has a dependable, high-speed internet connection and environment conducive to frequent phone or internet calls where private, confidential or other information is not visible, able to be overheard, or physically or electronically accessible to anyone else.
The incumbent in the course of performing this position spends time writing, typing, speaking, listening, lifting (up to 10 pounds), driving, carrying, seeing (such as close, color and peripheral vision, depth perception and adjusted focus), sitting, pulling, walking, standing, squatting, kneeling and reaching.
The incumbent for this position may operate any or all of the following: personal computer, cellular telephone, printer, fax, and other standard office equipment.
The incumbent in this position must be able to accommodate reading documents or instruments, detailed work, problem solving, customer contact, reasoning, math, language, presentations, verbal and written communication, analytical reasoning, stress, multiple concurrent tasks and constant interruptions.
The work environment characteristics, physical and mental demands described here are representative of those an employee encounters while performing the essential functions of this job.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
POSITION REQUIREMENTS
Minimum Qualifications
Bachelor's degree in Information Technology, Cybersecurity, or a related field, or equivalent combination of education and experience.
5 years of professional experience in IT support or related technical roles.
Foundational understanding of cybersecurity principles, including access control, endpoint protection, and network monitoring.
Familiarity with Microsoft 365, Active Directory, and basic system administration tasks.
Ability to conduct audits, manage tickets, and document findings accurately.
Strong analytical and troubleshooting skills.
Effective communication skills and ability to collaborate across departments.
Preferred Qualifications
Bachelor's degree in Information Technology, Cybersecurity, or a related field.
Experience with banking industry compliance standards (e.g., GLBA, FFIEC).
Hands-on experience with security tools such as SIEM, DLP, IDS/IPS, EDR, Email Filtering, and Firewalls.
Exposure to vulnerability management platforms and identity/access management processes.
Familiarity with Microsoft cloud services and Mobile Device Management.
Experience supporting or administering phishing simulations, security awareness programs, or similar efforts.
Knowledge of vendor management platforms and data classification tools.
Management reserves the right to change this position description at any time according to business needs. #LI_Hybrid
Network Security Consultant
Security engineer job in Oregon
McAfee, Microsoft, Cisco AMP, Cylance, DLP, SIEM, WAF, Palo Alto, Tufin , F5, Cisco ISE, Jump Servers, Segmentation
Job Description:-
• 7 to 8 Years' Experience in End Point Protection, Data Protection, Network Security, Network Segmentation, Application Security
• Experience in in Architecture, Design, and Configuration of Network Security Tools - Firewall, Intrusion Prevention, Proxy
• Experience in Architecture, Design, and Configuration of Network Security Tools - Firewall, Intrusion Prevention, Proxy
• Experience in Security Transformation Projects - Design, Document, Build, Transition. SDLC Documentation
• Strong Security credentials with certifications like Security +, CISSP, SANS certification
• Good understanding on the Infra security architecture, Experience in engineering infra security solutions
• Strong oral and written English communications skill ITM Lead and responsible for managing customer expectations and implementation of security solution
Security Engineer, Operating Systems
Security engineer job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyInformation Security Specialist (Cyber security analysis)
Security engineer job in Bellevue, WA
Job Title: “Information Security Specialist” (Cyber security analysis)
Duration: 9+ Months (with high possibility of extending into full time)
Job Description:
This position is in Corporate Information Security and under the direction of the Manager, Third-Party Cybersecurity Assessments. The Cybersecurity Assessment Analyst will perform cybersecurity assessments on new and existing third parties. The Analyst will construct detailed and summary reports of assessments, including customized reports, as needed. The Analyst will work with Subject Matter Experts (SME) to develop and apply risk assessment criteria (aligned with Policy) to new and existing suppliers using internal and external business intelligence. The Analyst will work with Third-Party Risk Management, Privacy and Legal Counsel, Procurement and Contract Managers, Compliance, and Business Owners to develop and maintain an internal service model that informs the business of key risks in a timely manner to limit unnecessary impediments and avoid bureaucracy.
Specific responsibilities:
- Coordinate the development of information security policies, standards and procedures. Work with key IT offices, data custodians and governance groups in the development of such policies. Ensure that company policies support compliance with external requirements. Oversee the dissemination of policies, standards and procedures to the user community
- Coordinate the development and delivery of an education and training program on information security and privacy matters for employees, other authorized users, and vendors
- Serve as the company compliance officer with respect to state and federal information security policies and regulations. Work with the -designated internal audit, SOX compliance, legal, and HR on compliance issues as necessary. Prepare and submit and submit required reports to external agencies.
- Develop and implement an Incident Reporting and Response System to address security incidents (breaches), respond to alleged policy violations, or complaints from external parties.
- Serve as the official company contact point for information security, privacy and copyright infringement incidents, including relationships with law enforcement entities.
- Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing.
Required Qualifications:
Talent management, results focus and inspirational leadership.
Essential Functions
• Conduct third-party cybersecurity risk assessments, applying established criteria
• Support assessment team with quality assurance reviews over work product and reporting
• Collaborate with internal partners and third parties to mitigate and otherwise resolve third-party cyber risks
• Consistently deliver on commitments, deadlines and objectives while remaining in scope and leveraging appropriate tools, methods, frameworks, and professional standards
• Demonstrate consistent credibility with business partners and leadership while recommending initiatives, identifying gaps, and potential issues
• Continuously demonstrate the ability to work independently while representing the services of the department with the highest level of professionalism
• Demonstrate the ability to appropriately influence business decisions, and the professional judgment for selecting the appropriate methods and techniques to do so
Preferred Qualifications:
• Solid background both educationally and via professional experience. No less than 3 years' professional experience in business operations, project/program management, finance, risk management, information security, business analytics or similar.
• Experience in large companies and/or complex environments, or providing professional consulting services for them.
• Demonstrated abilities in problem-solving and analysis: identifies issues, analyses information to assess root cause and relationships, risks, and potential risk responses. Proven ability to synthesize and summarize complex data into concise recommendations and reports.
• Demonstrated strong business writing and professional oral communication skills.
• Proven ability to balance multiple priorities, adapt to a constantly changing business environment, work independently, drive projects to completion, and meet deadlines in a fast-paced environment-with only periodic supervision.
• Ability to work collaboratively and manage and initiate effective cross-functional relationships.
• Strong computer skills, including MS Office products (e.g. Word, Excel, PowerPoint, Visio) and other business software to prepare reports, memos, summaries, and analyses.
Desired
• Analytical - Synthesizes complex or diverse information; Collects and researches data; employs intuition and experience to complement data; Designs work flows and procedures.
• Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness. Applies feedback to improve performance; Monitors own work to ensure quality
• Planning/Organizing - Prioritizes and plans work activities to achieve success; Sets and achieves goals and objectives; Develops realistic action plans
• Professionalism - Reacts well under pressure; Keeps commitments; Accepts responsibility for own actions.
• Career Growth: Focus on cyber security auditing with potential advancement goals in engineering or threat analysis roles
• Self-directed team player with Agile environment experience
Education
Minimum Required
• Bachelor's Degree
• Equivalent experience is acceptable.
License or Certification
Desired: (one of the following):
CISA (Certified Information Systems Auditor)
GSEC (GIAC Security Essentials Certification)
CompTIA - Security+
ECSA - EC-Council Certified Security Analyst
SSCP (Systems Security Certified Practitioner)
Other:
Six Sigma, PMP or Agile certificates
Other comments - suppliers:
Organizational skills; office suite knowledge; and good communication skills are “must haves”. Cyber security analysis experience is preferred.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Compliance Specialist
Security engineer job in Washington
Responsibilities:
Conduct Security Assessment and Authorization (A&A) support for IT systems
Conduct Security A&A documentation review
Update IT Security Compliance SOPs
Monitor and report on FISMA Compliance activities
Conduct Plan of Action and Milestone (POA&M) management and quality control activities and ensure accuracy of the organization's Security A&A tool.
Support Ongoing Authorization (OA) by review of the security controls
Working Place: Washington D.C., District of Columbia, United States Company : Sept 25 - Tria
Systems Engineer II: 25-07191
Security engineer job in Bellevue, WA
Primary Skills: AWS (Proficient), Python OR Java (Expert), Infrastructure-as-Code (Intermediate), CICD (Proficient), System Design (Proficient) Contract Type: W2 Only Duration: 11+ Months with possibility of extension Pay Range: $65.00-$70.00 per hour
#LP
Job Summary:
We're seeking an experienced Hybrid Systems Development Engineer to join our Field Operations Returns & ReCommerce team. This role combines software development and systems engineering to build and manage our AWS-based infrastructure and operational workflows. The ideal candidate will drive technical innovation and efficiency through automation, enhance operational workflows, and develop solutions to improve system performance and reliability.
Key Responsibilities:
Design and optimize AWS Step Functions, Lambda, and ECS-based systems for auction and liquidation workflows.
Drive automation solutions to resolve operational bottlenecks and reduce ticket resolution time.
Implement monitoring, alerting, and self-healing capabilities for distributed AWS services.
Lead compliance remediation efforts, including TA Token migration across applications.
Develop infrastructure-as-code solutions using AWS CDK/CloudFormation for pipeline migrations.
Must-Have Skills:
Strong proficiency in Python/Java with a focus on serverless and containerized applications.
Experience with Infrastructure-as-Code (CDK, CloudFormation, Terraform).
Experience with AWS services (Step Functions, Lambda, ECS, RDS, DynamoDB, SQS/SNS).
Strong system design skills for distributed, event-driven architectures
Experience with CI/CD pipelines, automated testing, and deployment strategies
Domain Experience:
Prior experience in large-scale, geographically diverse environments is highly desirable.
Understanding of AWS technologies and best security practices within AWS infrastructure.
ABOUT AKRAYA
Akraya is an award-winning IT staffing firm consistently recognized for our commitment to excellence and a thriving work environment. Most recently, we were recognized Inc's Best Workplaces 2024 and Silicon Valley's Best Places to Work by the San Francisco Business Journal (2024) and Glassdoor's Best Places to Work (2023 & 2022)!
Industry Leaders in IT Staffing
As staffing solutions providers for Fortune 100 companies, Akraya's industry recognitions solidify our leadership position in the IT staffing space. We don't just connect you with great jobs, we connect you with a workplace that inspires!
Join Akraya Today!
Let us lead you to your dream career and experience the Akraya difference. Browse our open positions and join our team!
Manual Ethical Hacker
Security engineer job in Seattle, WA
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
* Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
* Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
* Perform assessments of the security, effectiveness, and practicality of multiple technology systems
* Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
* Prepare and present detailed technical information for various media including documents, reports, and notifications
* Provide clear and practical advice regarding managed risks
* Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
* Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
* Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
* SQL injection/XSS attack without the use of tools
* Experience performing manual code reviews for security relevant issues
* Experience working with SAST tools to identify vulnerabilities
* Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
* Experience performing manual web application assessments i.e., must be able to simulate a
* Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
* Experience with vulnerability assessment tools and penetration testing techniques
* Solid programming/debugging skills
* Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
* Threat Analysis
* Innovative Thinking
* Technology Systems Assessment
* Technical Documentation
* Advisory
Desired:
* CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
* Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)
Hours Per Week:
40
Information Security Analyst
Security engineer job in Bellevue, WA
Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients.
Visit our website: http://www.aditistaffing.com/
Job Description
Role: Information Security Analyst
Location: Information Security Analyst
6-8 years of experience in information security / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups.
Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established.
While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the information security and privacy program.
Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls.
Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines.
Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls).
Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required.
Good to Have:
Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems
Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools
Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus
Experience in developing and administering an information security program desirable
Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable
Additional Information
Regards,
Arun Kumar R
arunkr(AT)aditistaffing.com
D: 425-457-7916
Information Security Compliance Specialist
Security engineer job in Washington
Responsibilities:
Conduct Security Assessment and Authorization (A&A) support for IT systems
Conduct Security A&A documentation review
Update IT Security Compliance SOPs
Monitor and report on FISMA Compliance activities
Conduct Plan of Action and Milestone (POA&M) management and quality control activities and ensure accuracy of the organization's Security A&A tool.
Support Ongoing Authorization (OA) by review of the security controls
The Need-to-Have Skills & Qualifications:
Working knowledge and experience with CSAM and RMF
Experience working with system stakeholders to assess and manage system cybersecurity risk
Knowledge of the process to obtain a system ATO and requirements to maintain the ATO
Working Place: Washington, D.C., District of Columbia, United States Company : Sept 25 - Tria