Post job

SIEM jobs near me - 388 jobs

  • Customer Focus Analyst (Unit 42 MDR) - Remote Weekend Shift

    Palo Alto Networks 4.8company rating

    Remote job

    Our Mission At Palo Alto Networks , we're united by a shared mission-to protect our digital way of life. We thrive at the intersection of innovation and impact, solving real-world problems with cutting-edge technology and bold thinking. Here, everyone has a voice, and every idea counts. If you're ready to do the most meaningful work of your career alongside people who are just as passionate as you are, you're in the right place. Who We Are This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters. Job Description The Team Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations. If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place. You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be! Job Summary Unit 42's Managed Detection and Response (MDR) service is growing fast - and we're building a customer-centric team that blends technical expertise with direct customer engagement. As a Customer Focus Analyst, you'll act as the front line of communication between our MDR analysts and our customers, helping bridge the gap between incident response and customer understanding. You'll not only support investigations and incident triage, but also help onboard customers, answer technical questions about reports, alerts, and the service, and manage ongoing communications to ensure clarity, alignment, and satisfaction. This role is ideal for someone who is technical at their core, but enjoys customer interactions, driving clarity, and ensuring our partners feel confident and supported in their cybersecurity journey. Key Responsibilities Be part of a customer-focused sub-function of the Unit 42 MDR team, dedicated to proactive communication and technical guidance Support onboarding activities for new customers Monitor incoming communication from customers (e.g., via email, comments), triage and route issues as needed, and answer technical questions around reports, alerts, and recommendations Collaborate with MDR analysts to ensure the customer's technical questions about incidents or threats are fully addressed Own the customer communication lifecycle during ongoing incidents - ensure timely updates, clarity, and alignment on next steps Help drive consistency and quality in how incidents and threat intelligence are communicated externally Escalate and advocate for customer issues internally across Product, Engineering, and the broader Unit 42 team Qualifications Preferred Qualifications 1+ years of experience in a customer-facing cybersecurity role such as professional services, customer success, or customer support - must, Tier 1/2 SOC analyst experience Hands-on experience with tools such as EDR, SIEM, SOAR, or XDR Strong customer communication skills - verbal and written - with the ability to explain complex technical details clearly Experience reviewing, drafting, or presenting incident reports and security findings Familiarity with Cortex XDR or Cortex XSOAR Experience onboarding new security services or clients Additional Information Salary Disclosure The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $104500/YR - $169100/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here. Our Commitment We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines.
    $104.5k-169.1k yearly 2d ago
  • SOC Analyst

    Self Financial, Inc. 4.4company rating

    Remote job

    Self Financial is a venture-backed, high-growth FinTech company with a mission to increase economic inclusion and financial resilience by empowering people to build credit and build savings. We're looking for people who share our passion and are driven to tackle challenges, find solutions and make the financial space better for the communities we serve. Our team is passionate about challenging the status quo of the credit industry by providing people accessible tools to take control of their credit. Executing on our mission requires deep collaboration across our teams to ensure our products reach the people who can benefit from them the most, particularly the 100 million+ Americans who have no or low credit. We celebrate diversity and are committed to creating an inclusive environment for all employees. To that end, we seek to recruit, develop and retain the most talented people from a diverse candidate pool. About the Role We are seeking a Security Operations Center (SOC) Analyst to join our cybersecurity team and help protect our cloud infrastructure and enterprise systems. The ideal candidate will have hands-on experience working in a SOC environment, leveraging Splunk Enterprise Security (ES) as the primary SIEM to monitor, detect, and respond to security incidents. A strong background in Enterprise IT is preferred, as this knowledge will be key in helping to analyze alerts and logging. You will play a critical role in triaging alerts, conducting threat analysis, and contributing to continuous improvement of our detection and response capabilities. Key Responsibilities Monitor, analyze, and respond to security events and incidents using Splunk Enterprise Security. Investigate alerts from multiple security sources including AWS CloudTrail, GuardDuty, Palo Alto Networks firewalls, Okta, CrowdStrike Falcon, Netskope, and Wiz. Correlate logs and telemetry across cloud and on-prem environments to identify potential threats or policy violations. Develop and fine-tune correlation rules, dashboards, and alerts in Splunk ES. Participate in incident response processes including containment, eradication, and recovery. Document incidents, root cause analyses, and lessons learned to strengthen operational playbooks. Assist in maintaining SOC processes aligned with SOC 1/SOC 2 and PCI DSS compliance frameworks. Assist in audit evidence collection and documentation in defense of audit requirements. Collaborate with IT, DevOps, and Engineering teams to harden infrastructure and improve detection fidelity. Support continuous improvement of threat detection, response workflows, and automation initiatives. Required Skills & Qualifications 3+ years of experience in a SOC analyst or cybersecurity operations role. Expertise in Splunk Enterprise Security (ES) or similar SIEM platforms. Strong understanding of AWS services including CloudTrail, GuardDuty, and IAM. Hands-on experience with: Palo Alto Networks firewalls and security policies Okta identity and access management CrowdStrike Falcon endpoint detection and response Wiz cloud security posture management Familiarity with SOC 1/2 and PCI DSS compliance requirements. Solid background in IT systems administration, including Windows, Linux, and networking fundamentals. Demonstrated ability to work collaboratively in a security team environment. Strong analytical, communication, and documentation skills. Preferred Qualifications Industry certifications such as Splunk Certified Power User / ES Analyst, CompTIA Security+, GSEC, GCIA, or AWS Security Specialty. Experience with automation/orchestration tools (e.g., SOAR, Python scripting). Knowledge of threat intelligence and MITRE ATT&CK framework. +3 years in IT administration to have a foundational understanding of Enterprise IT systems. Base salary range: $76,000-112,000 annually. Individual pay is based on factors unique to each candidate, including skill set, experience, location, and other job-related reasons. Benefits and Perks: We have the compensation and benefits you expect. But there's one thing that Self Financial can offer that many companies cannot: we can positively change the world, while making a profit. We are a team of Builders, empowering our customers to build their dreams. We have a Do the Right Thing ethos in all that we do, and we hope you value that approach, too. Our perks include: Company equity in the form of Stock Options Performance-based bonuses Generous employer-paid health, vision and dental insurance coverage Flexible vacation policy Educational assistance Free gym membership Casual dress code Team building events and activities Remote work arrangements/ flexible work schedule Paid parental leave Self Financial requires all employees hired to successfully pass a background check. We are an Equal Opportunity Employer. At this time, we are only able to consider applicants who are U.S. Citizens or Green Card Holders for employment opportunities. We appreciate your understanding.
    $76k-112k yearly 2d ago
  • Managed Threat Detection Manager (Unit 42 MDR) - Remote

    Palo Alto Networks 4.8company rating

    Remote job

    Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included. As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few! Job Description Your Career We are seeking a driven problem solver to join our Unit 42 Managed Detection and Response (MDR) team. Our team is responsible for customers internal security monitoring, threat hunting, and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers' internal business. As a manager, you will join a team of leaders who overlook the Unit 42 MDR team to ensure premium delivery to our customers. You will have a critical role in how the team works, including creation of new processes, methodologies, and capabilities the team requires. Your Impact Hire for and lead a team of MDR Analysts working globally. Guide the team, create and improve processes, methodologies, and capabilities that the team requires to work effectively Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments Provide critical feedback to different Product, Research, and Engineering teams to help improve the products for the entire Palo Alto Networks' customer base Work closely with Security Research, Threat Intelligence, and Threat Hunting teams to remediate and detect new emerging threats Qualifications Your Experience At least 3 years of team management experience, global management experience (world-wide team) is a plus Great interpersonal skills and a proven experience collaborating with customers Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals Basic hands-on coding skills (e.g. Python) Excellent written and oral communication skills Experience investigating targeted, sophisticated or hidden threats Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools Understanding of how APTs operate and the attack cycle - different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc. Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged Advantages Having worked in SOC analysis or an investigation environment Having worked in Incident Response environment Additional Information The Team The team you'll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies, and techniques. Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data - reduce the noise and focus on real threats. This team works closely with different product groups and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better. Compensation Disclosure The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $158,000 - $254,000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here. Our Commitment We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines.
    $158k-254k yearly 4d ago
  • Senior Security Engineer

    Ringside Talent

    Columbus, OH

    We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below. Responsibilities: Design, implement, and maintain security solutions to protect enterprise systems and data Conduct vulnerability assessments, penetration testing, and risk analysis Develop and enforce security policies, standards, and best practices Collaborate with IT and development teams to integrate security into system architecture Monitor and respond to security incidents, ensuring timely resolution Qualifications: 5+ years of experience in cybersecurity engineering or related roles Strong knowledge of network security, application security, and cloud security principles Experience with security tools such as SIEM, IDS/IPS, and endpoint protection Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA) Excellent problem-solving and communication skills What Our Client Offers: A critical role in safeguarding enterprise systems and sensitive data Opportunities to work with cutting-edge security technologies and methodologies A collaborative environment focused on innovation and resilience Competitive compensation and comprehensive benefits
    $92k-127k yearly est. 2d ago
  • Senior IT Security Advisor (Full Time, Remote Position)

    Verasafe

    Remote job

    VeraSafe is an innovative and successful U.S. headquartered international privacy and cybersecurity compliance consulting firm and law firm. Check out our podcast! Apple Podcast: ************************ YouTube: ************************************************* Spotify: ********************** VeraSafe is proud to be certified as a Great Place to Work©, with 96% of our employees affirming that we are truly a great place to work. This means we foster trust, collaboration, and a positive work environment. We are committed to maintaining this standard of meaningful work, work-life balance, and a supportive community. Check out our great benefits, listed at the end of this job description. About the Role: VeraSafe's mission: Provide the world's best data protection advice, with a human touch. Right now, we are seeking an Senior IT Security Advisor to join our growing team and help us pursue this mission. We are inundated with business from clients who love the way we advise on privacy compliance (hence the need for you!). This is an excellent opportunity for anyone who wants to join a team working on the cutting edge of privacy, data protection, and cybersecurity, and is excited about assisting a wide range of clients with fractional CISO-type support, including IT security program design, implementation, and management. Key Responsibilities Practice Development: Oversee VeraSafe's cybersecurity consulting program through the management of team members, client relationships, and projects/deliverables Expand on VeraSafe's security consulting offerings, with an initial focus on Microsoft 365 hardening, configuration auditing, and risk assessment Further develop internal service delivery methodologies, documentation, templates, and quality control processes Collaborate with sales and marketing to position and refine service offerings Client Engagement and Delivery: Lead and deliver consulting projects, including fractional-CISO-type engagements with a strong focus on securing Microsoft 365 environments Conduct detailed cybersecurity risk assessments, including analysis of current security controls, vulnerabilities, and threat landscape Provide oversight and strategic direction for incident response, including breach containment, investigation, and post-incident review Lead and execute security assessments, architecture reviews, IT security policy drafting and implementation, and remediation planning Communicate findings and recommendations to clients clearly and professionally either through written reports and executive briefings or execution of hands-on implementation Build trusted relationships with client stakeholders, including CISOs, IT directors, and compliance teams Collaborate with project managers and privacy-focused project teams to determine and meet client requirements and specific project needs. Analyze practical situations and develop solutions to specialized needs Team Leadership: Train and mentor consultants and technical specialists on your team Manage project timelines and delivery quality across multiple concurrent engagements Eventually help grow and manage a team of IT security advisors Thought Leadership and Cross-Functional Collaboration: Stay current on evolving security threats and technologies Represent our IT security practice internally and externally, including contributions to client alerts and conference talks Collaborate with VeraSafe's Professional Services leadership to ensure tight integration between our IT security and privacy advisory services Required Qualifications: At least six years of hands-on experience in IT security consulting, IT security engineering, or equivalent At least one relevant certification (e.g., CISA, CISSP, CISM, CRISC, CCSP, SC-100 Cybersecurity Architect) Deep technical expertise in Microsoft Defender XDR, CrowdStrike Falcon, SentinelOne, or other similar technologies Proficiency with IT security standards and frameworks (e.g., NIST CSF, ISO/IEC 27001, NIST 800-53, NIST 800-171, CIS Controls) Experience performing audit readiness assessments for frameworks and regulations such as HIPAA, ISO (e.g., 2700 series), NIST (e.g., CSF), GLBA, or others Technical background in scripting, automation, or security tooling (e.g., PowerShell, Sentinel, Defender for Endpoint) Experience developing and conducting tabletop exercises such as Business Continuity and Disaster Recovery scenarios Experience conducting enterprise-wide formal risk assessments Strong understanding of email security (DKIM, DMARC, SPF) Familiarity with security stacks to include SIEM/SOAR, IAM, EDR, CASB, etc. Strong understanding of cloud security posture assessments Strong understanding of enterprise security principles, zero trust architecture, and IT security risk management Experience leading teams and managing consulting engagements Willingness to learn new skills and receive direction and feedback from team members Willingness to pursue and maintain privacy certifications (e.g., CIPP/E, CIPM, CIPT) Preferred Qualifications: Experience working directly with clients, in a service-oriented environment Experience building or growing a consulting practice or service line Experience in regulated industries (e.g., healthcare, finance, pharma) Familiarity with contract provisions that address data protection and security responsibilities Experience migrating or overseeing the migration of systems from on-premises or hybrid to cloud-federated systems Experience with development and implementation of incident response plans Professional involvement in the privacy and/or data security space (attendance at privacy conferences; membership or publication in the IAPP, ISACA, etc.) Privacy certification (or similar) Key Competencies: Detail-oriented and highly organized with a strong work ethic Ability to thrive and perform in a fully remote and international environment Excellent written and verbal communication skills Highly skilled in time management to enable successful work with international teams in meeting deadlines Highly capable of independent work to fully deliver on all commitments Ability to work productively in a cross-functional, multi-disciplinary consulting team Experience building and maintaining relationships with colleagues and clients through polished, professional interactions and products regardless of the client's experience with VeraSafe's service line VeraSafe Values: In addition to technical knowledge, skills, and competencies for a specific position, VeraSafe seeks team members who are proficient in values critical to our organization. For managers, we are seeking individuals who demonstrate interest in and experience applying: Creativity and Innovation Feedback Mentorship People Development Business Acumen VeraSafe's Excellent Benefits Include: Work from almost anywhere with Wi-Fi Paid Time Off (PTO) Paid holidays Annual bonuses Membership in the International Association of Privacy Professionals (IAPP) and IAPP exam fee reimbursement (CIPP/E) Flexible working schedule in some roles Reimbursement for certain personal flight ticket Company laptop provided Optional IT Hardware Buyback Program Note: There is a 1-3 hour skills assessment associated with the recruitment for this position. We know this is a burden, but we think it's worth it, and we appreciate you taking the time to complete it. We've found it enables us to find the best team members, regardless of their experience, where they went to school, or where they were trained. We want smart, kind, creative colleagues, plain and simple, and this assessment is a crucial part of our ability to hire this way. Our HR Privacy Notice is available at the following link: **********************************************************
    $94k-126k yearly est. 2d ago
  • Director, Security Operations

    Unqork 4.1company rating

    Remote job

    Unqork empowers enterprises to accelerate growth by rapidly building, testing, and running applications that are designed to be AI-native. Trusted by the world's largest organizations in highly regulated industries, these applications become more secure over time while significantly reducing technical debt-allowing businesses to focus on innovation rather than maintenance. Unqork's customers include Goldman Sachs, Marsh, BlackRock, and the U.S. Department of Health and Human Services. At Unqork, we value inclusive and innovative thinkers who boldly challenge the status quo. We encourage you to apply! The Impact U will make: As the Director of Security Operations, you will be a strategic and operational leader, reporting to the Chief Trust Officer, you will manage the teams responsible for Threat Detection & Response (TDR), Technical Security Architecture, IT Operations and Identity and Access Management. You will lead the development and execution of our security operations programs and ensure our foundational technology infrastructure is robust. Your primary focus will be to implement and maintain cutting-edge technologies and robust processes to proactively protect and defend our critical assets and manage our enterprise technology against an evolving threat landscape. Strategic Security Operations Leadership & Program Maturity: Define, champion, and drive the long-term vision and strategic roadmap for Unqork's security operations threat detection and response program. Own the end-to-end execution of security log optimization, monitoring, threat detection, triaging, and incident response initiatives, ensuring alignment with organizational goals and risk appetite. Security Operations & Incident Response: Lead and mature our security operations capabilities, including our SIEM, SOAR, MDR,, threat detection, vulnerability management, and incident response. Oversee the strategic direction of major security incidents, guiding containment, root cause analysis, and implementing preventative measures. Threat & Vulnerability Management: Lead the use of threat intelligence to inform our defensive strategies. Oversee proactive threat hunting activities and manage the full lifecycle of vulnerability management, from discovery to remediation. Security Automation & Innovation: Champion the use of automation to enhance security efficacy and efficiency within security operation and identify and access management processes. Evaluate and integrate cutting-edge security technologies, such as SIEM, SOAR, and EDR/XDR platforms, to continuously strengthen our detection and response capabilities. Cross-Functional Technical Partnership: Collaborate extensively with senior leadership in Engineering, Product, IT, and other departments to embed operational security requirements, influence architectural decisions for detectability, and foster a strong security culture. Serve as the primary security technical expert for these partnerships. Operational Governance & Reporting: Oversee technical monitoring to ensure adherence to security policies and compliance requirements (e.g., SOC 2, ISO 27001). Develop and present clear metrics and reports on operational security posture and incident trends to executive leadership, driving continuous improvement. A major part of this role involves transforming our Identity and Access Management (IAM) capabilities. We need a leader who can not only manage our existing IAM framework but also envision and implement a more mature, risk-based approach. You'll be responsible for creating and deploying new processes, automating identity lifecycles, and ensuring we have the right controls in place to protect our systems and data. In addition to core security duties, you will play a key role in elevating our IT Operations functions. You will be responsible for enhancing the team's efficiency in critical areas such as asset management, system access management, and technical troubleshooting. This includes optimizing workflows, implementing automation, and establishing best practices to ensure a seamless and secure experience for all employees. You will mentor and guide both the security and IT teams, fostering a culture of collaboration and continuous improvement to build a more resilient and efficient operational environment. Team Development (Future Focus): Potentially build, mentor, and lead a high-performing team of security analysts and threat hunters as the program expands, fostering their growth and technical excellence. What U bring: 10+ years of progressive experience in Security Operations, with at least 5 years in a senior leadership or management role overseeing a Security Operations Center (SOC), Managed Detection Response Service, and Incident Response team. Proven track record as a hands-on operational leader, having designed, implemented, and managed a mature SOC and incident response capabilities in a dynamic, cloud-native environment, Identity and Access Management Solutions, and IT Operational processes. Deep hands-on technical expertise in threat detection, incident response, vulnerability management, and the use of SIEM, EDR/XDR, other security monitoring platforms, IAM solutions and processes. Strong understanding of modern security threats, attack vectors, and defensive strategies. Expertise in security frameworks (e.g., NIST, MITRE ATT&CK) and their practical application in threat detection, analysis, and incident response. Exceptional leadership, communication, and interpersonal skills, with the ability to influence and effectively collaborate with technical and non-technical stakeholders at all levels, including executive leadership. Demonstrated ability to translate complex operational security incidents and risks into clear, actionable strategies and communicate effectively to diverse audiences. Relevant industry certifications highly preferred (e.g., CISSP, CISM, GCIH, GCIA, or OSCP). Bachelor's degree in Computer Science, Information Security, or a related technical field; Master's degree a plus. Compensation, Benefits, & Perks 💻 Work from home with a remote-first community 🏝 Unlimited PTO (and the encouragement to use it) 📝 Student loan payback program 🏥 100% employer-covered medical, dental, and vision options available to you and your dependents 💸 Flexible Spending Account (FSA) 🏠 Monthly stipend toward your WFH setup, vacation, development and more 💰 Employer-sponsored 401(k) with contribution match 🏋🏻 ♀️ Subsidized ClassPass Membership 🍼 Generous Paid Parental Leave 💲 Hiring Ranges: Tier 1: $190,000 - $238,000 base salary Tier 2: $170,000 - $214,000 base salary Unqork employs a market-driven approach to establish compensation ranges. In addition to a base salary, employees may also be eligible to receive a target incentive and company equity in the form of stock options. An employee's compensation within the range provided above depends on a variety of factors including, but not limited to, their location, role, skillset, level of experience, and similar peer salaries. As a remote-first company, Unqork incorporates a geographic differential into our compensation structure, depending on the candidate's location. We utilize a tiered system-Tier 1 and Tier 2-to accurately reflect local market rates and ensure our compensation packages are both fair and competitive. Our geographic tiers are defined as follows: Tier 1: New York Metro, Seattle Metro, San Francisco Bay Area Tier 2: All other US and US territory locations Unqork embraces a culture of security and privacy awareness by consistently safeguarding sensitive information, adhering to company policies, and actively participating in training and initiatives to protect our data and the privacy of our stakeholders. Unqork is an equal opportunity employer. We will consider all qualified applicants without regard to race, color, nationality, gender, gender identity or expression, sexual orientation, religion, disability or age. #LI-LN1
    $190k-238k yearly Auto-Apply 60d+ ago
  • Security Operations Vice President

    JPMC

    Westerville, OH

    Be part of a dynamic team where your distinctive skills will contribute to a winning culture and team. As a Security Operations Vice President in our global team of technologists and innovators, you will significantly impact our company, clients, and business partners worldwide. You'll guide a highly motivated team in analyzing, designing, developing, and delivering solutions to counter adversaries and enhance our operations. Your contributions will help identify internal threat indicators and prevent sensitive data loss using world-class tools and technology. Job responsibilities - Guide a highly motivated team motivated team in designing, configuring, and implementing Data Protection and DLP policies using Microsoft Information Protection (Microsoft Purview), Broadcom (Symantec) DLP, and Palo Alto DLP, both on-premises and in the cloud, utilizing CASB and Cloud Proxy at the enterprise level. Leverage your scripting skills in Python, PowerShell, and JavaScript to automate tasks and workflows, and use your API working knowledge to integrate various DLP solutions with SIEM, CASB and UEBA tools. Provide technical expertise to manage, configure, and optimize Palo Alto DLP, CASB, and Cloud Proxy solutions, Broadcom (Symantec) DLP, and Microsoft 365 Security Solutions while producing reports on program status and progress for senior management. Lead incident response, conduct risk reviews, assess policies, and identify new threat vectors, driving the development of new data identifiers, data governance policies, and standards to ensure compliance and data integrity. Use strong communication skills to present findings and solutions related to existing and emerging threats in the data loss prevention/internal threat arena to senior leaders and stakeholders. Collaborate with stakeholders and businesses to provide guidance on best practices, define data management requirements, and establish effective controls, practices, and procedures, delivering cost-effective strategic solutions that prioritize our clients. Assist in training and retaining talent and identify growth opportunities for junior team members for talent development. Required qualifications, capabilities, and skills - 7 or more years of cybersecurity operations or SOC related experience with 2 years as a technical lead with strong project management skills. Deep understanding of cybersecurity practices, Data Loss Prevention concepts, security incident triage, Insider Threat, and operations risk management processes, along with architectural requirements, engineering threats, vulnerabilities, and incident response methodologies. Proven experience in managing and configuring DLP and EDR solutions in large-scale enterprise environments, with expertise in Information Protection/Sensitivity Labels, Data Loss Prevention, Secure Browsers and Insider Risk/Threat Management. Proficient in scripting with PowerShell, Python, JavaScript and knowledgeable in regular expressions and APIs. Experience in developing and implementing new DLP or Insider Threat programs using tools like Palo Alto DLP, CASB, Microsoft Purview, Symantec DLP, Crowd Strike, Island Browser and Splunk or other SIEM tool. Excellent analytical and problem-solving skills, capable of translating complex technical concepts into practical solutions based on risk assessment and risk appetite. Preferred qualifications, capabilities and skills - Possess two or more of the following certifications - Microsoft Certified: Security, Compliance and Identity Fundamentals, Broadcom DLP Administrator, Palo Alto Networks Certified Network Security Administrator, Cybersecurity Architect Expert, Security Operations Analyst Associate, Azure Security Engineer, CISSP, Splunk Certified Power User Experience with Agile methodology and the ability to work with at least one of the common frameworks with knowledge of tools like Confluence, JIRA and ServiceNow. Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with a focus on recommendations for enhancements or remediation based on in-depth risk assessment. Good understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity and foundational knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing.
    $103k-176k yearly est. Auto-Apply 60d+ ago
  • Technical Customer Success Manager

    Sumo Logic 4.4company rating

    Remote job

    Sumo Logic, Inc. empowers the people who power modern, digital business. Through its SaaS analytics platform, Sumo Logic enables customers to deliver reliable and secure cloud-native applications. Our platform observes, monitors, and secures modern digital business solutions. As a true cloud-native SaaS solution, you will be working on the cutting edge of cloud technology to deliver a world-class technical experience to our customers, thus enabling them to meet their business outcomes. We are seeking a highly skilled Technical Customer Success Manager. As a trusted customer advisor, Technical Customer Success Manager (CSM) not only help our customers understand best practices to maximize Sumo Logic's value, drive customer ROI and also delve deep into the technical nuances of our platform. You'll be hands-on, assisting customers in navigating the complexities of Sumo Logic and leading strategic growth through robust relationships with users and executives in partnership with the Sumo Logic account team. Your expertise in advanced training, complex problem-solving, and enabling technology adoption will be crucial. We support customers across various verticals with specialized needs in information security, DevSecOps, and observability and monitoring. This role offers the excitement of joining Sumo's team, which is renowned for tackling our customers' most intricate security and operational challenges. As a CSM, you'll have visibility up to the CEO level and engage with our executive team on strategic initiatives. Travel Requirements Flexible, but generally once or twice a quarter (10-25%) Customer Visits Corporate Visits for Training, mandatory meetings, etc. Responsibilities Advanced Technical Expertise: Hands-on keyboard experience and consultative skills. Strategic Adoption Drive: Facilitate training on advanced features and practices, aligning with the customer's specific usage of Sumo Logic. Customized Success Planning: Work closely with customers to understand their unique requirements and challenges, ensuring alignment with their expected business outcomes through a hands-on, consultative approach to build their adoption plan, then help them to achieve it and track progress. You'll keep an eye out for additional opportunities and work to expand the plan as they progress to maximize the value they get from SUMO Logic. Risk Mitigation and Planning: Ability to identify financial and adoption risks within an account and pull the team together to create a thorough plan to turn risky situations into an advocacy scenario Growth Strategy Development: Collaborate with the account team to formulate and implement strategies that balance customer needs with Sumo Logic's business growth. Proactive Monitoring and Support: Vigilantly monitor customer KPIs, proactively address deployment issues, and drive product roadmap suggestions from customer feedback. Executive Engagement: Conduct Quarterly Business Reviews and monthly health check calls, maintaining a proactive, strategic presence in the account team. Monitor and report on the overall well-being of customers, tracking essential health and usage indicators to reduce or eliminate churn risk Data Analysis: Ability to look at data and infer usage patterns Required Qualifications and Skills Extensive SaaS Experience: Proven track record in a technical role managing multiple customer accounts, preferably with a background in DevOps Engineering, SOC analysis, or similar technical positions. Customer-Centric Approach: Passionate about customer satisfaction and problem-solving. Relationship Management: Demonstrated ability in managing relationships across various levels, from technical practitioners to executives. Communication Excellence: Professional and clear communication skills, adept in both executive meetings and technical workshops. Ambiguity Navigation: Ability to work with uncertainty and proactively seek necessary support. Account Management Prowess: Demonstrable skills in managing multiple Accounts with a keen eye for detail. Familiar with Cyber Security frameworks and their applications in the secure DevOps Lifecycle Curiosity to learn about the customer base and curiosity to continue learning Desired Qualifications and Skills Monitoring Platform Experience: Proficiency in Sumo Logic or similar platforms (e.g., Splunk, Data Dog, Elastic, New Relic, Appdynamics, VMWare Tanzu). Cloud Services Knowledge: Hands-on experience with AWS, GCP, Azure, or other cloud services. Query Language Proficiency: SQL or similar query language skills. Security and Operations Background: Experience in monitoring and alerting in security, operations, or SecDevOps settings. Advanced Technologies: Kubernetes expertise (including HELM) and data analytics knowledge are highly advantageous. OSS skills in Otel, Prometheus, and Falco are a plus Sumo Logic experience is a big plus but not required About Us Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness-combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. For more information, visit ****************** Sumo Logic Privacy Policy. Employees will be responsible for complying with applicable federal privacy laws and regulations, as well as organizational policies related to data protection. The expected annual base salary range for this position is $119,000 - $140,000. Compensation varies based on a variety of factors which include (but aren't limited to) role level, skills and competencies, qualifications, knowledge, location, and experience. In addition to base pay, certain roles are eligible to participate in our bonus or commission plans, as well as our benefits offerings, and equity awards. Must be authorized to work in the United States at time of hire and for duration of employment. At this time, we are not able to offer nonimmigrant visa sponsorship for this position.
    $119k-140k yearly Auto-Apply 8d ago
  • Threat Intelligence Lead

    Nuharborsecurity

    Remote job

    The Company Every day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24-hour monitoring and management, provide an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify, their security investment and mission. The Role The Threat Intelligence Lead is critical in proactively searching for indicators of compromise (IOCs) and indicators of attack (IOAs) and actively hunting for threats not yet formally categorized by a threat actor. This position Operator is expected to collaborate with Detection Engineering teams to refine detection capabilities, identifying emerging threats and developing and implementing detection strategies and methodologies. The Operator also holds the critical role in directly working with Clients to provide feedback, recommendations, and provide remediation guidance as needed. What you'll do Live by the NuHarbor corporate values: Help Clients Win, Always Improve, Protect the House. Conduct client directed proactive investigations to identify cyber threats, advanced persistent threats, and anomalous activity within enterprise networks and endpoints. With a focus on client environments and desired outcomes, research new and existing threat actors and associated tactics, techniques, and procedures (TTPs); developing a detailed understanding of their potential impact on the client. Perform deep-dive analysis of suspected security incidents to determine impact, risk, and response actions. Lead and manage threat research initiatives to assess emerging threats and vulnerabilities, and correlate adversary activities, attack chains, and artifacts to provide threat intelligence that supports the timely detection of active threats. Identify and propose automated detections for new and previously unknown threats. Collaborate with NuHarbor internal and external Cyber organizations to mitigate risk by testing, deploying, and developing investigative playbooks. Produce and disseminate timely, actionable, and relevant threat intelligence to detection engineering to inform NHS' detection package based on relevant threats to NuHarbor's client base. Develop and deliver finalized threat intelligence to the SOC that directs intelligence-driven threat hunting efforts and convert results into actionable intelligence that can inform the adjustment of existing detections and the creation of new detections. Lead threat intelligence requirement development and intelligence delivery (tactical, operational, and strategic) across all applicable NuHarbor stakeholders. Lead the management, maintenance, and general administration of NuHarbor's threat intelligence tooling, infrastructure, Threat Intel Platform (TIP), threat feeds, and threat information sharing efforts. Work with Managed Services and Client Success to deliver high priority situational awareness/intelligence to the NuHarbor client based in response to emergent threats while collaborating with detection engineering to provide timely solutions. Act as a centralized point for threat hunters and red team to collaborate with when researching emerging threats that provide opportunities to address detection gaps. Your foundation. The requirements for this role: Bachelor's Degree and five (5) years of experience. Experience should be in a cybersecurity field and should include relevant industry certifications. In lieu of a degree, two (2) years of experience in a related technology field and relevant industry certifications are required. Two (2) or more years of experience in a threat analyst role. A minimum of two (2) years of experience with OSINT and threat hunting. A minimum of one (1) year of experience using Splunk and or other SIEM technologies. Demonstrated expertise in intelligence tradecraft, the intelligence lifecycle, common threat modeling frameworks: MITRE ATT&CK Diamond Model PEAK Cyber Kill Chain D3F3ND Experience using Threat Intelligence tools and processes necessary to collect information about adversary groups and cybercriminals that may target the NuHarbor Security client base. OpenCTI Shodan AbuseIPDB Ability to communicate complex security concepts to audiences of varied technical understanding, including business stakeholders, sales, engineering, and customers. Demonstrated understanding of networking concepts and architecture. Experience giving security recommendations and meeting with clients. Familiarity with network, system, and application layer attacks and mitigations. Maintain at least one (1) industry certification required to support the managed services (MS) Catalog. Security+ Network+ CeH CYSA+ Must be a citizen of the United States. Additional capabilities that will differentiate you for this role: Three (3) or more years of experience in a threat analyst role and/or with OSINT and threat hunting. Five (5) or more years of experience in a security analyst role. Two (2) years of Experience performing threat hunting across client accounts via Splunk, Microsoft Sentinel, or other SIEM Demonstrated experience with security controls and frameworks and the technologies that supply these controls: NIST Risk Management Framework/NIST Cyber Security Framework CIA Triad Identity and Access Management Encryption Incident Response Lifecycle Experience drafting threat intelligence portions of bi-weekly and quarterly reports. Maintains multiple industry certifications required to support the managed services (MS) Catalog. Security+ Network+ CeH CYSA+ Threat Intelligence Certifications: The GIAC Cyber Threat Intelligence (GCTI) The GIAC Defending Advanced Threats (GDAT) The GIAC Enterprise Incident Response (GEIR) Experience in engineering event detection & response tuning. Proven ability to implement simple, scalable, testable, and maintainable detections and code. Experience working in an Agile development process. Experience in Security Operations Center (SOC) content development and automation implementations. Base Salary for this role is targeted at $120,000 - $147,000 annually. *Salary based on Burlington, VT salary data. Offer is based on candidate geography. Additionally, this role is eligible for the company bonus plan at a 10% target. NuHarbor Security hires in the following states: AZ, CO, FL, GA, ID, IL, IN, IA, MA, MD, ME, MI, MN, MO, MT, NC, NE, NH, NJ, NY, OH, OR, PA, SC, TX, UT, VT, VA, WA The Rewards What you can expect: The engagement and support of company leadership who recognize the challenge of marketing a complex cybersecurity service in a chaotic market. An organization that recognizes and rewards employee commitment and contribution to our customers' satisfaction and success Growth in your career and capabilities as you help to chart a path to improving customer interactivity and service adoption. A collaborative and driven working environment in a rapidly growing company and market A fun and social working environment where you are encouraged to be your true self. You can also expect competitive salary and benefits, including paid time to give back in your community and generous PTO. We are purpose driven. We, as an organization, above anything else protect the house first and then help our customers win. If this sounds like the kind of organization you'd like to be a part of, we‘d like to hear from you. AAP/EEO Statement The Equal Employment Opportunity Policy of NuHarbor Security is to provide a fair and equal employment opportunity for all associates and job applicants regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability. NuHarbor Security hires and promotes individuals solely based on their qualifications for the job to be filled. NuHarbor Security believes that employees should be provided with a working environment which enables each associate to be productive and to work to the best of his or her ability. We do not condone or tolerate an atmosphere of intimidation or harassment based on race, color, religion, national origin, gender, sexual orientation, age, marital status, or disability. We expect and require the cooperation of all employees in maintaining a discrimination and harassment-free atmosphere.
    $120k-147k yearly Auto-Apply 3d ago
  • Cyber Operations Manager | Remote, USA

    Optiv 4.8company rating

    Remote job

    will be fully remote and can be hired anywhere in the continental U.S. The Cyber Operations Manager over Threat Detection & Response is responsible to ensure early and accurate detection, response, and containment for threats directed against our clients. As a technical management role, the ideal candidate possesses deep security knowledge/expertise, previous experience as a security practitioner, systems management and administration experience, proven service management skills, and the ability to attract and retain talent in a challenging market. The position is closely involved in helping to mentor, develop and evaluate employee performance as well as helping with the development and continuous improvement of the Security Operations services. How you'll make an impact * Lead 24x7 Threat Detection and Response Analysts providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources as well managing the day-to-day operations. * Work closely with customers on reporting, stewardship calls, and in the case of escalations. * Enforce all policies and procedures, including those for security, disaster recovery, standards, and service provision. * Drive continuous refinement and improvement of detection and response and incident response processes. * Oversee the security of Client systems via Advanced Fusion Center (AFC) service. * Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment. * Collaborate and consult with other Managers on the overall advancement of the Security Operations organization and Optiv in general. * Direct and drive process and documentation improvement. * Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions. * Develop and maintain an educational environment where the knowledge and performance of the group are constantly advancing. * Perform staff performance appraisals. * Ensure timely reporting of security control gaps and vulnerabilities to the customer. * Prepare reporting of metrics and trending of SLA & KPIs to the customer and client support staff. * Stay abreast of evolving risks, new developments in the security industry, and industry best practices in risk management, threat analysis, and threat response techniques. * Attend info security-related events and network with industry peers to inform engineering and operations processes of effective risk mitigation strategies for attacks. * Oversee team's production of threat intelligence reports that communicate the results of the analyses to the respective audience. * Responsible for the joint team effort to normalize data from vulnerability assessment, penetration test, incident response, and application security project deliverables. * Establish and maintain regular written and in-person communications with the organization's executives, other group heads regarding pertinent activities. * Develop and mentor staff through open communication, training and development opportunities, and performance management processes; build and maintain employee morale and motivation. * Supervisory Responsibilities: Cyber Operations Manager will report to the Director of Security Operations. Qualifications for success: * 12+ years professional IT and Information Security experience * 5+ years leading technical Threat Detection and Response teams * 5+ years professional experience in cyber operations centers * 3+ years professional experience in managed services * One or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, CISSP, CISM, CISA, or other security-specific vendors/product certifications * Proven ability to make decisions and perform complex problem-solving activities under pressure. Advanced business acumen required. * Sharp analytical abilities and the ability to make sound decisions quickly are required. * Deep understanding of SIEM vendors, solutions, and architecture such as LogRhythm, QRadar, Splunk, Exabeam, etc. * Deep understanding of EDR vendors, solutions, and architecture such as Crowdstrike, Cylance, Carbon Black, Microsoft ATP. * Deep understanding of regulatory compliance such as NIST, SOX, HIPPA, NERC CIP, PCI, etc. and their differentiators across global regions * Deep understanding of laws pertaining to cybersecurity and their differentiators across global regions * Understanding of Security Orchestration, Automation, and Response concepts. * Experience working with ticketing and knowledge management systems such as Service Now. * Experience with ITIL concepts and practices. * Experience with security analytics platforms such as Kibana. * Experience with reporting platforms such as DOMO and PowerBI #LI-TW1 #LI-Remote What you can expect from Optiv * A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. * Work/life balance * Professional training resources * Creative problem-solving and the ability to tackle unique, complex projects * Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities. * The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.
    $53k-93k yearly est. Auto-Apply 11d ago
  • Frontend Software Engineer

    Gravwell

    Remote job

    Team: Engineering Reports to: VP of Product Candidates must be US citizens or green card holders. Who We Are Gravwell is a full-stack security and observability platform built for people who need answers from their data-fast. Whether you're hunting threats, investigating incidents, or validating system health, Gravwell gives you the tools and performance to stay ahead. We're on a mission to simplify the SIEM experience without sacrificing power or flexibility. What You'll Do The Frontend Software Engineer supports Gravwell's software engineering group which is responsible for the design, development, and testing of the Gravwell product and will report to the VP of Product. Candidates must be self-motivated, comfortable working remotely, willing to learn and to tackle tough challenges. The Gravwell product is a highly dynamic data analysis and visualization platform designed to process and display large sets of unstructured data and to manage automation tasks. Candidates must be comfortable developing on Linux, have 3 years of experience with TypeScript, web application frameworks, and REST APIs. Candidates should be able to demonstrate a strong understanding of software design, software development life cycles, unit testing, and end-to-end testing. Your Responsibilities Responsive Angular Web Application Development Documentation of software, user interfaces, and APIs Internationalization / localization Profiling and optimizing performance Testing of frontend web application What We're Looking For A qualified candidate must be well versed in TypeScript, Angular, and REST. No AI-generated code is allowed in the production code base, so the candidate will need to be able to work independently of external AI services. The position requires a candidate that takes ownership of problems and works with the team to efficiently produce effective, well-tested solutions. Good candidates bring new ideas to the team and strive to improve the product. The position is remote and requires minimal travel, but candidates should be available during regular business hours. A reliable internet connection is required. Strong communication skills are necessary to effectively interact with the rest of the team and to participate in customer feedback sessions. Degree in computer science, computer engineering, or similar discipline. 3+ years of experience. Strong web development fundamentals including but not limited to: Strong understanding of JavaScript runtime Angular 16+ (or other modern web application framework) RxJS TypeScript REST APIs JSON HTML / CSS / Responsive design Strong Git skills Client proficiency GitHub pull requests Visualization experience Vega D3 Echarts Familiarity with software development life cycles Defining requirements Software design Implementation Unit testing and e2e testing Strong verbal and written communication skills Fluent in English Nice to Have Docker e2e testing tools (e.g. Playwright, Cypress) State management libraries (e.g. NgRx, Redux) Why Gravwell? Work where your impact is direct, visible, and appreciated Full autonomy and trust to solve problems that we may not have known we had Flexible remote work setup with a strong support culture Access to mission-critical projects and real-world security data Help build a better analytics experience Compensation Base Salary: $90,000 - $220,000 Don't meet every single requirement? That's okay. We believe great teammates can learn new skills. If you bring curiosity, a strong work ethic, and a collaborative mindset, we can teach the rest. Gravwell is built by people who love solving problems together-we'd love to meet you. Remote Position (United States) Gravwell provides our employees with the flexibility to be creative and successful no matter where they are located. We have a flexible approach to work, meaning you can work from home, regardless of where you live within the United States. Gravwell provides flexible benefits and a collaborative work environment. Equal Opportunity Employer Gravwell is an Equal Opportunity Employer. All applicants will be considered for employment without attention to race, color, religion, sexual orientation, gender identity, national origin, veteran or disability status. Gravwell is a progressive and open-minded workplace where we do not tolerate discrimination of any kind.
    $90k-220k yearly Auto-Apply 60d+ ago
  • Security Risk & Compliance Manager

    GWC Warranty 3.5company rating

    Westerville, OH

    We are seeking an experienced Security Risk & Compliance Manager to join our Enterprise Information Security team and reporting to the Director, Information Security. In this role, the Security Risk and Compliance Manager will be responsible for developing, implementing, and overseeing the risk management and compliance program against standards, policies, and compliance requirements to reduce the risk of cyber security threats and ensure compliance with SOC 2 and regulatory compliance. The candidate will work closely with IT and other teams to continually identify risk exposure and implement security controls in support of compliances, possess a strong understanding of security best practice, project management skillsets, a high level of accountability and responsibility, and the proven ability to execute and deliver. Responsibilities * Manage and develop risk management and compliance programs to track and monitor risk to resolution. * Interact and collaborate across the company to assure security controls align with SOC 2 requirements and regulatory compliance. * Regularly monitor, track, and audit SOC 2 controls and other security risks to ensure compliance with requirements such as FTC Safeguards Rule, CCPA, and NYCRR. * Facilitate and ensure compliance with SOC 2 certification and regulatory compliance. * Collaborate with IT and other teams to develop and implement secure processes. * Develop and facilitate security awareness training. * Develop security policy, standard, and process documents. * Conduct security risk assessments. * Conduct regular security audits. * Develop and maintain assessment questionnaires * Stay abreast of relevant security and privacy regulations, laws, technologies, and threats. Qualifications/Desired Skills & Abilities * Must have 10+ years of IT Security experience or related field. * Must have 8+ years of risk and regulatory compliance experience. * Must have 5+ years of leading successful SOC 2 or equivalent certification. * Must demonstrate in-depth knowledge of current security best practice for application and network security. * Must be meticulous and detailed oriented with projects and outputs, including development of reports and management of work. * Additional experience with implementing security frameworks such as NIST or ISO 27001. * Understanding of network and application security best practice. * Familiar with security technologies such SIEM, WAF, vulnerability scanning. * Manage risk and compliance projects/tasks issues to solution. * Outstanding project management and organizational skills to manage multiple security projects. * Must be self-motivated, analytical and possess a problem-solving outlook. * Superior attention to detail and conscientious quality of work product. * Professional demeanor with superior oral and written communication skills Education and Experience * Bachelor's Degree in Information Security, or similar discipline * CISSP or CRISC certification or similar qualifications * Experienced with SOC 2 audits and FTC Safeguards Rule, CCPA, and NYCRR requirements Physical Demands While performing the duties of this job, the employee is regularly required to type and look at a computer screen for long periods of the day. The employee must be able to sit for long periods of time. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed above are representative of the knowledge, skill, and/or ability required. Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Note This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Employee signature below constitutes employee's understanding of the responsibilities and the job qualifications of the position. Employee__________________________________ Date_____________ Automobile Protection Corporation (APCO) is a Drug Free Workplace as well as an Equal Opportunity Employer. Qualified applicants shall be considered for all positions without regard to race, color, sex, religion, national origin, age, disability, veteran status, or any other status protected by federal, state or local law.
    $74k-111k yearly est. 16d ago
  • Principal NOC Operator

    Siltt LLC

    Remote job

    Job DescriptionBenefits: 401(k) 401(k) matching Competitive salary Dental insurance Health insurance Paid time off Training & development Tuition assistance Vision insurance OVERVIEW: SILTT is searching for a dynamic and highly motivated Principal Network Operations Center (NOC) Operatorserving as a Tier III technical resource responsible for advanced troubleshooting, diagnostics, and coordination across complex network environments. This position provides escalation support for Level I and Level II Operators, ensuring rapid restoration of service during Priority 1 and Priority 2 events and driving root-cause analysis for chronic or recurring issues. The Level III Operator also supports proactive network maintenance, change implementation, configuration management, and knowledge transfer to the border NOC team. Acting as the bridge between operations and engineering, this role plays a key part in sustaining network availability, performance, and service reliability. If you are excited by the opportunity to join our team as a Principal NOC Operator, we encourage you to apply today! WHO WE ARE: At SILTT were pushing the limits of infrastructure innovation in the Telecommunications and Information Technology industry. From delivering world-class modular data center facilities to all-hours, 365-day operational response and disaster recovery, our multi-functional team of experts are force multipliers across the infrastructure landscape. We pride ourselves in leading from the front to advise, assist, and accompany our clients through their toughest technological and operational challenges. We always deliver results ( spelled re-SILTTs )! WHY SILTT? At SILTT, objective-driven means first being people-driven. As a small business we know that the ability to achieve our mission demands we take care of our own by providing our team members with a variety of benefits that allow them to live fulfilling, healthy, balanced, meaningful lives. Thats why we believe in offering paid healthcare, ultra-competitive 401K matching, accrued paid time off and fixed holiday leave, continuous learning and professional development incentives, and promote a sustainable work-life balance. A CALL TO ACTION: As we charge ahead in the competitive world of technology and sustainment, we need a strong Principal NOC Operator to support our current and future projects. This critical position will collaborate with fellow SILTT teammates, stakeholders and executive leadership. As we staff up to support a new program, this Principal NOC Operator will have the opportunity to be on the ground floor and help define the trajectory of our future! A DAY IN THE LIFE: In this role, you will support a high-impact Network Operations Center that forms the backbone of enterprise service delivery. This role provides the opportunity to modernize NOC best practices and shape a world-class operations culture that scales while maintaining customer trust and operational excellence. Key responsibilities include, but are not limited to: Incident and Problem Resolution: Serve as the final technical escalation point within the NOC for critical incidents, outages, and complex technical issues. Perform advanced diagnostics on routing, switching, firewalls, and WAN/LAN connectivity (BGP, OSPF, MPLS, VPN, QoS, etc.). Support root-cause analysis (RCA) and implement corrective actions for recurring network problems. Collaborate with Incident managers during P1/P2 events, providing technical direction and restoration leadership. Interface with vendors, carriers, and engineering teams to expedite service restoration or hardware replacement (RMA). 2. Network Maintenance and Change Implementation: Plan and execute approved network maintenance activities following CAB authorization and MOP standards. Conduct firmware upgrades, configuration adjustments, and validation testing on network equipment. Ensure adherence to change control and documentation standards, maintaining rollback and verification plans. Review and validate post-change outcomes, reporting success metrics and identifying improvement opportunities. 3. Monitoring and Optimization: Tune network monitoring thresholds and alerts for noise reduction and precision in event detection. Use NMS and SIEM tools (SolarWind, LogicMonitor, NetBrain, Splunk, etc.) to identify anomalies and performance trends. Recommend and implement proactive measures to enhance network resilience and capacity utilization. Collaborate with QA and Engineering teams to update baselines and improve runbooks. 4. Documentation and Knowledge Sharing: Maintain accurate and version-controlled documentation for configurations, diagrams, and runbooks. Contribute to the continuous improvement of the NOC Knowledge Base (KB). Mentor and train Level I and Level II NOC staff through hands-on guidance and peer review sessions. BASIC QUALIFICATIONS: Bachelors degree in Information Technology, Network Engineering, or related discipline preferred. BICSI certified Technician (TECH) preferred, other BICSI or equivalent certifications may be considered. 10+ years of experience in enterprise network operations, troubleshooting, and maintenance. Strong technical expertise in routing/switching (Cisco, Juniper, Arista, Fortinet, Palo Alto), VPNs, firewalls, and WAN optimization. Deep understanding of TCP/IP, SNMP, BGP, OSPF, VLANs, QoS, and multicast networking principles. Experience with NMS, ITSM, and logging platforms (ServiceNow, SolarWinds, Splunk, LogicMonitor). Working knowledge of scripting or automation tools (Python, Ansible, or similar) preferred. Certifications: CCNP (required), JNCIP, or equivalent advanced vendor certification preferred; ITIL v4 Foundation a plus. SKILLS & COMPETENCIES: Advanced Network Diagnostics and Troubleshooting Root Cause and Problem Analysis Change Implementation and CAB Readiness Mentoring and Technical Leadership Monitoring Optimization and Automation Awareness Documentation Quality and Compliance ABILITY TO WORK REMOTE: The work associated with this role is expected to be performed on-site at our San Diego Area location, though some travel may be required for periodic support as needed.
    $40k-61k yearly est. 5d ago
  • Technology Alliances Manager (USA) - Woman / Man / Non Binary

    Filigran

    Remote job

    🌀 The Company Filigran, founded in October 2022, stands out in the cybertech ecosystem for its commitment to revolutionizing cyber threat management with a proactive approach. Its mission is to develop innovative open-source solutions designed to anticipate cyber threats, identify security gaps, and strengthen organizational security posture. Filigran solutions are now trusted by over 6,000 public and private organizations worldwide. 🎯 The Role Are you passionate about building impactful partnerships and driving strategic technology alliances? At Filigran, we're looking for a Technology Alliances Manager to lead and scale our global network of technology integration partners. This role plays a critical part in accelerating our growth by driving partner engagement, expanding our integrations ecosystem, and increasing market reach through joint value propositions. You'll collaborate cross-functionally with teams including Product, Sales, Marketing, and Engineering to ensure seamless execution from integration scoping to co-selling and go-to-market alignment. We're looking for someone who thrives in a dynamic, startup environment and is excited to build and own a best-in-class technology alliance program from the ground up. Your strategic mindset, technical understanding, and relationship-building skills will be essential in amplifying Filigran's impact in the cybersecurity space. 💼 Your Responsibilities Develop & Formalize the Technology Alliance Program: Lead the creation of strategy, processes, presentation and partnership contracts for Filigran's technology alliances. Drive Ecosystem Growth: Expand our tech integrations ecosystem and maintain a marketplace that connects Filigran customers and community users with relevant intelligence sources and promotes partner exposure. Manage Partner Relationships: Oversee the lifecycle of technology partnerships, from qualification and integration to ongoing collaboration, joint marketing and co-selling. Cross-Functional Collaboration: Work with product, technical, sales, and marketing teams to prioritize integrations, drive joint go-to-market initiatives, and support lead generation. Technical Leadership & Support: Provide partners with technical guidance on Filigran's offerings, access to resources, and oversee partner lead integrations. Measure Partner Contributions: Establish KPIs to assess partner contributions, track revenue and deal flow from partners, and identify growth opportunities. CRM & Market Data Management: Ensure accurate tracking of customer tech adoption in the CRM and provide data-driven insights for strategic decisions. 🤝 Who You'll Work With Reports to the SVP of Global Alliances Works cross-functionally with Product, Engineering, Marketing, Sales and SEs Work closely with product management team on Integration priorities and requirements Engage Tech Alliance Partners, to drive and enhance our integrations and build more market awareness of our joint solution Facilitate co-sales engagements between the sales teams of Filigran and the tech alliance partners Work with our Product and Website team to enhance how our ecosystem is presented on our website and to our community 🧬 Profile We're Looking For Bachelor's degree: Preferably in business, marketing, cybersecurity, or a related field. 10+ years of experience in the cyber security industry, including 5 years managing technology alliance partnerships and integrations. Track Record in Ecosystem Development: Proven experience in building and managing integrations ecosystems, with a focus on driving value through partnerships. Marketing & Sales Collaboration: Demonstrated ability to drive joint marketing activities, events, co-selling, go-to-market strategies, and lead generation, fostering partner engagement. Exceptional Communication & Relationship Building: Excellent interpersonal skills to build strong relationships with internal teams and partners. Cybersecurity Expertise: Familiarity with key cybersecurity systems such as CTI, TIPs, SIEM, and SOAR. Analytical & Data-Driven: Skilled in establishing metrics to track partner contributions, progress, and drive continuous improvements. Strategic Thinking: Ability to identify new opportunities and develop strategic initiatives for ecosystem growth. Self-Motivated & Proactive: Comfortable working independently in a fast-paced environment and taking ownership of projects. Cross-Functional Collaboration: Hands-on experience working with product, sales, marketing, and development teams. Startup Experience: thrives in fast-paced startup environments, requiring one to be self-starter, proactive, growth-oriented, collaborative, and adaptable. 🌱 Why Join Filigran? More than just a job. We're a fast-growing, global, and fully remote company on a mission to empower defense teams to be proactive - through open-source solutions that uncover threats and drive action. ⭐ What we believe We believe we do work that matters - uniting defenders into a global community to make security more open, resilient & collaborative. 💻 How we work That belief fuels how we work - with focus, clarity and high standards. Always with care and respect, never with ego. 🧭 What guides us That focus and care is grounded in our CORE values: Cohesion, Openness, Responsibility, and Equity - the compass that guides our decisions, collaborations, and growth, even when no one's watching. 💰 Compensation & Benefits Competitive pay + equity - everyone shares in our success Remote-first, flexible, and balanced - work that fits your life Your setup, your choice - pick the gear that works for you 🌍 Equal Employment Opportunity We enable cybersecurity through inclusion - from code to culture. At Filigran, we are proud to be an equal opportunity employer. We believe diversity of our people make our products and our team stronger. We welcome talent of every background, identity, and lived experience - regardless of race, color, religion, gender, gender identity or expression, sexual orientation, national origin, age, disability, or veteran status. What matters here is what you bring - not what you look like, where you're from, or how you identify. 🚀 Ready to Join Us? Apply now and help us build the future of the cybersecurity ecosystem - together.
    $118k-169k yearly est. Auto-Apply 60d+ ago
  • Director of Information Security

    National Debt Relief 4.5company rating

    Remote job

    Our Director of Information Security provides strategic leadership and vision for enterprise-wide security operations. This role oversees and matures the organization's operations security program, ensuring alignment with business objectives, regulatory requirements, and industry best practices. The Director partners with senior leadership, technology leaders, and business stakeholders to embed security into products, services, and culture. This position reports to the Vice President of Information Security and leads a growing team (4-6 ICs) of security professionals across operational security, incident response, compliance, and governance. Responsibilities Strategic Leadership & Vision Help define and execute the enterprise information security strategy, ensuring alignment with corporate objectives and customer trust. Serve as an advisor to the various teams, technology leaders, and business stakeholders on emerging threats, risks, and security requirements. Lead the evolution of security as a business enabler and differentiator, ensuring resilience, trust, and compliance are built into tools and operations Team & Program Leadership Manage, mentor, and scale a high-performing security team across security operations, incident response, and data security functions. Establish clear career paths, KPIs, and success metrics to drive accountability, engagement, and professional growth. Foster a culture of continuous improvement, innovation, and proactive risk management. Operational Security & Incident Response Oversee enterprise security operations, including SIEM, log correlation, endpoint security, threat hunting, and vulnerability management. Direct incident response efforts, ensuring effective playbooks, rapid resolution, and post-incident learning. Drive automation, orchestration, and AI/ML-enabled threat detection to increase efficiency and reduce response times. Governance, Risk, & Compliance Partner with the GRC Team with security compliance frameworks (e.g., SOC 2, ISO 27001, PCI-DSS, HIPAA, FedRAMP, etc.) and ensure continuous readiness for audits. Develop and maintain enterprise security procedures, standards, and controls aligned to NIST, CIS, and OWASP frameworks. Participate in third-party risk management, vendor security assessments, and business continuity planning. Innovation & Emerging Technologies Provide guidance on secure adoption of cloud, SaaS, and SASE platforms. Champion responsible and secure use of emerging technologies (e.g., AI/ML, automation, zero trust, secure access). Anticipate future risks and proactively shape organizational security posture. Qualifications Education/Experience 10+ years of progressive information security experience, including significant leadership responsibility. 5+ years leading security teams in enterprise environments. Industry-recognized certifications strongly preferred (CISSP, CCISO, CISM, GSEC, GCIH, CEH, etc.). Required Skills/Abilities Proven success in building and maturing security programs that align with business strategy. Strong knowledge of security technologies (firewalls, DLP, IDS/IPS, MDM, SIEM, EDR, etc.) and modern architectures (SaaS, SASE, Zero Trust). Deep technical foundation across cloud/SaaS systems, network and endpoint security, cloud security, and secure configurations. Familiarity with penetration testing, forensic practices, and threat modeling. Strong executive communication skills with experience presenting to leadership, audit committees, and regulators. Demonstrated ability to lead cross-functional initiatives and drive measurable risk reduction. National Debt Relief Role Qualifications: Computer competency and ability to work with a computer. Prioritize multiple tasks and projects simultaneously. Exceptional written and verbal communication skills. Punctuality expected, ready to report to work on a consistent basis. Attain and maintain high performance expectations on a monthly basis. Work in a fast-paced, high-volume setting. Use and navigate multiple computer systems with exceptional multi-tasking skills. Remain calm and professional during difficult discussions. Take constructive feedback. Compensation Information Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for each position across the US. Within the range, individual pay is determined by work location, job-related skills, experience, and relevant education or training. This good faith pay range is provided in compliance with NYC law and the laws of other jurisdictions that may require a salary range in job postings. The salary for this position is $198,500 - $228,500. About National Debt Relief National Debt Relief was founded in 2009 with the goal of helping an expanding number of consumers deal with overwhelming debt. We are one of the most-trusted and best-rated consumer debt relief providers in the United States. As a leading debt settlement organization, we have helped over 450,000 people settle over $10 billion of debt, while empowering them to lead a healthier financial lifestyle and feel free to live their best life. At National Debt Relief, we treat our clients like real people. Our purpose is to elevate, empower, and transform their lives. Rated A+ by the Better Business Bureau, our goal is to help individuals and families get out of debt with the least possible cost through conducting financial consultations, educating the consumer and recommending the appropriate solution. We become our clients' number one advocate to help them reestablish financial stability as quickly as possible. Benefits National Debt Relief is a team-oriented environment full of rewards and growth opportunities for our employees. We are dedicated to our employee's success and growth within the company, through our employee mentorship and leadership programs. Our extensive benefits package includes: Generous Medical, Dental, and Vision Benefits 401(k) with Company Match Paid Holidays, Volunteer Time Off, Sick Days, and Vacation 12 weeks Paid Parental Leave Pre-tax Transit Benefits No-Cost Life Insurance Benefits Voluntary Benefits Options ASPCA Pet Health Insurance Discount Access to your earned wages at any time before payday National Debt Relief is a certified Great Place to Work ! National Debt Relief is an equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other status protected by law. For information about our Employee Privacy Policy, please see here For information about our Applicant Terms, please see here #LI-REMOTE
    $198.5k-228.5k yearly Auto-Apply 23d ago
  • Observability Manager

    Toast 4.6company rating

    Remote job

    Toast is driven by building the restaurant platform that helps restaurants adapt, take control, and get back to what they do best: building the businesses they love. The Manager, Site Reliability Engineering Observability role at Toast fits within the Observability Enablement & Administration team, which is part of Site Reliability Engineering, responsible for overseeing Toast production services, with a commitment to quality, reliability, and low latency. The Observability Enablement & Administration team is responsible for setting the overall observability strategy, choosing the right tools and technologies, developing best practices, and providing guidance to other teams, while maintaining, governing cost, and administering the observability platform and log pipelines. As a Manager of the Observability Enablement & Administration team, you will provide technical leadership and hands-on contributions, incorporating reliability best practices for programming and scripting, observability, production triage, incident resolution, and retrospective/root cause analysis to maintain the world-class reliability and uptime of our platform. About this roll * (Responsibilities) In this role you will be responsible for the architecture, administration, maintenance, and enhancement of our observability platforms, ensuring optimal performance and availability for our critical security and business operations. Create and drive strategic organization-wide observability initiatives in collaboration with technical leadership and Product Management Drive day-to-day operations of the team and contribute to the development and prioritization of the SRE roadmap for observability initiatives Enable a geographically distributed team of engineers to continue performing at a high level and help increase the impact of their work Manage observability architecture design, support, and platform management Implement strategies to increase observability platform reliability and performance Lead and contribute to initiatives that automate operational toil for observability focused tasks such as those needed for legal and compliance requirements Guide teams to build and maintain systems that are observable Support end-users with training and technical guidance on observability tools and capabilities. Gather and analyze metrics from operating systems and applications that enable development teams with observability insights Champion the use of AI tools and practices to accelerate development, improve team velocity, and pioneer new ways of building - setting the bar for what it means to be an AI-first engineering organization. Do you have the right ingredients* ? (Requirements) Hands-on experience managing an SRE or Observability team, including hiring, mentoring, cross functional collaboration Hands-on coding/scripting experience with Go, Python, etc Deep understanding of observability systems and tools such as APM, RUM, Synthetics, Splunk, OTEL, Log pipelines, SIEM, Terraform etc. Background in leading complex engineering projects in a Scrum environment Direct exposure to cloud infrastructure and SaaS solutions Polyglot technologist/generalist with a thirst for learning AI at Toast At Toast we're Hungry to Build and Learn. We believe learning new AI tools empowers us to build for our customers faster, more independently, and with higher quality. We provide these tools across all disciplines, from Engineering and Product to Sales and Support, and are inspired by how our Toasters are already driving real value with them. The people who thrive here are those who embrace changes that let us build more for our customers; it's a core part of our culture. Our Spread* of Total Rewards We strive to provide competitive compensation and benefits programs that help to attract, retain, and motivate the best and brightest people in our industry. Our total rewards package goes beyond great earnings potential and provides the means to a healthy lifestyle with the flexibility to meet Toasters' changing needs. Learn more about our benefits at ******************************************** *Bread puns encouraged but not required #LI-Remote The base salary range for this role is listed below. The starting salary will be determined based on skills and experience. In addition to base salary, our total rewards components include cash compensation (overtime, bonus/commissions, if eligible), benefits, and equity (if eligible). Pay Range$155,000-$248,000 USD Diversity, Equity, and Inclusion is Baked into our Recipe for Success At Toast, our employees are our secret ingredient-when they thrive, we thrive. The restaurant industry is one of the most diverse, and we embrace that diversity with authenticity, inclusivity, respect, and humility. By embedding these principles into our culture and design, we create equitable opportunities for all and raise the bar in delivering exceptional experiences. We Thrive Together We embrace a hybrid work model that fosters in-person collaboration while valuing individual needs. Our goal is to build a strong culture of connection as we work together to empower the restaurant community. To learn more about how we work globally and regionally, check out: ********************************************* Apply today! Toast is committed to creating an accessible and inclusive hiring process. As part of this commitment, we strive to provide reasonable accommodations for persons with disabilities to enable them to access the hiring process. If you need an accommodation to access the job application or interview process, please contact candidateaccommodations@toasttab.com. ------ For roles in the United States, It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
    $155k-248k yearly Auto-Apply 10d ago
  • IT Systems Engineer

    Nextdoor 4.1company rating

    Remote job

    #TeamNextdoor Nextdoor (NYSE: NXDR) is the essential neighborhood network. Neighbors, public agencies, and businesses use Nextdoor to connect around local information that matters in more than 340,000 neighborhoods across 11 countries. Nextdoor builds innovative technology to foster local community, share important news, and create neighborhood connections at scale. Download the app and join the neighborhood at nextdoor.com. Meet Your Future Neighbors This IT Systems Engineer role is pivotal in designing, building, and maintaining enterprise identity and access management across Okta and integrated SaaS systems. By owning identity governance at scale, including SSO/SCIM integrations, automated employee lifecycle (Joiner/Mover/Leaver), and self-service access workflows, you'll help reduce security risks and improve operational efficiency. Working with stakeholders in Business Technology, People, and Engineering, you'll build event-driven automations, enforce access policies, and maintain SOX/compliance standards through reliable integrations and processes. This work drives strategic growth and supports the company's digital transformation. The Impact You'll Make If you excel at resolving complex Okta and identity issues, thrive as the escalation point for IT support, and enjoy building automation that removes friction for employees, this is the role for you. Your work will ensure reliable, secure access to the tools our teams rely on every day, reduce time-to-resolution for critical incidents, and enhance our team's capabilities through better processes, documentation, and mentorship. Your responsibilities will include: Administer Okta by managing SSO/SAML/OIDC, SCIM provisioning, groups, policies, MFA, and app assignments with clear ownership and audit trails, ensuring security and efficiency that support organizational success Design and operate self-service access workflows through Okta Request conditions, including approval routing, compliance tracking, and Jira integration for visibility and auditability Build and maintain integrations across People (Workday), identity platforms (Okta), and SaaS applications (Google Workspace, Atlassian) using Okta Workflows, Tray.io, Workato, and API/webhook patterns to automate processes and increase efficiency Own end-to-end employee lifecycle automation (Joiner/Mover/Leaver), including provisioning, access grants, and deprovisioning workflows. Document recovery paths for exceptions and verify alignment with the downstream systems Implement secure workarounds for SaaS applications that don't support SSO, including service account management, credential governance, and automated deprovisioning Serve as the escalation point for complex support and/or access-related issues originating from Level 1/2 helpdesk teams Partner with Compliance and Company stakeholders on periodic UARs (access reviews), RBAC tuning, and audit support, using Request Conditions history and ticket linkages What You'll Bring To The Team 3+ years of experience in Okta administration across SSO/SAML/OIDC, SCIM, group mapping, and policies, with a strong understanding of audit/SOX implications and documentation needs 5+ years of IT Support experience with escalation management and documentation Proven hands-on experience with iPaaS and automation platforms (Okta Workflows, Tray.io, Workato) to implement approval flows, listeners, and provisioning logic tied to event triggers Proficiency working with APIs and webhooks to integrate SaaS systems; ability to design workflows with retries and clear error handling paths Administration of SaaS apps like Google Workspace, Atlassian (Jira/Confluence), and Slack in an enterprise setting, aligned to identity governance and service management practices Clear stakeholder communication mindset and strong project management skills, helping align IT initiatives with business priorities and driving cross-functional impact Experience incorporating AI tools (e.g., LLMs like OpenAI, Agents) into everyday processes to improve operational efficiency, empowering you to drive meaningful innovation within the team Experience evolving self‑service models to improve user productivity while preserving scope boundaries Comfort implementing compliant exceptions when SSO is not supported by a vendor, using owner/service accounts with traceability in Okta logs and downstream automation Bonus Points Experience with Okta logging, SIEM monitoring tools (Splunk, etc.), and reporting Okta Certified Administrator or Okta Certified Professional/Consultant Certification Other IT certifications (Jamf, A+, Network+, Google IT Support, etc.) Rewards Compensation, benefits, perks, and recognition programs at Nextdoor come together to create our total rewards package. Compensation will vary depending on your relevant skills, experience, and qualifications. Compensation may also vary by geography. The starting salary for this role is expected to range from $120,000 to $130,000 on an annualized basis, or potentially greater in the event that your 'level' of proficiency exceeds the level expected for the role. We expect to award a meaningful equity grant for this role. With quarterly vesting, your first vest date will take place within 3 months of your start date. When it comes to benefits, we have you covered! Nextdoor employees can choose between a variety of health plans, including a 100% covered employee only plan option, and we also provide a OneMedical membership for concierge care. At Nextdoor, we empower our employees to build stronger local communities. To create a platform where all feel welcome, we want our workforce to reflect the diversity of the neighbors we serve. We encourage everyone interested in our mission to apply. We do not discriminate on the basis of race, gender, religion, sexual orientation, age, or any other trait that unfairly targets a group of people. In accordance with the San Francisco Fair Chance Ordinance, we always consider qualified applicants with arrest and conviction records. For information about our collection and use of applicants' personal information, please see Nextdoor's Personnel Privacy Notice, found here.
    $120k-130k yearly Auto-Apply 8d ago
  • Sr. Manager, Cyber Insider Threat Lead (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat lead to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat lead, you will be responsible for supporting the operational work plans and maturing the services, process and standards to mitigate potential insider threats. What You Will Do: Execute strategies aligned with the overall business goals to drive functional excellence. Create and manage operational plans for the team or department, focusing on short- to medium-term objectives (1-2 years). Act as a recognized authority with deep theoretical and practical knowledge in a specific discipline. Lead the resolution of complex and undefined problems, conducting root cause analyses and extensive investigations. Design and launch new products, processes, or standards that significantly impact business performance and results. Identify opportunities for continuous improvement and implement enhancements to current systems and practices. Interface with senior leaders to discuss strategic initiatives, performance metrics, and critical organizational issues. Collaborate with business units and functions to influence outcomes and gain alignment on new approaches or concepts. Contribute to the development of functional strategies and ensure alignment with broader Cyber Defense goals. Build consensus and influences internal and external stakeholders to adopt new practices or strategies Top of Form Bottom of Form Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum of 10 years of experience, or an Advanced Degree and a minimum of 7 years' experience. Minimum of 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 7 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 124,000 USD - 250,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $112k-158k yearly est. Auto-Apply 57d ago
  • Solution Architect (Security) (Remote - US)

    Atmosera 4.0company rating

    Remote job

    Atmosera empowers businesses to redefine what's possible with modern technology and human expertise. Our exceptional experience across Applications, Data & AI, DevOps, Security, and the Microsoft Azure platform enables organizations to accelerate innovation, enhance security, and optimize operational agility. As a Microsoft Partner with nine specializations, GitHub AI Partner of the Year, a member of the GitHub Advisory Board, and a member of the prestigious Microsoft Intelligent Security Association (MISA), Atmosera expertly delivers cutting-edge, integrated solutions that deliver business value. Are you a deep-seated Microsoft Security expert with a passion for driving strategic business outcomes? We are seeking a highly motivated and client-focused Senior Solution Architect to be a pre-sales technical engine within our Security Solution area. This is a high-impact, client-facing role where you will serve as a technical lead, partnering closely with Atmosera and Microsoft sales teams to guide enterprise and mid-market clients from initial discovery through successful deal closure. You will leverage your comprehensive expertise across the entire Microsoft Security stack-from Defender XDR and Sentinel to Purview and Entra ID-to design sophisticated, cross-domain solutions that address the client's most critical security and business challenges. If you thrive on translating complex technical architecture into compelling, value-driven business proposals and excel in a high performing, collegial co-sell environment, this is your opportunity to take a lead in defining the future of cloud security for our clients. Responsibilities: The successful candidate will be the technical lead responsible for advancing security-focused opportunities, often in partnership with Microsoft sales teams, from qualification through closure. Responsibilities include: Technical Pre-Sales Leadership & Discovery: Lead deep-dive technical discovery sessions with enterprise and mid-market clients to understand current security posture, pain points, business objectives, and technical requirements. Design and articulate comprehensive security solutions utilizing the entire Microsoft Security portfolio (e.g., Microsoft Defender suite, Sentinel, Purview, Entra ID, etc.) to solve client challenges and deliver effective solutions. Solution Design & Scoping: Develop high-level and detailed Statements of Work (SOWs), proposals, and cost estimates, ensuring technical accuracy, feasibility, and alignment with client scope, budget, and desired outcomes. Architect and present integrated, cross-domain solutions that bridge security with Azure Infrastructure (IaaS/PaaS), DevOps, Application Innovation, Data, and AI to demonstrate the holistic value of Atmosera's approach. Microsoft Co-Sell & GTM Enablement: Act as a primary technical point of contact for Microsoft sellers in co-sell motions, leading technical presentations, demonstrations, and Proofs of Concept (PoCs). Successfully position and qualify clients for various Microsoft funding and incentive programs to accelerate deal velocity and drive partner preference. Client & Internal Enablement: Conduct technical workshops, webinars, and thought leadership sessions to educate clients and internal teams on emerging security threats, regulatory compliance (e.g., NIST, ISO, HIPAA), and new Microsoft Security features. Collaborate with Atmosera's delivery teams to ensure a seamless transition from the pre-sales phase to project execution, serving as a technical reference for implementation teams. Required Experience & Skills: A successful candidate will have the following experience & skills: Core Technical Expertise (Security Focus) Deep Microsoft Security Stack Proficiency: Proven, hands-on experience across the core pillars of the Microsoft security portfolio: Cloud Security: Microsoft Defender for Cloud and Azure Networking Security (WAF, Firewalls, NSGs). XDR/SIEM: Microsoft Defender XDR and Microsoft Sentinel for threat detection and response. Identity & Access Management (IAM): Microsoft Entra ID (formerly Azure AD), including Conditional Access, PIM, and Identity Governance. Information Protection: Microsoft Purview (Data Loss Prevention, Compliance). Endpoint: Microsoft Defender for Endpoint and Intune (Device Management). Broad Azure Capability: Demonstrated technical fluency and cross-domain architecture experience in: Azure Infrastructure: Networking, Compute, Storage, and Governance (e.g., Policy, Blueprint). Application & DevOps Security: Secure SDLC, GitHub/Azure DevOps, and container security (e.g., AKS). Data & AI Security: Protecting sensitive data in Azure Data Services and securing AI/ML workflows and models. Consultative & Selling Skills Value-Based Communication: Exceptional ability to translate complex technical concepts and trade-offs into clear, concise business outcomes and ROI justifications for executive-level clients. Active Listening & Qualification: Highly effective at leading consultative discovery sessions, identifying unspoken client needs, and technically qualifying opportunities based on budget, authority, need, and timeline (BANT). Storytelling & Presentation: Polished speaking and presentation skills with the ability to lead whiteboarding sessions and deliver compelling solution workshops. Solution Architecture & Interpersonal Skills Architectural Fluency: Ability to quickly synthesize disparate technical requirements into a cohesive, scalable, and secure target state architecture adhering to the Microsoft Cloud Adoption Framework (CAF) Security Governance model. Fungibility & Breadth: Demonstrated technical curiosity and the ability to engage credibly on non-security topics (Infrastructure, Data, Applications). Co-Sell Partnership: Proven success operating within the Microsoft co-sell motion, building and maintaining trusted relationships with Microsoft technical and sales counterparts to generate pipeline and accelerate deals. Certifications: CISSP and current or recent attainment of advanced Microsoft certifications such as AZ-500 (Azure Security Engineer), SC-200, SC-300, SC-400, and ideally, the AZ-305 (Azure Solutions Architect). Atmosera exists to deliver client value from modern technology and human expertise. Come help build greatness and impact our strategic direction. $150,000 - $185,000 a year We value our employees and are committed to providing a comprehensive and competitive benefits package designed to support your well-being and financial security. Here's what you can look forward to: Financial Security & Growth: Competitive Salary: We offer competitive salaries commensurate with experience and skills. Generous 401(k) Plan: Secure your financial future with our generous 401(k) plan, featuring a 100% company match on your contributions up to 4% of your salary! This is a fantastic opportunity to build your retirement savings with our support. Performance-Based Compensation: Your hard work and dedication will be recognized and rewarded through our performance-based compensation program, which includes bonus potential in addition to your base salary. Health & Well-being: 100% Employer-Paid Health, Vision, and Dental Insurance for employees: Say goodbye to expensive premiums! We cover 100% of the cost of your health, vision, and dental insurance premiums, saving you potentially thousands of dollars each year. Focus on your health, not your healthcare costs. Company-Paid Life, AD&D, Short and Long-Term Disability Insurance: We provide company-paid life, accidental death & dismemberment, and short- and long-term disability insurance to protect you and your family. Time Off & Work-Life Balance: Generous Paid Time Off (PTO): Enjoy a healthy work-life balance with three weeks of paid time off, allowing you to relax, recharge, and pursue your personal interests. This flexible PTO can be used for vacation, personal time, or sick leave. 11 Paid Holidays: We observe 11 paid holidays throughout the year, giving you additional time to spend with family and friends. Community Service Leave: We believe in giving back to the community and offer paid time off for you to volunteer with organizations that are meaningful to you. Additional Perks & Recognition: Employee Recognition and Reward Program: We celebrate and reward outstanding performance and contributions through our employee recognition program. We value your dedication and are committed to showing our appreciation. This is a full-time position in the United States with the ability to work from home, or from one of our many US offices if local. Atmosera is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. All employment is decided on the basis of qualifications, merit, and business need.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $98k-141k yearly est. Auto-Apply 32d ago
  • Senior Product and Solutions Marketing Manager

    Ping Identity 4.7company rating

    Remote job

    At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to celebrate differences so you are empowered to bring your authentic self to work. We're headquartered in Denver, Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management. The Ping Identity Platform underpins secure, seamless identity across customer, workforce, and partner ecosystems and delivers a comprehensive set of identity capabilities. As the Senior Product & Solutions Marketing Manager, you will convert market insight into modular solution stories that span all capabilities-SSO, MFA & passwordless, authorization, orchestration, identity verification, directory, governance, JIT privileged access, threat protection, and more-while collaborating with the Platform PMM to keep a unified platform story. You'll influence platform roadmap, own messaging, orchestrate launches, and equip Sales to win globally. You will report to the Senior Director, Product & Solutions Marketing. You Will: Run a capability‑focused market‑sensing engine: Track competitors and adjacencies at the capability/product level; monitor buyer/developer trends, fraud/abuse patterns, and standards/regulations (e.g., OAuth2/OIDC, SAML, FIDO2/passkeys, SCIM, privacy) and turn signals into actions, POVs, and exec‑ready insights. Own capability & product positioning/messaging and taxonomy: Build modular narratives by audience and use case; maintain consistency across capability/product/deployment naming; ensure message pull‑through on web, sales assets, and regions. Lead product releases for capabilities/products and support high-impact launches: Manage product release intake, communication, and consolidated launch strategy; define tiering, readiness, timelines, and global landing; drive documentation alignment and in‑product release administration & marketing. Create high‑impact content & assets: Produce or lead web pages, datasheets, demos, corporate overview deck slides, reference architectures, case studies, and analyst RFIs and briefings. Shape platform, capability & product roadmap: Partner with Product Management to validate problems with customer proof; recommend prioritization, maintain roadmap communications to internal audiences (Marketing, Sales, Partners) and external audiences (Customers, Analysts). Market deployment options: Define differentiation and buyer guidance for PingOne (multi‑tenant SaaS), Dedicated Tenant SaaS, and Self‑Managed Software (incl. FedRAMP/DoD IL5 where applicable); articulate TCO/ROI, performance, data residency/compliance, and migration paths. Measure & optimize: Request and use product KPI dashboards (pipeline influence, win rate, capability adoption/usage, ARR/attach, deployment‑option mix); partner with marketing, product management, sales engineering and enablement on experiments. You Have: 7-10+ years in B2B product/solutions marketing (enterprise SaaS) with a track record of leading ambiguous, cross‑functional programs and accountability for results. Proven ability to size market opportunity, analyze competitors, and convert insights into capability/product positioning, packaging recommendations, and GTM plans with revenue impact. Executive‑ready communication and storytelling; comfortable engaging customers, partners, analysts, and developer‑adjacent audiences. Strong content & enablement portfolio (plays, battlecards, demo flows, ROI/TCO tools) tied to win‑rate and velocity improvements. Bachelor's degree in marketing, business, or a related field (or equivalent experience). Ability and willingness to travel up to 25%. Bonus Points If You Have: Broad identity background spanning CIAM, Workforce IAM, and B2B/partner use cases; experience with regulated industries. Familiarity with identity standards and ecosystems (OAuth2/OIDC, SAML, FIDO2/passkeys, SCIM, WebAuthn) and integrations (CDPs, martech, SIEM/SOAR, cloud marketplaces). Hands‑on experience with packaging/editions, bundling/attach, and migration programs across deployment models. MBA or advanced degree (strategy/finance/analytics focus) a plus-especially for market sizing, pricing/packaging, and GTM planning. MBA or relevant advanced degree a plus; equivalent strategic operating experience welcomed. Salary Range USA: $143,000 to $153,000 In accordance with Colorado's Equal Pay for Equal Work Act (SB 19-085) the approximate compensation range for this role in Colorado is listed above. Final compensation for this role will be determined by various factors, such as knowledge, skills, and abilities. Life at Ping: We believe in and facilitate a flexible, collaborative work environment. We're growing quickly, but remain true to the innovative, can-do startup values that got us here. Most importantly, we keep hiring talented, smart, fun, and genuinely nice people because that's who we want to succeed with every day. Here are just a few of the things that make Ping special: A company culture that empowers you to do your best work. Employee Resource Groups that create a sense of belonging for everyone. Regular company and team bonding events. Competitive benefits and perks. Global volunteering and community initiatives Our Benefits: Generous PTO & Holiday Schedule Parental Leave Progressive Healthcare Options Retirement Programs Opportunity for Education Reimbursement Commuter Offset (Specific locations) Ping is the collective sum of all our individual experiences, backgrounds and influences and we pride ourselves in growing and learning together. We are committed to building an inclusive and diverse environment where everyone's individuality is respected and everyone has an Identity. In recruiting for new colleagues, we welcome the unique contributions you can bring and encourage you to be your best self. We are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law.
    $143k-153k yearly Auto-Apply 44d ago

Learn more about SIEM jobs

Jobs that use SIEM