A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
A leading data collaboration platform in San Francisco seeks a SeniorSecurity Engineer to enhance threat detection and automation strategies. The role involves implementing detection logic, automating workflows, and developing scalable cloud solutions. Candidates should have a Bachelor's degree in a relevant field and strong skills in security automation and detection engineering. This position offers competitive compensation with a base range of $131,500 to $203,000.
#J-18808-Ljbffr
A leading security training provider is seeking a SeniorSecurity Engineer for their content engineering team. This role supports security professionals, builds hands-on content, and integrates security into DevOps. Ideal candidates have over 5 years of experience in application security and are passionate about improving security practices. The position is remote-first with competitive compensation and benefits.
#J-18808-Ljbffr
SeniorCyberSecurity Ops Analyst
Applicants Need To Know
6+ Month Contract
Work Status: USC, GC
Sponsorship: No, Sponsorship provided.
Office Type: Remote
Hourly Rate: $75 to $85 W2 Only
No Corp-to-Corp
Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position.
We seek a SeniorCyberSecurity Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones.
As a Sr CyberSecurity Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment.
The Work:
Conduct investigations and respond to internal and external security threats.
Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems.
Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.
Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies.
Develop automation response scripts to remediate commodity threats.
Perform threat hunting activities to identify compromised resources.
Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model).
Perform threat research and intelligence gathering to improve detection and response capabilities.
Propose and review security plans and policies to improve the security environment.
Maintain operational playbooks, process diagrams, and documentation for security monitoring and response.
Review proposed Security deployments to ensure security monitoring requirements are met.
Provide off-hour support as needed for security monitoring and response activities.
Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.
Review compromised systems to identify the root cause of security incidents.
Qualifications:
Minimum of 5 years of experience in security monitoring and incident response
Strong knowledge of DLP (data loss prevention) and SIEM events
Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints
Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies
Ability to develop automation response scripts for commodity threats
Familiarity with threat hunting activities to identify compromised resources
Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model)
Experience in threat research and intelligence gathering to improve detection and response capabilities
Knowledge of reviewing security plans and policies to enhance the security environment
Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation
Ability to review proposed Security deployments to ensure compliance with security monitoring requirements
Willingness to provide off-hour support for security monitoring and response activities
Nice to Have:
Experience with cloud security technologies such as CASB, Cloud Access Security Brokers
Knowledge of scripting languages such as Python or PowerShell
Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR)
Certifications in relevant areas such as CISSP, CISM, or CEH
Experience working with incident response tools and processes
#CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
$75-85 hourly 60d+ ago
Cyber Security Analyst - Incident Response
Manpowergroup 4.7
Remote job
Our client, a leading organization in the energy industry, is seeking a CyberSecurityAnalyst - Incident Response to join their team. As a CyberSecurityAnalyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization.
**Job Title:** CyberSecurityAnalyst - Incident Response
**Location:** Remote
**Pay Range: $65-68/hr**
**What's the Job?**
+ Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents.
+ Analyze log files from various sources to identify potential threats and vulnerabilities.
+ Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies.
+ Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection.
**What's Needed?**
+ 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree.
+ Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools.
+ Strong understanding of network principles and the cyber incident lifecycle.
+ Experience supporting incident response processes and coordinating with third-party vendors and internal teams.
+ Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience.
**What's in it for me?**
+ Opportunity to work with a Fortune 200 company in a dynamic and impactful role.
+ Remote work flexibility to support work-life balance.
+ Engagement in cutting-edge cyber defense techniques and trend analysis.
+ Collaborative environment fostering professional growth and development.
+ Contributing to the security of critical energy infrastructure.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
$65-68 hourly 56d ago
Cyber Security Analyst - REMOTE
Jobgether
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a CyberSecurityAnalyst - REMOTE. In this critical role, you'll be monitoring, investigating, and responding to security threats across various networks and environments. Your proactive threat hunting and analytics will play a vital role in strengthening the enterprise defenses. The analyst will also work on incident response and automation to effectively mitigate cyber risks and improve the overall security posture. Your contributions will significantly enhance the organization's ability to effectively manage and respond to cybersecurity challenges in an ever-evolving landscape.Accountabilities
Actively hunt for indicators of compromise (IOCs) and suspicious activities across environments.
Develop and execute KQL queries and create dashboards for telemetry analysis.
Automate detection, log analysis, and incident response workflows using scripting.
Monitor environments for potential breaches, escalating or remediating as necessary.
Collaborate cross-functionally to investigate incidents and implement corrective actions.
Identify and validate vulnerabilities, ensuring remediation and compliance.
Participate in red/blue team exercises and post-incident reviews.
Create and enhance security baselines, detection rules, and playbooks.
Prepare comprehensive reports and documentation on security incidents.
Ensure alignment with internal policies and industry standards.
Research and stay informed on emerging attack vectors and vulnerabilities.
Requirements
Hands-on experience using KQL for building queries and dashboards.
Experience with EDR/XDR, SIEM, and SOAR platforms.
Proficiency in Python or PowerShell scripting for automation.
Familiarity with threat intelligence and incident response methodologies.
Knowledge of common threat frameworks such as MITRE ATT&CK.
Understanding of cloud security operations across platforms like Azure and AWS.
Excellent analytical skills with a detail-oriented mindset.
Ability to work independently and collaboratively in a team environment.
Strong problem-solving skills and a self-motivated attitude.
Excellent communication skills and cross-departmental awareness.
Benefits
Medical, dental, and vision insurance.
Paid Time Off and Paid Holidays.
Life insurance and Short/Long Term Disability.
401k plan with matching contributions.
Paid Sick Time.
Pet Insurance.
Discount programs on travel, gyms, and other services.
Continuous learning opportunities and professional growth.
Work remotely from anywhere, particularly from the West Coast.
Why Apply Through Jobgether? We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best!Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time.#LI-CL1
$76k-102k yearly est. Auto-Apply 4d ago
Cyber Security Analyst II
Cybersheath 3.7
Remote job
Job Description
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a CyberSecurityAnalyst to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The CyberSecurityAnalyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments.
Key Responsibilities
Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments
Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations
Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket)
Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns
Analyze federation security including ADFS token-based attacks and SAML token manipulation
Configure and tune WAF/firewall rule sets and investigate related security incidents
Develop network segmentation strategies and identify lateral movement attempts
Develop and maintain incident response playbooks for various attack scenarios
Coordinate incident response activities with cross-functional teams
Required Qualifications
3-5 years in cybersecurity with 2+ years SOC experience
Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD)
Experience with SIEM platforms and security monitoring tools
Scripting proficiency (PowerShell, Python)
Strong analytical and communication skills
Microsoft Certified: Security Operations Analyst (SC-200)
One additional security certification: EC-Council CSA, CompTIA Security+, or similar
Preferred Qualifications
Microsoft Certified: Azure Security Engineer (AZ-500)
Microsoft Certified: Identity and Access Administrator (SC-300)
CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification
CISSP, SSCP, CCSP
Skills & Expertise
Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps)
Azure Sentinel KQL query development and alert configuration
Azure AD/Entra ID security configuration and attack path analysis
Active Directory security assessment including GPOs, trust relationships, and delegation
Email security and phishing detection/response
Cloud security posture management
Incident handling and digital forensics
Threat intelligence analysis and implementation
Work Environment
CyberSheath is a fully remote organization, and this will be a work-from-home position
The schedule for this role is:
Week One: Friday - Sunday 8:00 AM - 8:00 PM
Week Two: Friday - Monday 8:00 AM - 8:00 PM
Travel requirements: 0-5% yearly.
Please note that this role will be part of our SOC on-call rotation
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range$70,000-$100,000 USD
$70k-100k yearly 11d ago
Cyber Threat Fusion Analyst
Beyond SOF
Remote job
The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start.
Essential Job Functions
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats.
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections.
Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks.
Understand concepts of log and packet analysis
Navigate the command line using specific expressions to manipulate data
Handle and organize disparate data about detections, attacks, and attackers
Employ discovery techniques and vetting of new intelligence.
Create Situational Awareness Reports and Threat Briefs.
Minimum Required Qualifications
Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required.
Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree.
Computer defense technologies spanning endpoint, network, and open source.
Required Security Clearance: TS/SCI.
8570 IAT II certification is required prior to start.
It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
$74k-100k yearly est. 60d+ ago
Cyber Security Analyst
Military, Veterans and Diverse Job Seekers
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
$74k-100k yearly est. 60d+ ago
Global Cyber Wordings Analyst
Liberty Mutual 4.5
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
$76k-99k yearly est. Auto-Apply 14d ago
Virtual Cyber Security SDR, BDR, remote
Planet Green Search
Remote job
Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence.
Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft.
They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process.
This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel.
We Are Looking For:
As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category!
What You'll Do:
Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing.
Make daily outbound calls/emails to prospects who have demonstrated interest.
Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel.
Record all activities and properly manage lead stage/flow in our Salesforce CRM.
Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs.
Schedule product demos on AE's calendar.
Discern buyer intent and partner with AEs to get the right customers onboarded.
Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features.
What You'll Need:
Must have BDR/SDR experience in the SaaS or similar software space
Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel.
Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone.
Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must.
Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important.
Must be a great listener with an ability to address objections graciously and frame the next steps clearly.
Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel.
Verifiable track record of success and goal attainment in a frontline sales-oriented role
Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important.
Track record of (over)achieving sales quotas.
Must have a strong, self-motivated drive, passion, and desire to deliver results.
Experience in a fast-growing startup environment is a big plus.
What We Offer:
Contract to Hire, Strong Salary plus comm after 90 days
Full Benes
PreIPO equity
Be part of an exciting high-growth SaaS organization
An impactful role with lots of growth potential
A lot of freedom to apply your creative and strategic skills
A work-hard, play-hard environment
100% virtual
Virtual CyberSecurity SDR, BDR, remote
$74k-101k yearly est. 60d+ ago
Senior Security GRC Analyst
Lambda Labs
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
* Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
* Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
* Manage IT Risk Register including risk identification, tracking, and prioritization.
* Assist with and drive remediation of control deficiencies and gaps
* Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
* Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
* Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
* Assist control owners with root cause analysis and track risk management action plan progress.
* Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
* Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
* Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
* Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
* Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
* Experience in the machine learning or computer hardware industry
* Experience with Security by Design and/or Privacy by Design principles
* Experience with standard cyber controls frameworks, including CIS Top18, NIST CyberSecurity Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
* Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
* Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
* Certified Information Systems Auditor (CISA)
* Certified Information Security Manager (CISM)
* Certified Information Systems Security Professional (CISSP)
* Certified in Risk and Information Systems Control (CRISC)
* Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
* Founded in 2012, with 500+ employees, and growing fast
* Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
* We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
* Our values are publicly available: *************************
* We offer generous cash & equity compensation
* Health, dental, and vision coverage for you and your dependents
* Wellness and commuter stipends for select roles
* 401k Plan with 2% company match (USA employees)
* Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$89k-119k yearly est. 60d+ ago
Senior Security GRC Analyst
Lambda 4.2
Remote job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST CyberSecurity Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$93k-129k yearly est. Auto-Apply 60d+ ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cybersecurity incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 5d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information SecurityAnalyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cybersecurity incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 4d ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance SeniorAnalyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in information security, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and information security compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 5d ago
Remote Pre-Sales Security Systems Engineer - Access Control & CCTV
Kastle Systems 3.6
Remote job
Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
* Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
* Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
* Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
* Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
* Create solution design documentation (drawings, BOMs, solution design summaries).
* Provide technical support for in-office and on-site team members.
* Support management in the process of creating documentation for implementing new technology with new and existing customers.
* Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
* A minimum of 3-7 years previous experience in the industry.
* Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
* Experience in the design and planning of access control and video systems.
* Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
$100k-140k yearly est. Auto-Apply 6d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 12d ago
Staff Information Security Analyst
Playstation 4.8
Remote job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information SecurityAnalyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 11d ago
Learn more about senior cyber security analyst jobs