Auto-apply to these security jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

P logo
PhizenixHillsboro, Oregon
The Security Engineer will focus on hardening and isolating K3s clusters to minimize blast radius in the event of compromise. This includes enforcing Linux security modules (SELinux, AppArmor) , leveraging TPM for secure boot and attestation , implementing least privilege across nodes and workloads , and ensuring multi-tenant isolation within hybrid Kubernetes environments (x86, ARM, accelerators). Responsibilities Security Architecture & Policy Enforcement Design and implement security-first cluster configurations for K3s nodes. Enforce mandatory access control (MAC) using SELinux and AppArmor profiles for pods and system services. Integrate TPM-based attestation and secure boot for cluster nodes to ensure trust in hardware and OS integrity. Establish node, pod, and namespace isolation strategies to reduce lateral movement risk. Harden cluster components (API server, etcd, kubelet) following CIS and NSA Kubernetes security benchmarks. Blast Radius Reduction Define and enforce workload sandboxing strategies (seccomp, AppArmor, SELinux contexts, gVisor/Kata if applicable). Configure minimal privilege policies (RBAC, PodSecurityStandards, NetworkPolicies) to ensure least-privilege execution. Implement namespace, node pool, and hardware partitioning to confine workloads and protect sensitive applications. Apply resource quotas, limits, and scheduling constraints to contain denial-of-service blast radius. Integration with Identity & Secrets Management Work with Security team to ensure strong identity, authentication, and authorization models. Integrate TPM-backed secrets storage and HSM/KMS systems for cryptographic operations. Ensure secure distribution of workload secrets with solutions like SealedSecrets, HashiCorp Vault, or SOPS . Runtime & Supply Chain Security Enforce image signing and verification with cosign or Notary. Integrate SBOM scanning and vulnerability management into CI/CD pipelines. Monitor workloads for runtime anomalies (Falco, Cilium Tetragon, or equivalent). Apply kernel hardening measures (seccomp-bpf, kernel lockdown, IMA/EVM with TPM). Monitoring & Incident Response Build observability hooks for security events (audit logs, syscall monitoring, TPM attestations). Define blast radius response runbooks for compromised pods or nodes. Work with SRE and Security teams to test chaos/security drills simulating breaches. Deliverables K3s cluster baseline hardened with SELinux and AppArmor profiles . TPM-enabled secure boot and node attestation pipeline. Enforced PodSecurityStandards and workload sandboxing (seccomp, gVisor/Kata optional). Documentation of isolation strategies (namespaces, node pools, network segmentation). Audit-ready evidence of compliance with CIS/NSA Kubernetes security benchmarks. Security runbooks for containment and blast radius reduction. Required Skills & Experience Strong knowledge of K3s/Kubernetes internals , especially security features. Hands-on experience with SELinux, AppArmor, seccomp, and Linux capabilities . Experience with TPM (Trusted Platform Module) for secure boot and attestation. Deep understanding of Pod Security (PodSecurityPolicies/Standards, OPA/Gatekeeper/Kyverno) . Experience implementing RBAC, NetworkPolicies, and workload isolation at scale. Proficiency in Linux kernel security mechanisms and debugging. Familiarity with container runtimes (containerd, CRI-O, gVisor, Kata) and their security implications. Strong background in incident response, forensic data collection, and audit logging in Kubernetes. Nice to Have Contributions to Kubernetes SIG-Security or open-source security tooling. Experience with supply chain security frameworks (SLSA, NIST 800-190). Familiarity with confidential computing (TEE/SGX/SEV) for workload isolation. Hands-on with Cilium Tetragon, Falco, or other runtime security tools . Knowledge of air-gapped deployments and hardened Linux distributions (e.g., Flatcar, Bottlerocket).

Posted today

CareBridge logo
CareBridgeIndianapolis, IN
Information Security Executive Advisor (Business Information Security Officer- BISO) Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Ideal candidates will be able to report to one of our Pulse Point locations in Indianapolis, IN or Nashville, TN. Alternate locations may be considered if candidates reside within a commuting distance from an office. Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law. The Information Security Executive Advisor (Business Information Security Officer- BISO) develops strategic and tactical plans for a comprehensive enterprise-wide information security program. Leads the development of policies, technical standards, guidelines, procedures, and other elements of an infrastructure necessary to support information security in compliance with established company policies, regulatory requirements, and generally accepted information security controls. Responsible for the selection and delivery of strategic network security, access control and secure transaction/messaging solutions. How you will make an impact: Establishes architecture oversight and planning for information and network security technologies. Leads development of an information security risk management program that includes business, regulatory, industry practices and technical environment considerations. Establishes strategic vendor relationships for security products and services. Develops Enterprise-wide security incident response plans and strategies that includes integration with business, compliance, privacy, and legal constituents and requirements. Provides advanced level engineering design functions. Provides trouble resolution and serves as point of technical escalation on complex problems. Creates presentations and seeks IT and business management approval and acceptance of significant replacements or reconfigurations of major security technologies serving the Enterprise. Provides technical guidance and leadership to the technical engineers within the organization. Participates in the design of the Enterprise architecture. Proposes opportunities to improve results based on targeted or continuous assessment. Researches relevant trends and activities in healthcare, business, competition and regulatory environments. Recommends strategy adjustments. Participates in Enterprise planning activity, including vendor assessment, technology platform selection and retirement, prioritization and integration. Serves as a technical merger and acquisition lead. Acts as a subject matter expert for executive management. Provides top-tier support for 6 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security. Minimum Requirements: Requires BS/BA in Information Technology or related field of study and a minimum of 10 years of experience in systems administration and security aspects of information systems, access management and network security technologies, network communications, computer networking, telecommunications, systems development and management, hardware, software, data, and people; experience with multiple technical and business disciplines required; or any combination of education and experience, which would provide an equivalent background. Preferred Skills, Capabilities and Experiences: Previous experience leading large security projects for individual business units highly preferred. Expert Business Information Security Liaison experience highly preferred. Ability to operate with ambiguous data to create a strategy and plan preferred. Broad-based experience to plan and design highly complex systems preferred. Expert knowledge and understanding of industry-accepted data processing controls and concepts preferred. Security Certifications such as CISSP and other advanced technical security certifications (e.g. Information Systems Security Architecture Professional, Information Systems Security Engineering Professional, Certification and Accreditation or equivalent certifications) preferred. Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health. Who We Are Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve. How We Work At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business. We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few. Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process. The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws. Elevance Health is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact elevancehealthjobssupport@elevancehealth.com for assistance. Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.

Posted 30+ days ago

Justworks logo
JustworksNew York, NY

$167,500 - $226,300 / year

Who We Are At Justworks, you'll enjoy a welcoming and casual environment, great benefits, wellness program offerings, company retreats, and the ability to interact with and learn from leaders in the startup community. We work hard and care about our most prized asset - our people. We're helping businesses get off the ground by enabling them to focus on running their business. We solve HR issues. We're data-driven and never stop iterating. If you'd like to work in a supportive, entrepreneurial environment, are interested in building something meaningful and having fun while doing it, we'd love to hear from you. We're united by shared goals and shared motivations at Justworks. These are best summed up in our company values, which are reflected in our product and in our team. Our Values If this sounds like you, you'll fit right in. Who You Are Justworks is looking for an experienced, hands-on Senior Security Engineer specializing in AI who will drive and execute the company's AI strategy and Digital Security's objectives. Our ideal candidate has extensive experience building and enhancing security solutions of AI systems that defends against unique AI threats. You have hands-on experience evaluating the security of software systems containing AI features and have designed guardrails to protect our data against AI specific threats. You also have a deep understanding of the fundamentals of computing and development/coding with Ruby on Rails, JavaScript and/or other languages. An ideal candidate should also have experience in *Nix environment and the use of common cybersecurity tools. Your Success Profile What You Will Work On Research AI treads, AI threat landscape, AI vulnerabilities and remediations and AI security control advancement. Evaluate and assess AI tools and play a critical role in AI system management and governance Evaluate existing AI security controls and identify opportunities to enhance the security posture and software designs Collaborate with other security engineers to bring adequate security capabilities to Justworks. Provide technical and architectural guidance on AI to product managers, product engineers, and corporate IT on digital security. Work with the team to execute and deliver on our AI roadmap. This will include but won't be limited to implementing AI security capabilities in AWS and for corporate. Develop AI security architecture and design standards across Justworks applications and infrastructure to promote a standardized set of security requirements, aligning with internal policies. Participates in AI R&D projects and major new AI development initiatives to ensure that appropriate security controls are built into systems prior to production cutover. Drive process improvement and control implementation projects in coordination with the larger Digital Technology team at Justworks. Act as a cross-functional tools and services expert, working with engineering and risk teams to build AI security control requirements Help Cyber Defense Operations triage incidents as needed especially related to AI security within company internal networks as well as in our production environments in AWS. Be the champion for AI implementation within Digital Security, assisting various teams to implement AI models to bring effectiveness and efficiency into security controls, security operations and risk management How You Will Do Your Work As a Senior Security Engineer, how results are achieved is paramount for your success and ultimately result in our success as an organization. In this role, your foundational knowledge, skills, abilities and personal attributes are anchored in the following: Good judgement - the exercise of critical thinking, analyzing and assessing problems and implications, identifying patterns, making connections of underlying issues, understanding risks and developing mitigation strategies, and taking ownership of the outcome. Resourcefulness - taking a can-do approach, even in the face of obstacles and constraints by assessing what's in front of you and effectively and efficiently optimizing what you have, whether it's working on something new or thinking about how to do something better. Teamwork and communication - putting our collective best together through documentation, collaboration, relationship-building, listening, empathy, recruiting, and evangelism. Influence and leadership - fostering a community of knowledge-sharing, collaboration, mentorship, and forward-thinking. Skills and knowledge - the capacity to actively learn and apply specific domain knowledge, know-how, and best practices to continually enhance and improve. In addition, all Justworkers focus on aligning their behaviors to our core values known as COGIS. It stands for: Camaraderie- Day to day you can be seen working together toward a higher purpose. You like to have fun. You're an active listener, treat people respectfully, and have a strong desire to know and help others. Openness- Your default is to be open. You're willing to share information, understand other perspectives, and consider new possibilities. You're curious, ask open questions, and are receptive to thoughts and feedback from others. Grit- You demonstrate grit by having the courage to commit and persevere. You're committed, earnest, and dive in to get the job done well with a positive attitude. Integrity- Simply put, do what you say and say what you'll do. You're honest and forthright, have a strong moral compass, and strive to match your words with your actions while leading by example. Simplicity- Be like Einstein: "Everything should be made as simple as possible, but no simpler." Qualifications 5+ years experience in information security concepts, common technical security controls, and security architecture design principles, ideally in a SaaS environment At least 2+ years of hands-on experience in securing AI systems, evaluating AI threats and implementing AI security controls. Background as a software engineer, security architect, or security engineer with experience implementing security controls in AI environments in AWS. Experience in setting up and deploying AI engineering tools like vector databases, AI model hosting and monitoring tools and in driving security best practices with AI coding assistants (like Claude Code, Cursor, etc.). Solid experience with Secure-SDLC processes and DevSecOps, including secure design, threat modeling, vulnerability management, etc. Experience in monitoring AI systems for security threats and vulnerabilities. Knowledge of AI/ML technologies, frameworks and platforms. Knowledge of regulations and industry best practices related to AI security and data privacy. Familiar with secure coding practices and security scanning technologies Extensive experience in security architecture, system design, and engineering scalable security solutions in a cloud-native (AWS) environment Experience with scripting and automation using languages such as Python, Ruby or Javascript. Proven track record as a strong communicator Strong analytical skills Exceptional organizational skills Technologies used Go, Ruby on Rails, Javascript AI frameworks like Langchain/LangGraph, AI hosting platforms, AI coding assistants (both open source and commercial) and emerging protocol standards like MCP and Agent-to-Agent Protocol. Technical experience with DevOps, Jira, and other agile automation tools Ruby on Rails & Javascript (Preferred) Security Certifications: CISSP, CISM, CRISC, GIAC, CCSP or CEH The base wage range for this position based in our New York City Office is targeted at $167,500.00 to $226,300.00 per year. #LI-Hybrid #LI-CE1 Actual compensation is based on multiple factors that are unique to each candidate, including and not limited to skill set, level of relevant experience, and specific work location. Salary ranges for positions based in other locations may differ based on the cost of labor in that location. For more information about Justworks' Total Reward Philosophy, including all of the perks and benefits we are proud to offer our team members, please visit Total Rewards @ Justworks. Diversity At Justworks Justworks is committed to maintaining a workplace where diversity of identity, culture, and life experience is the norm and is celebrated authentically and respected consistently. Diversity in our work, our people, and our product drives creativity and innovation, entrepreneurial leadership and integrity, competitiveness, and collaboration throughout our business and in the market. We depend on our differences to make our team stronger, our workplace more dynamic, and our product accessible to all of our customers. We're proud to be an equal opportunity employer open to all qualified applicants regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital or familial status, disability, pregnancy, gender identity or expression, veteran status, genetic information, or any other legally protected status. Justworks is fully dedicated to providing necessary support to candidates with disabilities who may require reasonable accommodations. We also provide reasonable accommodations to employees based on their sincerely held religious beliefs, as well as for other covered reasons consistent with applicable federal, state, and local laws. If you're in need of a reasonable accommodation, please reach out to us at accommodations@justworks.com. Your comfort and success matter to us, and we're here to ensure an inclusive experience. Our DEIB Report

Posted 30+ days ago

Lowe's Companies, Inc. logo
Lowe's Companies, Inc.Mooresville, NC
Do your Best Work in Mooresville This position is based at our headquarters in Mooresville, North Carolina. Our corporate office is a space where you can collaborate and do your best work. Take a walk, grab a bite (or a cup of coffee), work out or get a check-up - we invest in you so you can find your inspiration. Your Impact The primary purpose of this role is to lead the implementation and ongoing delivery of information security tools and processes. This includes responsibility for creating, executing, and improving processes and procedures with limited direct guidance from more senior-level security associates. This role solves complex problems while creating and optimizing processes and often takes a lead role in implementing new services and technologies. This role requires a strong understanding of most tools and processes supported by the team, including many of the key integration points with other parts of technology, works mostly independently, and provides coaching and direction to more junior-level associates. As a Senior Analyst of Offensive Security, you will conduct advanced penetration tests and red team assessments across our applications, networks, and systems. You will collaborate with cross-functional teams to analyze security vulnerabilities and provide actionable recommendations for remediation. This role solves complex problems while creating and optimizing processes and often takes a lead role in implementing new services and technologies. What You Will Do Analyze data to detect trends, determine metrics, assess adherence to processes, and make recommendations. And present results to information security and business leaders and/or vendors. Serve as an escalation point and mentor for junior staff. Maintain an awareness of information security news and trends and research current technologies to assist in the development of new capabilities. Consolidate security-related findings, track OKRs, and present results to information security and business leaders and/or vendors. Translate and document business needs into technical requirements and solutions. Advise users and team members on the execution of processes, interpret standards and regulations, and assist with solutions. Design, develop, and maintain custom offensive tooling, including loaders, droppers, malware implants, in-memory execution frameworks, and covert initial access payloads across Windows, Linux, macOS, and cloud-native platforms. Engineer advanced evasion techniques in code, such as syscall stealth, ntdll unhooking, memory laundering, behavioral model evasion, encrypted tasking channels, and dynamic API resolution to defeat modern AI-driven EDR/EDX systems. Plan and execute full-scope red team and adversary emulation engagements, targeting on-prem, cloud, and hybrid environments while maintaining strong operational security and stealth. Reverse engineer defensive mechanisms and modify offensive code to adapt to new detection models, platform protections, and telemetry changes-ensuring tooling remains effective across diverse modern environments. Create reusable internal offensive libraries, including process injection modules, PE/ELF parsing routines, shellcode loaders, encryption wrappers, and cloud identity attack primitives. Prototype, test, and validate new malware techniques in isolated research environments; document behaviors, measure detection surfaces, and integrate promising approaches into operational tooling. Manage and maintain resilient C2 infrastructures-including redirectors, covert channels, and multi-transport communication layers-to emulate sophisticated APT frameworks and tradecraft. Develop, enhance, and standardize offensive testing methodologies, ensuring alignment with current threat landscapes, evolving attacker TTPs, and industry-leading best practices (MITRE ATT&CK, NIST, etc.). Analyze engagement results and produce clear, actionable reporting, effectively communicating technical findings, attack paths, and remediation recommendations to both technical stakeholders and executive leadership. Promote a culture of collaboration, knowledge sharing, and continuous skill development within the offensive security team. Continuously research emerging threats, attack vectors, and defensive advancements, integrating relevant discoveries into future red team operations and tooling. Support improvements to security posture by contributing insights to security policy updates, defensive control enhancements, and incident response strategies based on observed weaknesses and real-world attack patterns Minimum Qualifications Bachelor's degree in computer science, computer information systems, engineering, business administration, cybersecurity, or related field, or equivalent years of experience in lieu of education requirement, if applicable 4 years of experience in information security 2-4 years of experience developing malware techniques and designing preventative measures. Preferred Skills/Education IT experience in the retail industry Hands-on experience on GRC applications & TPRM tools (e.g., Archer, LogicGate, SAP GRC, OneTrust, ProcessUnity, ServiceNow, BitSight, Prevalent, Black Kite, etc.) Experience with vulnerability identification & penetration testing tools Experience with vulnerability management in public/hybrid cloud environments. Experience with IAM technology implementation and operations (e.g., CA, SailPoint, OKTA, SSO, MFA, IGA, Microsoft AD) (specific to IAM role) Experience developing cybersecurity or information assurance policies, standards, awareness training, or equivalent issuances (specific to Security GRC role) Payment Card Industry Internal Security Assessor (PCI ISA) Certified in Risk and Information Systems Control (CRISC) Offensive Security Certified Professional (OSCP) GIAC Penetration Tester Certification (GPEN) Practical Network Penetration Tester (PNPT) eLearnSecurity Certified Professional Penetration Tester (eCPPT) Certified Third-Party Risk Professional (CTPRP) Certified Third Party Risk Assessor (CTPRA) CompTIA PenTest+ Certification Or other relevant information security certifications Where You'll Be Associates are required to relocate to the Charlotte region to foster collaboration and facilitate improved testing and support. Lowe's supports a Flex Office concept where in-person work is required three days per week at the Charlotte Tech Hub Most business meetings are planned around the Eastern time zone. About Lowe's Lowe's Companies, Inc. (NYSE: LOW) is a FORTUNE 50 home improvement company serving approximately 16 million customer transactions a week in the United States. With total fiscal year 2024 sales of more than $83 billion, Lowe's operates over 1,700 home improvement stores and employs approximately 300,000 associates. Based in Mooresville, N.C., Lowe's supports the communities it serves through programs focused on creating safe, affordable housing, improving community spaces, helping to develop the next generation of skilled trade experts, and providing disaster relief to communities in need. For more information, visit www.lowes.com Lowe's is an equal opportunity employer and administers all personnel practices without regard to race, color, religious creed, sex, gender, age, ancestry, national origin, mental or physical disability or medical condition, sexual orientation, gender identity or expression, marital status, military or veteran status, genetic information, or any other category protected under federal, state, or local law.

Posted 2 weeks ago

C logo
Core WeaveNew York, NY

$139,000 - $275,000 / year

CoreWeave is The Essential Cloud for AI. Built for pioneers by pioneers, CoreWeave delivers a platform of technology, tools, and teams that enables innovators to build and scale AI with confidence. Trusted by leading AI labs, startups, and global enterprises, CoreWeave combines superior infrastructure performance with deep technical expertise to accelerate breakthroughs and turn compute into capability. Founded in 2017, CoreWeave became a publicly traded company (Nasdaq: CRWV) in March 2025. Learn more at www.coreweave.com. What You'll Do On this team, you will: You'll tackle security puzzles at cutting-edge scale and complexity You'll collaborate with brilliant engineers who are redefining cloud infrastructure You'll have the freedom and responsibility to innovate, experiment, and influence how we secure our infrastructure In this role, you will: Maintaining and improving critical security tooling such as just-in-time access systems and zero-trust infrastructure Crafting elegant, reusable security frameworks to standardize and simplify security across engineering teams Collaborating across teams to continuously enhance authorization frameworks to keep pace with our rapid growth Building clear, intuitive documentation for security tools to empower self-service across the company Influencing architecture and engineering design discussions with your sharp security insights Sharing ownership through our rotating on-call responsibilities to ensure services stay online Occasionally, "drawing the owl" - figuring out innovative solutions while navigating ambiguous situations Investing in our people is one of our top priorities, and we value candidates who can bring their diversified experiences to our teams. Here are some qualities we've found compatible with our team. We'd love to talk about whether this aligns with your experience and interests and what you're excited to work on next. Who You Are Minimum Qualifications 5+ years of hands-on Linux experience Proficient in Go and/or Python (you can write software in one of these languages) Proven experience building, securing, and deploying containerized applications A track record of creating meaningful technical documentation that teammates actually want to read Familiarity with modern CI/CD practices and Infrastructure-as-Code tooling Preferred Qualifications At least 3 years of hands-on experience securing Kubernetes clusters in a production environment Experience with remote-access solutions like Teleport (real bonus points if you've submitted PRs on their product) Understanding of the SSO protocols, specifically OIDC and SAML Hands-on experience with PKI and mTLS The base salary range for this role is $139,000 to $275,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility). What We Offer The range we've posted represents the typical compensation range for this role. To determine actual compensation, we review the market rate for each candidate which can include a variety of factors. These include qualifications, experience, interview performance, and location. In addition to a competitive salary, we offer a variety of benefits to support your needs, including: Medical, dental, and vision insurance- 100% paid for by CoreWeave Company-paid Life Insurance Voluntary supplemental life insurance Short and long-term disability insurance Flexible Spending Account Health Savings Account Tuition Reimbursement Ability to Participate in Employee Stock Purchase Program (ESPP) Mental Wellness Benefits through Spring Health Family-Forming support provided by Carrot Paid Parental Leave Flexible, full-service childcare support with Kinside 401(k) with a generous employer match Flexible PTO Catered lunch each day in our office and data center locations A casual work environment A work culture focused on innovative disruption Our Workplace While we prioritize a hybrid work environment, remote work may be considered for candidates located more than 30 miles from an office, based on role requirements for specialized skill sets. New hires will be invited to attend onboarding at one of our hubs within their first month. Teams also gather quarterly to support collaboration California Consumer Privacy Act- California applicants only CoreWeave is an equal opportunity employer, committed to fostering an inclusive and supportive workplace. All qualified applicants and candidates will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information. As part of this commitment and consistent with the Americans with Disabilities Act (ADA), CoreWeave will ensure that qualified applicants and candidates with disabilities are provided reasonable accommodations for the hiring process, unless such accommodation would cause an undue hardship. If reasonable accommodation is needed, please contact: careers@coreweave.com. Export Control Compliance This position requires access to export controlled information. To conform to U.S. Government export regulations applicable to that information, applicant must either be (A) a U.S. person, defined as a (i) U.S. citizen or national, (ii) U.S. lawful permanent resident (green card holder), (iii) refugee under 8 U.S.C. § 1157, or (iv) asylee under 8 U.S.C. § 1158, (B) eligible to access the export controlled information without a required export authorization, or (C) eligible and reasonably likely to obtain the required export authorization from the applicable U.S. government agency. CoreWeave may, for legitimate business reasons, decline to pursue any export licensing process.

Posted 30+ days ago

Snowflake logo
SnowflakeBellevue, WA

$176,000 - $253,000 / year

Snowflake is about empowering enterprises to achieve their full potential - and people too. With a culture that's all in on impact, innovation, and collaboration, Snowflake is the sweet spot for building big, moving fast, and taking technology - and careers - to the next level. Build the future of data. Join the Snowflake team. The Anti-abuse team at Snowflake is responsible for protecting Snowflake and our customers from abuse on the Snowflake platform. You will have the opportunity to help set the direction of the anti-abuse roadmap and Product Security while working closely with other teams at Snowflake. As an Anti-Abuse Security Engineer, you will design, build, and operate systems that protect our platform, customers, and data from abuse, misuse, and fraud. You'll work at the intersection of security engineering, data analytics, and machine learning, developing prevention controls, detections, and automation that mitigate abuse activity across our ecosystem. We're at the forefront of the data revolution, committed to building the world's greatest data and applications platform. Our 'get it done' culture allows everyone at Snowflake to have an equal opportunity to innovate on new ideas, create work with a lasting impact, and excel in a culture of collaboration. AS AN ANTI-ABUSE SECURITY ENGINEER AT SNOWFLAKE, YOU WILL: Understand the abuse risks faced by Snowflake and our customers. Design and deploy the anti-abuse controls addressing risks such as Account Take Overs (ATO), data exfiltration, risk around code/data sharing, and other newest and highest future engineering challenges as Snowflake grows. Help illustrate abuse risks, threats and exploits to cross functional teams. Research, plan, and build anti-abuse architectures for Snowflake products and features Provide designs and reference implementations for new anti-abuse features Research new services, controls, or features that can help protect the product and our customers from abuse. OUR IDEAL ANTI-ABUSE SECURITY ENGINEER WILL HAVE: Bachelor's degree in Computer Science or related technical field or equivalent practical experience. 4+ years of experience with anti-abuse space, insider threats, detections, threat hunting and incident response. Understanding of common abuse patterns (e.g., ATO, exfiltration, insider threats, , spam, fraud, privilege misuse). Proficiency in Python, SQL, or a similar language for building detections and data pipelines. In-depth knowledge of anti-abuse solutions, network security, and/or infrastructure security. Experience performing source code reviews across various languages (e.g. Java, Go) Ability to assess engineering designs and architecture diagrams for abuse risks Ability to assess abuse risks within an application or feature Experience communicating abuse risks and roadmaps Experience designing and implementing anti-abuse solutions Experience contributing to the security anti-abuse community such as presenting at conferences or meetups. BONUS POINTS FOR EXPERIENCE WITH THE FOLLOWING: Master's degree or PhD in Computer Science or related technical field. Experience with cloud environments (AWS, GCP, Azure) and their security/abuse detection tooling. Familiarity with ML-based detection systems, feature engineering, or anomaly detection methods. Every Snowflake employee is expected to follow the company's confidentiality and security standards for handling sensitive data. Snowflake employees must abide by the company's data security plan as an essential part of their duties. It is every employee's duty to keep customer information secure and confidential. The estimated base salary range for this role is $176,000 - $253,000. Additionally, this role is eligible to participate in Snowflake's bonus and equity plan. The successful candidate's starting salary will be determined based on permissible, non-discriminatory factors such as skills, experience, and geographic location. This role is also eligible for a competitive benefits package that includes: medical, dental, vision, life, and disability insurance; 401(k) retirement plan; flexible spending & health savings account; at least 12 paid holidays; paid time off; parental leave; employee assistance program; and other company benefits. Snowflake is growing fast, and we're scaling our team to help enable and accelerate our growth. We are looking for people who share our values, challenge ordinary thinking, and push the pace of innovation while building a future for themselves and Snowflake. How do you want to make your impact? For jobs located in the United States, please visit the job posting on the Snowflake Careers Site for salary and benefits information: careers.snowflake.com The following represents the expected range of compensation for this role: The estimated base salary range for this role is $176,000 - $253,000. Additionally, this role is eligible to participate in Snowflake's bonus and equity plan. The successful candidate's starting salary will be determined based on permissible, non-discriminatory factors such as skills, experience, and geographic location. This role is also eligible for a competitive benefits package that includes: medical, dental, vision, life, and disability insurance; 401(k) retirement plan; flexible spending & health savings account; at least 12 paid holidays; paid time off; parental leave; employee assistance program; and other company benefits. To comply with pay transparency requirements and other statutes, you can notify us if you believe that a job posting is not compliant by completing this form.

Posted 30+ days ago

Adventist HealthCare logo
Adventist HealthCareSilver Spring, MD

$19 - $25 / hour

White Oak Medical Center If you are a current Adventist HealthCare employee, please click this link to apply through your Workday account. Adventist HealthCare seeks to hire a Security Officer who will embrace our mission to extend God's care through the ministry of physical, mental and spiritual healing. As a Security Officer you will: Ensure a safe environment for our patients, staff, visitors, physicians and volunteers Ensure quality outcomes for security department by communicating effectively with security, staff and the public Conducts foot patrols of the facility and parking areas. Conducts vehicular patrols of the parking areas and off site locations Assists with restraining violent patients Use time and resources in a financially responsible manner Foster group cohesiveness within the security department Portrays a positive image of the organization. Qualifications include: High School Diploma or equivalent Previous security experience, preferably in a hospital setting Preferred Must possess a US Driver's License Active American Heart Association Basic Life Support (BLS) certification required Must be able to respond to physically demanding emergency calls Work Schedule: Day Shift: 8am-4pm, Every Weekend, Days off during the week. Pay Range: $19.21 - $24.90 If the salary range is listed as $0 or if the position is Per Diem (with a fixed rate), salary discussions will take place during the screening process. Under the Fair Labor Standards Act (FLSA), this position is classified as: United States of America (Non-Exempt) At Adventist HealthCare our job is to care for you. We do this by offering: Work life balance through nonrotating shifts Recognition and rewards for professional expertise Free Employee parking Medical, Prescription, Dental, and Vision coverage for employees and their eligible dependents effective on your date of hire Employer-paid Short & Long-Term Disability, Basic Life Insurance and AD&D, (short-term disability buy-up available) Paid Time Off Employer retirement contribution and match after 1-year of eligible employment with a 3-year vesting period Voluntary benefits include flexible spending accounts, legal plans, and life, pet, auto, home, long term care, and critical illness & accident insurance Subsidized childcare at participating childcare centers Tuition Reimbursement Employee Assistance Program (EAP) support As a faith-based organization, with over a century of caring for the communities in the Maryland area, Adventist HealthCare has earned a reputation for high-quality, compassionate care. Adventist HealthCare was the first and is the largest healthcare provider in Montgomery County. If you want to make a difference in someone's life every day, consider a position with a team of professionals who are doing just that, making a difference. Join the Adventist HealthCare team today, apply now to be considered! COVID-19 Vaccination Adventist HealthCare strongly recommends all applicants to be fully vaccinated for COVID-19 before commencing employment. Applicants may be required to furnish proof of vaccination. Tobacco and Drug Statement Tobacco use is a well-recognized preventable cause of death in the United States and an important public health issue. In order to promote and maintain a healthy work environment, Adventist HealthCare will not hire applicants for employment who either state that they are nicotine users or who test positive for nicotine and drug use. While some jurisdictions, including Maryland, permit the use of marijuana for medical purposes, marijuana continues to be classified as an illegal drug under the federal Controlled Substances Act. As a result, medical marijuana use will not be accepted as a valid explanation for a positive drug test result. Adventist HealthCare will withdraw offers of employment to applicants who test positive for Cotinine (nicotine) and marijuana. Those testing positive are given the opportunity to re-apply in 90 days, if they can truthfully attest that they have not used any nicotine products in the past ninety (90) days and successfully pass follow-up testing. ("Nicotine products" include, but are not limited to: cigarettes, cigars, pipes, chewing tobacco, e-cigarettes, vaping products, hookah, and nicotine replacement products (e.g., nicotine gum, nicotine patches, nicotine lozenges, etc.). Equal Employment Opportunity Adventist HealthCare is an Equal Opportunity/Affirmative Action Employer. We are committed to attracting, engaging, and developing the best people to cultivate our mission-centric culture. Our goal is to have a welcoming, equitable, and safe place to work and grow for all employees, no matter their background. AHC does not discriminate in employment opportunities or practices on the basis of race, ethnicity, color, religion, sex, national origin, age, disability, sexual orientation, gender identity, pregnancy and related medical conditions, protected veteran status, or any other characteristic protected by law. Adventist HealthCare will make reasonable accommodations for applicants with disabilities, in accordance with applicable law. Adventist HealthCare is a religious organization as defined under applicable law; however, it will endeavor to provide reasonable accommodations for applicants' religious beliefs. Applicants who wish to request accommodations for disabilities or religious belief should contact the Support Center HR Office.

Posted 3 weeks ago

Cox Enterprises logo
Cox EnterprisesRaleigh, NC

$175,300 - $292,100 / year

Company Cox Communications, Inc. Job Family Group Engineering / Product Development Job Profile Director, Cloud Architecture Management Level Director Flexible Work Option Hybrid- Ability to work remotely part of the week Travel % Yes, 50% of the time Work Shift Day Compensation Compensation includes a base salary of $175,300.00 - $292,100.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate's knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program. Job Description At RapidScale, exceptional technology is powered by exceptional people. As a growing leader in secure, reliable managed cloud solutions, we help mid-market through enterprise organizations simplify IT and unleash innovation. With a broad portfolio spanning AWS, Azure, and Google, as well as a full suite of Private Cloud and Cybersecurity solutions, RapidScale enables companies to turn technology into their greatest competitive advantage. Backed by the strength of the Cox family of companies, we offer best-in-class benefits, a commitment to work-life balance, and an award-winning workplace experience. Our consulting practice empowers clients to optimize cloud investments, modernize operations, and drive measurable business outcomes. We are seeking a strategic and hands-on Director to lead our Cloud Security and Compliance practice. This role is ideal for a seasoned security strategist who blends deep technical expertise, cyber resilience, regulatory understanding, and AI driven insight. You will shape and deliver security strategies, compliance readiness, risk assessments, cyber resilience planning, observability, and AI enabled threat modeling engagements across diverse industries. This leader will build and manage a high impact practice at the intersection of cloud security, compliance, AI, and enterprise resilience. You will directly manage a team of consultants and analysts, set clear expectations and performance standards, and spend up to 50 percent of your time on site with clients, at RapidScale or Cox locations, and at key industry events. Key Responsibilities: Practice Leadership Define and evolve the Cloud Security and Compliance service portfolio, including AI supported security assessments and resilience programs with a focus on cyber resilience Build methodologies, frameworks, and accelerators that incorporate AI for threat analysis, anomaly detection, regulatory mapping, and risk scoring Develop cyber resiliency capabilities and offerings Recruit, lead, and mentor a high performing team of consultants and analysts with AI fluency as a core requirement Set goals, coach direct reports, and manage performance across AI enabled and traditional delivery workstreams Allocate team capacity across engagements to meet revenue and margin objectives Client Engagements Lead end to end security assessments, security strategy, compliance readiness evaluations, and resilience planning engagements that leverage AI for predictive insights Advise clients on aligning cloud environments to frameworks such as PCI DSS, HIPAA, GDPR, with AI tools used to accelerate evidence gathering and gap identification Conduct security risk assessments using AI models that support posture analysis, threat detection, and resilience prioritization Deliver executive level briefings that highlight emerging threats, AI informed risk insights, and investment recommendations Guide clients on cyber, observability, DevSecOps maturity, and the integration of AI into operational security practices Oversee remediation, improvement, and automation initiatives Travel to client sites for workshops, executive sessions, and practice delivery oversight Thought Leadership and Enablement Partner with Sales, Product, and Engineering to develop AI-rich security offerings that meet evolving market needs Support pursuits and client presentations as the Cloud Security and AI Resilience subject matter expert Stay ahead of threat intelligence, AI in security operations, cloud provider innovations, and regulatory evolution and translate insights into client and internal guidance Qualifications Bachelor's degree in related discipline and 10 years' experience. The right candidate could also have a different combination, such as a master's degree and 8 years' experience; a Ph.D. and 5 years' experience; or 14 years' experience Minimum 5 years leading teams in a management role with accountability for coaching and performance management Deep expertise in cloud security frameworks, risk assessment, regulatory alignment, and AI supported security operations Experience deploying or leading teams using AI tools such as threat intelligence automation platforms, AI based posture management, or cloud provider native AI security services Experience working within global delivery models including onshore, offshore, and nearshore teams, as well as partner led or hybrid delivery structures Experience leading distributed teams across regions such as India, LATAM, EMEA, or APAC and to integrate global resources into client facing delivery and security programs Ability and willingness to travel up to 50 percent CISSP, CISM, CCSP, or equivalent preferred Benefits The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company's needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave. About Us Cox Communications is all about creating moments of real human connection; and for employees, that's true both in the workplace and in the problems we solve for customers. From building advertising solutions to unleashing IoT technologies to creating an exceptional experience for customers in our retail locations and online, we're creating a world that is smarter and more connected. Benefits of working at Cox may include health care insurance (medical, dental, vision), retirement planning (401(k)), and paid days off (sick leave, parental leave, flexible vacation/wellness days, and/or PTO). For more details on what benefits you may be offered, visit our benefits page. Cox is an Equal Employment Opportunity employer- All qualified applicants/employees will receive consideration for employment without regard to that individual's age, race, color, religion or creed, national origin or ancestry, sex (including pregnancy), sexual orientation, gender, gender identity, physical or mental disability, veteran status, genetic information, ethnicity, citizenship, or any other characteristic protected by law. Cox provides reasonable accommodations when requested by a qualified applicant or employee with disability, unless such accommodations would cause an undue hardship. Applicants must currently be authorized to work in the United States for any employer without current or future sponsorship.

Posted 3 weeks ago

1st Source Bank logo
1st Source BankSouth Bend, IN
POSITION SUMMARY The Senior Information Security Engineer position will work both independently and as part of a team to ensure our security posture by designing, implementing, and maintaining our security toolsets. In addition, you will help foster collaboration with IT teams, management, and other stakeholders to promote and embed security throughout the organization. ESSENTIAL REQUIREMENTS Develops and leads incident response strategies. Safeguards our integration of AI by identifying and mitigating risks. Assesses our current cloud security and propose improvements or solutions. Serves as a subject matter expert for security tools, applications, and processes. Leads SIEM platform management, log integrations, and detection engineering. Champions the integration of cutting-edge security technologies, strategies, and best practices. Participates in project initiatives to ensure security alignment. Maintains awareness of latest trends and developments within an everchanging threat landscape. Provides advanced technical guidance and training to team members. Tracks remediation and follow-up of audit and assessments. Conducts regular security assessments. Proactively identify security gaps and work with both management and staff to address those gaps through processes, policies, or technology. Creates detailed design drawings and documentation for implementations, procedures, and remediation plans. Regular and predictable attendance is an essential requirement of the position. Responsible for the completion of all compliance training related to the position and continuing professional education to maintain professional security certifications. Understands all applicable laws and regulations that apply to the position and comply with the requirements. NON-ESSENTIAL FUNCTIONS Perform all other duties as assigned. EXPERIENCE/SKILLS Required: Five (5) years of experience in security engineering with a strong emphasis on SOAR, detection, and response. Seven (7) to ten (10) years of experience in various security domains (e.g., security operations, network security). Experience creating solutions to enhance visibility, alerting, and reducing risk within IaaS, PaaS, SaaS, and M365 environments. In-depth knowledge of M365 security features and capabilities, with a focus on threat protection, data loss prevention, and compliance. Proven experience with tools such as: Nessus, Nmap, BurpSuite, Metasploit, Responder, CrackMapExec, Certipy, Impacket, and Bloodhound as well as an in-depth knowledge of open-source security projects and tools. Excellent communication and collaboration skills with IT partner teams, business units, and leadership. Excellent analytical and problem-solving skills to identify, assess, and mitigate security risks. Solid foundational understanding of networking concepts. Preferred: Three (3)+ years of experience in the banking or financial services industries. Experience with vulnerability assessment and penetration testing. Experience with a wide range of Azure security architecture, services, and tools. Strong understanding of security frameworks and compliance regulations (e.g., NIST, PCI DSS). Knowledge of cloud service providers and their various technologies and services. Intermediate scripting/programming proficiency in various languages, with a preference for Python, for security orchestration, automation, and code analysis. Strong organizational and time management skills. Strong leadership and project management skills. Strong documentation and report writing skills. Ability to handle multiple tasks in a fast-paced environment. EDUCATION Bachelor's degree in Cybersecurity, Computer Science, or related discipline preferred. CERTIFICATIONS Security certifications such as CISSP, CISM, CEH, OCSP or equivalent preferred. TRAVEL REQUIREMENTS Ability to travel to all locations as needed for meetings, projects, seminars, etc. PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job Reasonable accommodations may be made to enable individuals to perform the essential functions. While performing the duties of this job, the employee is regularly required to use hands and fingers to operate keyboard and other office equipment; reach with hands and arms; and talk or hear. The employee frequently is required to sit, stand and walk. The employee is occasionally required to stoop or kneel. The employee may occasionally lift and/or move up to 10 pounds. EQUIPMENT MS Office, PC, phone, and standard office equipment.

Posted 30+ days ago

Gartner logo
GartnerIrving, TX

$116,000 - $163,000 / year

Hiring near our Irving, TX Center of Excellence with a flexible environment. About Gartner IT: Join a world-class team of skilled engineers who build creative digital solutions to support our colleagues and clients. We make a broad organizational impact by delivering cutting-edge technology solutions that power Gartner. Gartner IT values its culture of nonstop innovation, an outcome-driven approach to success, and the notion that great ideas can come from anyone on the team. About the role Gartner information security teams are a group of passionate information security professionals dedicated to Protecting, Detecting, and Responding to threats. Our team is filled with lifelong learners who are consistently researching ways to better defend and stay ahead of the threats of tomorrow. We are a collaborative group, where good ideas come together whether they come from the most experienced or the newest members of the team. As a Lead Purple Team Engineer on the Security Operations team, you will spearhead collaborative offensive and defensive security initiatives to identify and validate vulnerabilities in Gartner's security controls, procedures and infrastructure. You will use your extensive knowledge of attacker tools and techniques (red team) to improve our capability to detect and respond to threats (blue team). You will play a key role in defending Gartner's network and intellectual properties. Our team is filled with lifelong learners who are consistently researching ways to better defend and stay ahead of the threats of tomorrow. We are a collaborative, flexible group, where good ideas are brought forth and acted upon, whether they come from the most experienced or the newest members of the team. What you will do: Lead Purple Team operations by designing, planning and executing purple team exercises and activities that simulate real-world attack scenarios to test and improve detection and response capabilities. Work closely with teams such as the Security Operations Center (SOC), Threat Intelligence, and Detection Engineering to help identify and remediate gaps in existing controls Develop new, and tune existing attack emulations based on use-cases and strategy, drawing from threat intelligence and current events Play a key role in Threat Modeling exercises Assist and support SOC analysts during ad-hoc Incident Response activities Build and maintain tools and scripts to support purple team activities, including automation of attack simulations and telemetry analysis Assist in the development of innovative and cutting-edge detection content aligned with ATT&CK, Cyber Kill Chain, and various other cyber security frameworks Bring your own ideas and solutions to a fast-paced, growing, and evolving team centered around operational excellence Act as a mentor to junior team members, promote knowledge sharing and contribute to the strategic direction of the Security Operations team. What you will need: 5+ years of relevant Information Security or Penetration Testing experience Deep understanding of offensive techniques and tools Knowledge of MITRE ATT&CK, Cyber Kill Chain or other behavioral information security frameworks Python, Bash, PowerShell or other scripting language experience Bachelor's in Computer Science, Information Security, Engineering, or commensurate experience in Information security is preferred Extensive experience in purple/red teaming with a strong technical foundation in offensive security and adversary emulation. Ability to design, build and scale automated security validation processes Experience with Attack Emulation Platforms Background in cybersecurity incident analysis and investigation Experience utilizing security tools such as EDR (including live response), web proxy, WAF and email security tools Knowledge of cloud environments (AWS, Azure, GCP) Digital Forensics and Incident Response (DFIR) skills Ability to query using various query languages such as SPL, SQL, KQL Ability to communicate effectively and possess excellent prioritization skills. Ability to automate tasks and code solutions to repetitive problems (Python, PowerShell, Bash) Nice to have: Penetration Testing skills Experience working closely with defenders/Blue Team to identify and resolve problems Experience implementing integrations between tools utilizing APIs Experience using SIEM or XDR for log analysis and alert creation Relevant certifications such as OSCP are a plus Threat Hunting experience Who you are: Passion for security and solving tomorrow's problems Willingness to learn new technology platforms Strong team player Innovation mindset - Takes opportunities to make existing processes more efficient and thinks "automation first" Don't meet every single requirement? We encourage you to apply anyway. You might just be the right candidate for this, or other roles! What you will get: Competitive compensation. Limitless growth and learning opportunities. Ongoing mentorship and apprenticeship; Leadership courses, development programs, technical courses, certification opportunities and more! A collaborative and positive culture - join a diverse team of professionals that are as smart and driven as you. A chance to make an impact - your work will contribute directly to our strategy. Enjoy the flexibility of working from home and the energy of collaborating with peers in our dynamic offices. 20+ PTO days plus holidays and floating holidays in your first year. Extensive medical, dental insurance and vision plan. 401K with corporate match, immediate vesting. Health-and-wellness-related allowance programs. Parental leave. Tuition reimbursement. Employee Stock Purchase Plan. Employee Assistance Program. Gartner Gives Charity Match. And much more! #LI-RG2 #LI-Hybrid #LI-Technology Who are we? At Gartner, Inc. (NYSE:IT), we guide the leaders who shape the world. Our mission relies on expert analysis and bold ideas to deliver actionable, objective business and technology insights, helping enterprise leaders and their teams succeed with their mission-critical priorities. Since our founding in 1979, we've grown to 21,000 associates globally who support ~14,000 client enterprises in ~90 countries and territories. We do important, interesting and substantive work that matters. That's why we hire associates with the intellectual curiosity, energy and drive to want to make a difference. The bar is unapologetically high. So is the impact you can have here. What makes Gartner a great place to work? Our vast, virtually untapped market potential offers limitless opportunities - opportunities that may not even exist right now - for you to grow professionally and flourish personally. How far you go is driven by your passion and performance. We hire remarkable people who collaborate and win as a team. Together, our singular, unifying goal is to deliver results for our clients. Our teams are inclusive and composed of individuals from different geographies, cultures, religions, ethnicities, races, genders, sexual orientations, abilities and generations. We invest in great leaders who bring out the best in you and the company, enabling us to multiply our impact and results. This is why, year after year, we are recognized worldwide as a great place to work. What do we offer? Gartner offers world-class benefits, highly competitive compensation and disproportionate rewards for top performers. In our hybrid work environment, we provide the flexibility and support for you to thrive - working virtually when it's productive to do so and getting together with colleagues in a vibrant community that is purposeful, engaging and inspiring. Ready to grow your career with Gartner? Join us. Gartner believes in fair and equitable pay. A reasonable estimate of the base salary range for this role is 116,000 USD - 163,000 USD. Please note that actual salaries may vary within the range, or be above or below the range, based on factors including, but not limited to, education, training, experience, professional achievement, business need, and location. In addition to base salary, employees will participate in either an annual bonus plan based on company and individual performance, or a role-based, uncapped sales incentive plan. Our talent acquisition team will provide the specific opportunity on our bonus or incentive programs to eligible candidates. We also offer market leading benefit programs including generous PTO, a 401k match up to $7,200 per year, the opportunity to purchase company stock at a discount, and more. The policy of Gartner is to provide equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, ancestry, disability, veteran status, or any other legally protected status and to seek to advance the principles of equal employment opportunity. Gartner is committed to being an Equal Opportunity Employer and offers opportunities to all job seekers, including job seekers with disabilities. If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to use or access the Company's career webpage as a result of your disability. You may request reasonable accommodations by calling Human Resources at +1 (203) 964-0096 or by sending an email to ApplicantAccommodations@gartner.com. Job Requisition ID:103382 By submitting your information and application, you confirm that you have read and agree to the country or regional recruitment notice linked below applicable to your place of residence. Gartner Applicant Privacy Link: https://jobs.gartner.com/applicant-privacy-policy For efficient navigation through the application, please only use the back button within the application, not the back arrow within your browser.

Posted 30+ days ago

Figure logo
FigureSan Jose, CA

$150,000 - $350,000 / year

Figure is an AI Robotics company developing a general purpose humanoid. Our humanoid robot, Figure 02, is designed for commercial tasks and the home. We are based in San Jose, CA and require 5 days/week in-office collaboration. It's time to build. We are looking for a Security Engineer to join the Security & Privacy team at Figure, focusing on security of the robot as well as associated backend services. We are looking for excellent security engineers who have experience in breaking and building complex software systems, with experience in AI and embedded systems. Responsibilities Conduct security assessments of applications, embedded systems, back-end services, and business integrations, as well as build tooling for a secure development lifecycle Design technical solutions to mitigate security weaknesses on the robot and our service stack. Work with teams across the company to implement them. Build frameworks and systems to prevent classes of vulnerabilities Hunt for vulnerabilities and insecure coding patterns on our product stack (backend services and robot internal systems) Be a champion for security and user privacy Requirements Experience in several of the following application security domains: penetration testing, vulnerability research, security assessment, secure coding practices, security architecture & design, hardware security Strong software engineering (not scripting or automation) skills in C/C++, Rust, Golang, Python or similar Experience with securing embedded systems, including secure boot, secure identity, OTA, or others Solid foundation in web security, mobile security, or cryptography Ability to collaborate with internal and external stakeholders whilst prioritizing tasks and work independently under minimal supervision. BS in Computer Science, Engineering, Information Systems, or equivalent years of experience in a related technical field 3+ years of experience in the field of application security or related security role Passion for learning and helping others Excellent verbal and written communication skills, with high attention to detail The US base salary range for this full-time position is between $150,000 - $350,000 annually. The pay offered for this position may vary based on several individual factors, including job-related knowledge, skills, and experience. The total compensation package may also include additional components/benefits depending on the specific role. This information will be shared if an employment offer is extended.

Posted 30+ days ago

Obsidian Security logo
Obsidian SecurityPalo Alto, CA

$190,000 - $243,000 / year

Founded in 2017, Obsidian Security was created to close a critical gap: securing the SaaS applications where modern business happens-platforms like Microsoft 365, Salesforce, and hundreds more. Backed by top investors including Greylock, Norwest Venture Partners, and IVP, we've built a complete SaaS security platform to reduce risk, detect and respond to threats, and prevent breaches at the source. Our team includes leaders who helped define the categories of endpoint and identity security at CrowdStrike, Okta, Cylance, and Carbon Black. Now, we're transforming how SaaS is secured-in the era of agentic AI. Today, Obsidian is trusted by global enterprises like Snowflake, T-Mobile, and Pure Storage. We protect more than 200 organizations across North America, Europe, the Middle East, Southeast Asia, Australia, and New Zealand-including many of the world's largest Fortune 1000 and Global 2000 companies. With strong global momentum, a growing partner ecosystem including SentinelOne, Databricks, and Google Cloud, and a major fundraise on the horizon, we're scaling quickly toward long-term growth and IPO readiness. Join us as we define the future of SaaS security! Position Overview: We're looking for a Staff Security Engineer to join our team and help drive our corporate security to the next level and beyond. The ideal candidate for the role will be a highly technical, passionate, team-oriented professional who can evolve our corporate security program by optimizing, maturing, automating, integrating, and evolving our existing comprehensive security controls, processes, and capabilities. In this operational, hands-on role, you will engineer, architect, implement, and operate scalable security solutions and capabilities across the Obsidian global corporate environments. The ideal person for this role must be mission and values-driven, must have an ownership mentality, and must put the well-being of our customers, our teammates, and our organization at the forefront of how they operate. This person must be able to operate and thrive in a dynamic, high-growth startup environment within an established Cybersecurity, GRC, and IT team and programs. This is a critical, high-impact role that will serve as a catalyst for growth for any seasoned cybersecurity professional. The Staff Security Engineer reports to the Chief Information Security Officer, works within the Security Team, partners closely with Product Security, GRC, IT, and Engineering, and will have the support and autonomy to drive maturity and technical excellence within Obsidian's corporate security program and operations. Candidates applying for this sensitive and high-impact role should be highly technical team players with experience in cybersecurity engineering, operations, analysis, incident response, threat and vulnerability management, security posture management, and related disciplines. They should also have the ability to operate across a cloud-native organization with a cybersecurity mission and a modern tech stack. This is a multi-faceted role within a fast-moving startup and will require the successful candidate to possess an ownership mentality, sound judgment, personal responsibility, and initiative. Your Responsibilities Will Include: Corporate Security Operations and Architecture Support IT by enhancing and automating security controls for corporate IT systems, including Google Workspace, Microsoft 365, Salesforce, Meraki, Jamf, Atlassian, Notion, and Slack. Operate, integrate, monitor, and automate security tooling such as endpoint detection and response, SIEM, SaaS Security Platforms, Email Security Platforms, CNAPP, MDM, EPM, and firewall technologies. Define, implement, and enforce secure and hardened patterns for corporate endpoint deployments and operations. Create automation workflows for security incident detection and response across corporate environments. Secure Identity Access Management and Privilege Access Management systems, and ensure that least privilege access and RBAC models are adequately designed and implemented. Ensure corporate password and secrets managers are securely hardened and monitored. Support product penetration testing and corporate red teaming exercises. Support security program continuity and resiliency by maturing security documentation, processes, and runbooks. Build playbooks for recurring security events and operations. Perform regular access reviews and corporate vulnerability management. Drive zero-trust principles in corporate network communication and access control. Security Governance, Risk Management, and Compliance Support the GRC Team with security compliance for standards such as SOC 2 and ISO 27001. Assist the GRC Team with internal and external security audits such as SOC 2 and ISO 27001. Maintain accurate inventories of systems, users, and data flows across the corporate environment. Help drive security awareness and training programs across the company. Conduct Third-party Risk Management in support of the procurement of corporate products and services Support the GRC Team with inbound customer and prospect security reviews and due diligence. Ensuring Obsidian assets are managed to a high-security standard Implement security tooling, automation, and orchestration as needed for detection, response, reporting, and vulnerability management capabilities. Ensure that security tooling is maintained, optimized, and consistently deployed across the Obsidian install base. Develop security threat detection rules and analytics within Obsidian security tooling systems and drive posture security maturity. What We're Looking For A person who is excited about working at an industry-leading cybersecurity startup company with enterprise security needs. At least 6 years of Security Engineering and Operations experience. Proficiency in the following security domains: Endpoint Detection and Response, SIEM, Network Security Monitoring and Hardening, Endpoint Security Management and Hardening, Security Posture Management, Defense in Depth, IAM and PAM, SOAR. Added preference if proficient in scripting for security automation in a language such as Python. Be obsessive about security while doing everything possible to support the overall mission. Experience with security capabilities of modern IT systems such as Google Workspace, Microsoft 365, Slack, Notion, and Jira. Experience working with multiple internal and external stakeholders during incident lifecycles. Experience communicating across a company to drive adherence and education on security best practices, standards, and policies. What We Can Do For You Be part of a team-first, low-ego, mission-focused culture. Provide opportunities for professional development. Provide opportunities to make high-impact contributions to security. Influence the Obsidian product development. Annual conference attendance budget Competitive salary, equity, and health benefits Opportunity to publish research, share non-proprietary code, and present at conferences Reserve your seat on our rocket ship! We are funded by Greylock Partners, Google Ventures, Menlo Ventures, WingVC, Norwest Venture Partners, and are growing fast. This role is a game-changer and is about securing our company and product as we provide cutting-edge capabilities to help organizations increase their security. Employee Benefits Our competitive benefits packages are designed to support our employees' well-being, both at work and at home. Our US based employees enjoy: Competitive compensation with equity and 401k Comprehensive healthcare with dental and vision coverage Flexible paid time off and paid holiday time off 12 weeks of new parent or family leave Personal and professional development resources For more details on our US benefits, or for information on our international benefits, please see here. Pay Transparancy Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location, as well as the knowledge, skills and experience of the candidate. In addition to a competitive base salary, this position is eligible for equity awards and may be eligible for sales commission or incentive compensation based on the role or function within the company. At Obsidian, we are proud to be an equal-opportunity employer. We value diversity and hire for talent, passion, and compassion. In compliance with federal law, all persons hired will be required to submit satisfactory proof of identity and legal authorization. If you have a need that requires accommodation, please contact accommodations@obsidiansecurity.com Information collected and processed as part of any job applications you choose to submit is subject to Obsidian's Applicant Privacy Policy. Base Salary Range $190,000-$243,000 USD

Posted 30+ days ago

6sense logo
6senseBengaluru, CA
Our Mission: 6sense is on a mission to revolutionize how B2B organizations create revenue by predicting customers most likely to buy and recommending the best course of action to engage anonymous buying teams. 6sense Revenue AI is the only sales and marketing platform to unlock the ability to create, manage and convert high-quality pipeline to revenue. Our People: People are the heart and soul of 6sense. We serve with passion and purpose. We live by our Being 6sense values of Accountability, Growth Mindset, Integrity, Fun and One Team. Every 6sensor plays a part in defining the future of our industry-leading technology. 6sense is a place where difference-makers roll up their sleeves, take risks, act with integrity, and measure success by the value we create for our customers. We want 6sense to be the best chapter of your career. Senior Security Engineer- Application Security (AI Security Focus) Location: Bengalaru, India // Pune, India Reporting To: Manager, Security Engineering Function/Dept: Business Technology / Security About the Role You will drive platform security initiatives with a primary focus on securing AI/ML systems and models. You'll partner with engineering, product, and data science teams to ensure robust security for AI-powered features and infrastructure, while maintaining coverage for traditional AppSec domains. Responsibilities & Accountabilities AI Security Leadership: Lead the design and implementation of security controls for AI/ML models, pipelines, and data flows. Vulnerability Management: Ensure coverage of AI/ML and application vulnerabilities using SAST, DAST, dependency scanning, and specialized AI security tools. Threat Modeling & Red Teaming: Conduct comprehensive threat modeling and AI/ML red teaming exercises, including prompt injection, jailbreaking, adversarial attack simulations, and vulnerability assessments for AI systems. Assess risks such as adversarial attacks, model theft, data poisoning, privacy risks, and other emerging threats to AI/ML models and pipelines. Automation & Tooling: Build and maintain automation pipelines for AI/ML security testing and monitoring. Cross-Functional Collaboration: Partner with Engineering, Product, and Data Science to embed security into AI/ML development lifecycles. Incident Response: Support detection, triage, and remediation of AI/ML-specific security incidents. Training & Advocacy: Facilitate secure development training focused on AI/ML risks and best practices. Metrics & Reporting: Track and report status of vulnerabilities, including AI/ML-specific metrics (e.g., model robustness, data integrity). Program Ownership: Design and execute quarterly OKRs for AI/ML security initiatives. Performance Measurement Demonstrates deep understanding of AI/ML security risks and mitigations. Leads identification, triage, and management of AI/ML and application security issues. Establishes routines for updating documentation, runbooks, and dashboards with AI/ML security content. Effectively communicates complex AI/ML security topics to technical and non-technical stakeholders. Educational and Experience Requirements 5+ years in information security, with significant experience in application security and AI/ML security. Hands-on experience securing AI/ML models, pipelines, and data within the AI/ML SDLC. · Familiarity with common AI/ML security threats (adversarial attacks, model inversion, data poisoning). Experience with security tools for AI/ML (e.g., Adversarial Robustness Toolbox, MLFlow security plugins). Development or scripting experience (Python preferred; experience with AI/ML frameworks a plus). Excellent communication skills. Preferred Qualifications Bachelor's degree in a related field. Relevant certifications (e.g., AIRTP+, CAISF, Microsoft AI Security Fundamentals, AWS Certified Security- Specialty, GIAC, CISSP, CEH are highly desirable). Experience working directly with software developers and data scientists to improve code/model security. Competencies and Behaviors Establishes credibility among Engineering and Data Science counterparts. Advocates for AI/ML security best practices. Drives tasks to completion and maintains accuracy of information. Effective prioritization and escalation to management. Our Benefits: Full-time employees can take advantage of health coverage, paid parental leave, generous paid time-off and holidays, quarterly self-care days off, and stock options. We'll make sure you have the equipment and support you need to work and connect with your teams, at home or in one of our offices. We have a growth mindset culture that is represented in all that we do, from onboarding through to numerous learning and development initiatives including access to our LinkedIn Learning platform. Employee well-being is also top of mind for us. We host quarterly wellness education sessions to encourage self care and personal growth. From wellness days to ERG-hosted events, we celebrate and energize all 6sense employees and their backgrounds. Equal Opportunity Employer: 6sense is an Equal Employment Opportunity and Affirmative Action Employers. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to jobs@6sense.com. We are aware of recruiting impersonation attempts that are not affiliated with 6sense in any way. All email communications from 6sense will originate from the @6sense.com domain. We will not initially contact you via text message and will never request payments. If you are uncertain whether you have been contacted by an official 6sense employee, reach out to jobs@6sense.com

Posted 30+ days ago

R logo
Ramp Business CorporationNew York City, NY
About Ramp At Ramp, we're rethinking how modern finance teams function in the age of AI. We believe AI isn't just the next big wave. It's the new foundation for how business gets done. We're investing in that future - and in the people bold enough to build it. Ramp is a financial operations platform designed to save companies time and money. Our all-in-one solution combines payments, corporate cards, vendor management, procurement, travel booking, and automated bookkeeping with built-in intelligence to maximize the impact of every dollar and hour spent. More than 50,000 businesses, from family-owned farms to e-commerce giants to space startups, have saved $10B and 27.5M hours with Ramp. Founded in 2019, Ramp powers the fastest-growing corporate card and bill payment platform in America, and enables over $100 billion in purchases each year. Ramp's investors include Lightspeed Venture Partners, Thrive Capital, Sands Capital, General Catalyst, Founders Fund, Khosla Ventures, Sequoia Capital, Greylock, Redpoint, and ICONIQ, as well as over 100 angel investors who were founders or executives of leading companies. The Ramp team comprises talented leaders from leading financial services and fintech companies-Stripe, Affirm, Goldman Sachs, American Express, Mastercard, Visa, Capital One-as well as technology companies such as Meta, Uber, Netflix, Twitter, Dropbox, and Instacart. Ramp has been named to Fast Company's Most Innovative Companies list and LinkedIn's Top U.S. Startups for more than 3 years, as well as the Forbes Cloud 100, CNBC Disruptor 50, and TIME Magazine's 100 Most Influential Companies. About the Role Ramp's Enterprise Security team is responsible for keeping our people, data, and internal tools safe while enabling a fast‑moving, AI‑driven business. As a Senior Security Analyst (Corporate Security), you'll own and scale core security programs across identity, endpoints, SaaS, and data. You'll be the primary driver for Insider Risk, DLP, SaaS posture, and endpoint security across both our corporate and FedRAMP‑aligned environments-designing strategy, implementing controls, and measuring outcomes. Ramp is agent‑first: we rely heavily on AI assistants and automated workflows. You'll ensure those capabilities are securely rolled out to the business, not blocked. Hybrid in NYC: This role is based in New York City and requires working in‑person at our HQ (near Madison Square Park) at least 2 days per week. This is a senior, hands‑on individual contributor role (IC5), not a people‑management or SOC Tier 1 position. What You'll Do Own core enterprise security programs Lead and continuously improve Insider Risk and DLP across Ramp-from policies and detections to playbooks, case handling, and stakeholder training. Secure SaaS at scale Manage and harden our SaaS stack (SSPM/CASB and native controls): Remediate misconfigurations Remove stale accounts/admins Enforce key rotation and safe OAuth scopes Gate risky apps and integrations Run sovereign / FedRAMP‑aligned environments Operate sovereign Google Workspace and Okta tenants with strict access, monitoring, and logging. Partner with GRC to ensure controls align to NIST 800‑53/800‑171 and FedRAMP‑aligned requirements without slowing down the business. Modernize identity & access Work with IT and Security Engineering to enforce: Phishing‑resistant MFA Device‑aware and context‑aware access Least privilege and just‑in‑time (JIT) patterns SCIM‑based lifecycle management Strong break‑glass access patterns and reviews Harden endpoints and network Help keep our macOS and Windows fleets secure at scale using EDR, MDM, and disk encryption; drive patch SLAs; and enforce ZTNA/SSE policies (e.g., Cloudflare WARP) for secure access to internal resources. Measure, review, and improve Define and track key metrics (coverage, policy efficacy, MTTD/MTTR, configuration drift). Run regular control health reviews and drive remediation with partner teams. Automate and simplify Use scripting, APIs, or workflow tools to reduce manual toil in enterprise security operations (e.g., account hygiene, access reviews, configuration checks, alert triage). Partner & communicate Collaborate closely with IT, Engineering, Legal, People, and GRC. Write clear docs, runbooks, and decision records that make it easy for others to operate and build on your work. What You Need Experience level 3+ years in enterprise/corporate security engineering or operations, with hands‑on ownership of security controls for identity, endpoints, SaaS, or data. You're comfortable being the primary owner of programs, not just following an existing playbook. Eligibility U.S. citizenship is required for this role due to the nature of our sovereign / FedRAMP‑aligned environments. Technical background Practical experience implementing and tuning Insider Risk, DLP, SaaS posture, or endpoint security in a cloud‑first environment. Hands‑on administration of a modern identity provider and collaboration suite-Okta and Google Workspace are ideal, but similar experience (e.g., Azure AD / Entra ID, Microsoft 365) is highly relevant. Familiarity with tools and concepts like EDR, MDM, SSPM/CASB, DSPM, and ZTNA/SSE, and experience hardening macOS and/or Windows at scale. Experience aligning controls to at least one security framework or regulated environment (e.g., FedRAMP, NIST 800‑53/171, SOC 2, ISO 27001) and translating requirements into practical enterprise controls. How you work You can spot gaps, design pragmatic remediations, and drive them to completion across multiple teams. You're comfortable using automation (scripts, workflows, or low‑code tools) to make security more scalable and less manual. You communicate clearly-whether you're writing a runbook, summarizing risk tradeoffs, or explaining a control choice to non‑security partners. You enjoy partnering with IT and Engineering to get things shipped, not just documented. Nice-to-Haves Experience operating sovereign or public‑sector / regulated tenants (e.g., FedRAMP, StateRAMP, or similar). Background scaling security in a high‑growth, cloud‑first startup or scale‑up environment (ideal but not required). Experience securing or enabling AI/agent workflows inside an enterprise. Intermediate scripting skills (e.g., Python, Bash, PowerShell) for automation and integrations. Relevant certifications (e.g., CISSP, CISM, Security+, GIAC) or equivalent real‑world depth. Benefits (for U.S.-based full-time employees) 100% medical, dental & vision insurance coverage for you Partially covered for your dependents One Medical annual membership 401k (including employer match on contributions made while employed by Ramp) Flexible PTO Fertility HRA (up to $5,000 per year) WFH stipend to support your home office needs Wellness stipend Parental Leave Relocation support to NYC or SF (as needed) Pet insurance Referral Instructions If you are being referred for the role, please contact that person to apply on your behalf. Other notices Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Ramp Applicant Privacy Notice

Posted 2 weeks ago

Replit logo
ReplitFoster City, CA
Replit is the agentic software creation platform that enables anyone to build applications using natural language. With millions of users worldwide and over 500,000 business users, Replit is democratizing software development by removing traditional barriers to application creation. About the Role We are looking for a highly skilled PSIRT Engineer to lead the vulnerability response program for Replit's cloud-native AI platform. You will own the lifecycle of security vulnerabilities affecting our products and services-from intake to validation, remediation coordination, and public disclosure. This role requires strong technical ability to reproduce vulnerabilities, deep understanding of web/app/cloud exploit classes, and experience operating bug bounty and coordinated disclosure programs. You will work closely with Engineering, Cloud Security, SecOps, SRE, and IT teams to ensure vulnerabilities are fixed quickly and communicated responsibly. What You'll Do Vulnerability Intake, Triage & Validation Manage intake from bug bounty platforms (HackerOne preferred), customer reports, automated scanners, pentest reports, and coordinated disclosure channels. Independently validate, reproduce, severity-score, and document findings. Identify duplicates and maintain a clean vulnerability records pipeline. Assess relevance and exploitability using OWASP, cloud misconfiguration patterns, and identity/authentication/authorization risks (Oauth, OIDC). Remediation Coordination & SLA Management Work with Engineering, SecOps, IT, SRE, and Cloud Security to confirm product impact and drive remediation. Provide detailed reproduction steps, proof-of-concepts, and technical analyses. Track SLAs, remediation progress, regression testing, and systemic improvements. Support SOC 2, ISO 27001, and pentest evidence needs as part of vulnerability lifecycle governance. Bug Bounty & Vulnerability Disclosure Program Management Design and evolve the bug bounty program, including scope, rules, and reward structures. Manage platform selection, private vs. public launches, and community engagement. Communicate clearly with researchers, provide clarifications, and handle feedback or disputes. Determine reward payouts, bonus decisions, and recognition for top contributors. Coordinated Disclosure & CVE Management Lead the coordinated vulnerability disclosure process for internal and external findings. Negotiate disclosure timelines with researchers and partners. Coordinate CVE assignments and publications, and prepare customer/public advisories. Required Skills Experience running or triaging for bug bounty programs (HackerOne ideally). Strong ability to triage, validate, and reproduce vulnerabilities independently. Deep understanding of web/app/cloud vulnerability classes, OWASP Top 10, misconfigurations, authN/Z issues, etc. Familiarity with cloud platforms (GCP preferred) and SaaS architectures. Strong understanding of CI/CD workflows, code structure, and software engineering fundamentals. Nice to Have Scripting or automation experience (Python, Go, Bash). Pentesting background or exposure to offensive security work. Familiarity with compliance frameworks such as SOC 2 and ISO 27001. Experience authoring public advisories or CVE writeups. Hands-on experience with SIEM, Cloud Logging, and investigative tooling. This is a full-time role that can be held from our Foster City, CA office. The role has an in-office requirement of Monday, Wednesday, and Friday. Full-Time Employee Benefits Include: Competitive Salary & Equity 401(k) Program ️ Health, Dental, Vision and Life Insurance Short Term and Long Term Disability Paid Parental, Medical, Caregiver Leave Commuter Benefits Monthly Wellness Stipend Autonoumous Work Environement In Office Set-Up Reimbursement Flexible Time Off (FTO) + Holidays Quarterly Team Gatherings In Office Amenities Want to learn more about what we are up to? Meet the Replit Agent Replit: Make an app for that Replit Blog Amjad TED Talk Interviewing + Culture at Replit Operating Principles Reasons not to work at Replit To achieve our mission of making programming more accessible around the world, we need our team to be representative of the world. We welcome your unique perspective and experiences in shaping this product. We encourage people from all kinds of backgrounds to apply, including and especially candidates from underrepresented and non-traditional backgrounds.

Posted 4 weeks ago

Universal Health Services logo
Universal Health ServicesTredyffrin, PA
Responsibilities One of the nation's largest and most respected providers of hospital and healthcare services, Universal Health Services, Inc. (NYSE: UHS) has built an impressive record of achievement and performance. Growing steadily since its inception into an esteemed Fortune 300 corporation, annual revenues were $15.8 billion in 2024. During the year, UHS was again recognized as one of the World's Most Admired Companies by Fortune; and listed in Forbes ranking of America's Largest Public Companies. Headquartered in King of Prussia, PA, UHS has approximately 99,000 employees and continues to grow through its subsidiaries. Operating acute care hospitals, behavioral health facilities, outpatient facilities and ambulatory care access points, an insurance offering, a physician network and various related services located all over the U.S. States, Washington, D.C., Puerto Rico and the United Kingdom. www.uhs.com The Corporate Information Services Department is seeking a dynamic and talented Associate Information Security Analyst- Biomedical Security. As a member of the Cybersecurity team, the Associate Information Security Analyst- Biomedical Security supports and assists with the implementation and maintenance of UHS applications or systems intended to protect the confidentiality, integrity and availability of UHS and affiliates Information Services assets. The candidate will be focused on identifying and managing security vulnerabilities in biomedical and clinical technology systems, including connected medical devices and IoT/OT infrastructure. Monitors the resolution of maintenance or enhancement issues assigned by the UHS Customer Support Center or more senior members of the Cybersecurity Team. Implements modifications to existing applications that will effectively accomplish desired objectives, with guidance from more senior team members. Provides technical support to UHS entities as needed. Meets deadlines and ensures continued progress toward assignment completion. Shares experience with other members of team. Key Responsibilities include: System Implementation: Regularly meets with users, vendors, and IS staff to develop/modify system specifications. Assists with the implementations of security solutions and prepares the appropriate documentation. Researches and resolves technical security-related tickets. Adheres to appropriate UHS Project Management standards. Ensures strict adherence to work plans, reporting all serious deviations to management. Assists with the training of users in operating procedures for security solutions. System Maintenance/Support: Researches and resolves tickets including major security solution implementations and upgrades. Lead or support vulnerability management efforts for biomedical and IoT/OT devices. Assists with Patch Management Remediation. Assists with Vendor and Third Party Risk Management. Adheres to UHS Service Level and Change Management Policies. Provides on-call support as scheduled. Establishes and maintains regular communications with user community. Administration and Oversight: Maintains Service Excellence principles. Prepares and submits status reports to supervisor as required. Keeps management well informed of activities, needs, problems. Qualifications Position Requirements: This position requires a Bachelor's degree in Computer Science or Information Systems, with a concentration in cybersecurity highly preferred. No working experience is required. Up to one year of Information Technology or Systems experience would enhance the skills and abilities necessary to perform this job. An Associate's Degree in Computer Science or Information Systems, with a concentration in cybersecurity highly preferred AND one year of relevant Information Technology or Systems experience may be considered in lieu of the Bachelor's degree. Basic understanding of the following or similar information security technologies: Active Directory Intrusion detection/prevention systems (IDS/IPS) Web filtering Vulnerability scanners/remediation Encryption technologies for data at rest and data in transit Mobile device and removable media protection or management systems Forensic analysis Security Information and Event Management (SIEM) systems Common Vulnerabilities and Exposures (CVE) databases Anti-Virus Device Control Basic knowledge of information security best practice standards or frameworks. Basic knowledge of general IS standards and quality methods and metrics. Basic knowledge of project management methods. Basic knowledge of security vulnerability management. Basic knowledge of security penetration testing and ethical hacking best practices. Knowledge of medical device protocols and systems (e.g., HL7, DICOM, PACS, infusion pumps, patient monitors) is a plus. Has a general familiarity with business practices, concepts and terminology sufficient to support the security applications or systems and communicate effectively with colleagues. Able to prioritize multiple tasks and be details oriented. Excellent communication, interpersonal and project management skills This opportunity provides the following: Challenging and rewarding work environment Growth and development opportunities within UHS and its subsidiaries Competitive Compensation Excellent Medical, Dental, Vision and Prescription Drug Plan 401k plan with company match Generous Paid Time Off UHS is a registered trademark of UHS of Delaware, Inc., the management company for Universal Health Services, Inc. and a wholly-owned subsidiary of Universal Health Services, Inc. Universal Health Services, Inc. is a holding company and operates through its subsidiaries including its management company, UHS of Delaware, Inc. All healthcare and management operations are conducted by subsidiaries of Universal Health Services, Inc. To the extent any reference to "UHS or UHS facilities" on this website including any statements, articles or other publications contained herein relates to our healthcare or management operations it is referring to Universal Health Services' subsidiaries including UHS of Delaware. Further, the terms "we," "us," "our" or "the company" in such context similarly refer to the operations of Universal Health Services' subsidiaries including UHS of Delaware. Any employment referenced in this website is not with Universal Health Services, Inc. but solely with one of its subsidiaries including but not limited to UHS of Delaware, Inc. UHS is not accepting unsolicited assistance from search firms for this employment opportunity. Please, no phone calls or emails. All resumes submitted by search firms to any employee at UHS via-email, the Internet or in any form and/or method without a valid written search agreement in place for this position will be deemed the sole property of UHS. No fee will be paid in the event the candidate is hired by UHS as a result of the referral or through other means. EEO Statement All UHS subsidiaries are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and teammates. UHS subsidiaries are equal opportunity employers and as such, openly support and fully commit to recruitment, selection, placement, promotion and compensation of individuals without regard to race, color, religion, age, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, disability status, protected veteran status or any other characteristic protected by federal, state or local laws. We believe that diversity and inclusion among our teammates is critical to our success. Notice At UHS and all our subsidiaries, our Human Resources departments and recruiters are here to help prospective candidates by matching skillset and experience with the best possible career path at UHS and our subsidiaries. We take pride in creating a highly efficient and best in class candidate experience. During the recruitment process, no recruiter or employee will request financial or personal information (Social Security Number, credit card or bank information, etc.) from you via email. The recruiters will not email you from a public webmail client like Hotmail, Gmail, Yahoo Mail, etc. If you are suspicious of a job posting or job-related email mentioning UHS or its subsidiaries, let us know by contacting us at: https://uhs.alertline.com or 1-800-852-3449.

Posted 30+ days ago

Notion logo
NotionSan Francisco, California

$210,000 - $250,000 / year

About Us: Notion helps you build beautiful tools for your life’s work. In today's world of endless apps and tabs, Notion provides one place for teams to get everything done, seamlessly connecting docs, notes, projects, calendar, and email—with AI built in to find answers and automate work. Millions of users, from individuals to large organizations like Toyota, Figma, and OpenAI, love Notion for its flexibility and choose it because it helps them save time and money. In-person collaboration is essential to Notion's culture. We require all team members to work from our offices on Mondays and Thursdays, our designated Anchor Days. Certain teams or positions may require additional in-office workdays. About The Role: Millions of people use Notion, and this number is growing daily. This signifies that a vast user base trusts us to provide a speedy, dependable, and secure experience, something we cherish immensely. Our aim is to continue earning this trust and to constantly surprise our users with the capabilities they can develop within Notion. The Infrastructure Security team’s mission is to establish foundations for a secure-by-default infrastructure serving all of Notion’s technical stacks. We achieve this by architecting solutions that make the secure path the easy path. What You'll Achieve: Proactively enhance the security posture of our AWS accounts and cloud infrastructure. Create secure frameworks for secrets management and AuthN/AuthZ. Design and deploy robust Identity and Access Management (IAM) solutions. Provide guidance and education on security and privacy best practices to our cross-functional partners. Participate in and drive mitigation strategies during security related incident responses. Help scale the engineering organization and mentor engineers on best practices in secure software design and architecture. Skills You'll Need to Bring: Security architecture and expertise: You have at least 5+ years of experience building and maintaining systems to secure cloud architectures, ranging from secrets management to Identity and Access Management solutions. Backend/Infrastructure Development Experience: You have at least 5+ years of experience writing production-grade code. You can contribute to the codebase and architecture to raise the bar on secure systems design. Working in production: You have experience debugging systems in production. You appreciate the skill and challenge of continuously improving production components with minimal user disruption. Pragmatic and business-oriented: You care about business impact and prioritize projects accordingly — you model threat risks and balance the right security investments with the right bottom line outcomes. Not ideological about technology: To you, technologies and programming languages are about tradeoffs. You may be opinionated, but you're not ideological and can learn new technologies as you go. Empathetic communication: You communicate nuanced ideas clearly, whether you're explaining technical decisions in writing or brainstorming in real time. In disagreements, you engage thoughtfully with other perspectives and compromise when needed. Team player: For you, work isn't a solo endeavor. You enjoy collaborating cross-functionally to accomplish shared goals, and you care about learning, growing, and helping others to do the same. Nice to Haves: Experience with AWS security practices, IAM, and zero trust architectures. Data Security or Privacy Engineering experience. Involvement in local or regional security user groups or conferences We hire talented and passionate people from a variety of backgrounds because we want our global employee base to represent the wide diversity of our customers. If you’re excited about a role but your past experience doesn’t align perfectly with every bullet point listed in the job description, we still encourage you to apply. If you’re a builder at heart, share our company values, and enthusiastic about making software toolmaking ubiquitous, we want to hear from you. Notion is proud to be an equal opportunity employer. We do not discriminate in hiring or any employment decision based on race, color, religion, national origin, age, sex (including pregnancy, childbirth, or related medical conditions), marital status, ancestry, physical or mental disability, genetic information, veteran status, gender identity or expression, sexual orientation, or other applicable legally protected characteristic. Notion considers qualified applicants with criminal histories, consistent with applicable federal, state and local law. Notion is also committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, please let your recruiter know. Notion is committed to providing highly competitive cash compensation, equity, and benefits. The compensation offered for this role will be based on multiple factors such as location, the role’s scope and complexity, and the candidate’s experience and expertise, and may vary from the range provided below. For roles based in San Francisco and New York, the estimated base salary range for this role is $210,000 - $250,000 per year. For qualified candidates, Notion may consider a full-time remote candidate. By clicking “Submit Application”, I understand and agree that Notion and its affiliates and subsidiaries will collect and process my information in accordance with Notion’s Global Recruiting Privacy Policy and NYLL 144 . #LI-Onsite

Posted 30+ days ago

A logo
AevexVirginia Beach, Virginia
Work Arrangement On-Site at Fort Belvoir, VA or Fort Lewis, WA with CONUS and OCONUS TDYs up to 120 days. Contractor required to be available for immediate recall (1+ hours) in case of Command Directives. Job Overview The Security Support Expert is responsible for providing comprehensive support in various security areas. Their role involves conducting risk assessments, implementing security measures, monitoring security systems, and ensuring compliance with security policies. They may also be involved in investigating security incidents, managing security clearances, and providing training and guidance to staff members on security matters. The Security Support Expert plays a crucial role in maintaining a secure and safe environment for the organization and its personnel. Essential Functions Provide Physical, Personnel, Special, Special Access Program (SAP) and Industrial Security specialists to assist, monitor, and advise on all aspects of security activities. Plan and assist in implementation of security activities at the Top-Secret and higher classification to ensure USSOCOM personnel (Military, Civilians, and Contractors) and all supported tenant organizations are prepared to operate in non-traditional environments to perform critical contingency tasks Develop written technical approaches and methodologies regarding security proposals. Work independently with no required oversite. Provide advice to the leadership on processes, procedures, technology, and other items of interests Interface with other intelligence organizations to fully prepare teams and infrastructure for potential threats/threat mitigation Perform other duties as assigned. Standard Essential Functions Regular and reliable attendance on a full time basis [or in accordance with posted schedule]. Responsible for exhibiting professional behavior with both internal and external business associates that reflects positively on the company and is consistent with the company's policies and practices. Embodies AEVEX’s cultural values and aligns daily actions with department goals and company culture. Qualifications and Competencies Demonstrated knowledge and experience with personnel background investigations for collateral and special security clearance actions including: Formulating and ensuring compliance with automated information systems security procedures. Suggesting, implementing, and monitoring compliance with special security policies and procedures. Conducting and coordinating the training for special security representatives. Performing as a liaison with Government and industrial security officials overseeing collateral and higher access and badge procedures. Thorough familiarity with all security processes. Must have a working knowledge of security policies and procedures to include either National Industrial Security Program Supplement, DoD 5200.01 Volume 1-3, DoD 5200.02, or DoD 5105.21 Volumes 1-3. Education / Certifications High School Diploma required DOD, DoS, DHS, or equivalent training/course completion preferred. Experience Minimum of six (6) years Physical, Personnel and Special Security experience within the DoD or equivalent Government agencies required, with operational level experience preferred. In-depth knowledge of SOF and or CT personnel and infrastructure security experience is highly desirable. Experience in compartmented programs in the DoD, U.S. Intelligence Community or supporting U.S. Contractors. Experience in security training or security inspections is highly desirable. Experience briefing personnel on security practices, concepts, and programs. Skilled in applying good judgment to resolve security issues. Varied experience in planning/accrediting facilities per the ICD 7051 standard. Physical Requirements The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties the employee is: Frequently required to sit, and to reach to use computers and other office equipment Medically able to deploy to foreign area advanced bases. Able to wear body armor, helmet and other PPE when required. Able to run, walk, crawl moderate distances. Security Clearance Ability to obtain/maintain a TS/SCI DoD clearance, U.S. Citizenship required. About AEVEX AEVEX, headquartered in Solana Beach, California, supports the U.S. national security mission and partner nation needs around the world by providing full-spectrum aviation, remote sensing, and analysis solutions. The company's capabilities include custom design and engineering; rapid prototyping; sensor integration and sustainment; aircraft modification and certification; flight test instrumentation and support; mission operations service; advanced intelligence data processing, exploitation, and dissemination solutions; and tailored hardware and software mission-system tools. AEVEX uses agile and customized approaches to rapidly define, develop, and deliver specialized solutions for airborne special mission needs for the U.S. Government, partner nations, and commercial businesses. AEVEX has major offices in California, Florida, North Carolina, Ohio, and Virginia. AEVEX provides a full suite of comprehensive benefits, including a 401(k)-retirement plan, comprehensive Medical, Dental, Vision, Disability and Life insurance group coverage with a portion of the premiums paid by the company, professional development funds, and an Employee Assistance Plan (EAP) with counseling, legal help, child and elder care support, among other benefits for qualified employees. Equal Employment Opportunity: AEVEX is an Equal Opportunity employer. We are committed to providing equal employment opportunities to all employees and applicants without regard to race, religious creed, color, sex (including pregnancy, breast feeding and related medical conditions), gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship status, military and veteran status, marital status, age, protected medical condition, genetic information, physical disability, mental disability, or any other protected status in accordance with all applicable federal, state and local laws.

Posted 1 week ago

Booz Allen Hamilton logo
Booz Allen HamiltonUsa, New Jersey

$61,900 - $141,000 / year

Systems Security and Network Security Engineer, Mid The Opportunity: Are you looking for an opportunity to advance your experience in network security systems that will safeguard our nation’s airspace? As a systems security and network security engineer, you can identify the tools and technologies needed to assess vulnerabilities and recommend the best solution and security strategy. We need your experience to develop and implement security solutions that will protect our nation’s airspace. On our team, you’ll troubleshoot and analyze complex challenges for customers using your knowledge of network and security devices and applications. You’ll use your curiosity for technology and market trends to further research and develop security solutions. Using your experience, you’ll help assess security threats and implement infrastructure controls. In this role, you’ll closely impact our nation’s aviation systems by securing its infrastructure. With mentoring, challenging hands-on problem-solving, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers. Work with us as we secure and protect our nation’s airspace for the better. What You’ll Work On: Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can’t wait. You Have: 6+ years of experience with enterprise architecture management, cybersecurity architecture planning and analysis, cybersecurity strategic planning and analyses, enterprise and system architecture, new entrants evaluation, technology and capability insertion, and cyber supply chain risk management Knowledge of DevSecOps, Zero T rus t Architecture, NIST, Cloud, and Network Data Flow Ability to develop roadmaps Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements Bachelor's degree in an Engineering field such as Systems Engineering, Civil Engineering, Electrical Engineering, Electronic Engineering, Chemical Engineering, Industrial Engineering, Mechanical Engineering, Aeronautical Engineering, Avionics Engineering, Environmental Engineering, or Computer Engineering Nice If You Have: Experience with FAA, DOT, or aviation systems Experience monitoring government orders and standards to ensure compliant requirements Vetting: Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client . Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page. Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $61,900.00 to $141,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date. Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud. Work Model Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed for the specific role. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.

Posted 1 day ago

StubHub logo
StubHubNew York City, New York

$200,000 - $250,000 / year

StubHub is on a mission to redefine the live event experience on a global scale. Whether someone is looking to attend their first event or their hundredth, we’re here to delight them all the way from the moment they start looking for a ticket until they step through the gate. The same goes for our sellers. From fans selling a single ticket to the promoters of a worldwide stadium tour, we want StubHub to be the safest, most convenient way to offer a ticket to the millions of fans who browse our platform around the world. About the team: StubHub Cloud & Infrastructure Security Engineering is seeking a senior engineer to enhance our security posture within the cloud and infrastructure domains. The perfect candidate will possess extensive experience in cloud security architecture, network security, and infrastructure automation, as well as a familiarity with container and operating system security. Location: Hybrid (3 days in office/2 days remote) – New York, NY or Santa Monica, CA or Aliso Viejo, CA What You'll Do: Develop secure Cloud Account Architectures, focusing primarily on AWS, while understanding and navigating the trade-offs of various cloud architectures. Design and implement network security strategies that leverage security groups, NACLS, routing domains, and multi-tiered subnet architectures to ensure a defense-in-depth approach. Manage critical security logging and monitoring infrastructure for cloud-native and third-party data sources, ensuring their efficient shipping to Data Lakes and integration with visualization platforms. Operate and manage Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms (CWPP), such as Wiz, Orca, Palo Alto Networks Prisma, and Rapid7 ICS. Deploy configurations and infrastructure using Infrastructure as Code (IaC) frameworks, such as Terraform, Cloud Formation, and Pulumi. Develop and implement governance strategies for infrastructure deployment that integrate security best practices and enhance developer productivity. Architect and implement workload identity services, such as SPIRE (Spiffe), in a heterogeneous multi-cloud environment. Architect and maintain PKI and secrets management platforms to ensure secure storage and access to sensitive information. Write and maintain production-quality APIs to automate security processes, benefiting infrastructure and developer workflows. What You've Done: Expert level experience in AWS cloud account architecture. Expert level knowledge in Network Security, including experience with AWS networking primitives: Security Groups, Network Access Control Lists (NACLS), Subnetting, Routing, and egress traffic filtering mechanisms. Expert level proficiency in Identity & Access Management (IAM) Security, including experience with architecting AWS IAM roles & policy architectures for both human and machine access. Expert level communication skills and the ability to work effectively across teams. Expert level experience deploying and maintaining configurations and infrastructure using Terraform. Expert level experience with modern CSPM and CWPP tools (e.g., Wiz, Orca, Prisma, or Rapid7). Intermediate level experience with Secrets / key Management Platforms (e.g., AWS KMS, AWS Secrets Manager, Hashicorp Vault). Expert level experience in building and implementing IaC governance strategies that combine security best practices while enabling developer productivity. Intermediate level experience in architecting & managing Spire (Spiffe) and Service Mesh services. Intermediate level proficiency in Python or Go, and Bash scripting. Intermediate level experience in container & operating system hardening. Intermediate level experience in building & maintaining Web Application Firewalls. Intermediate level familiarity with security frameworks (e.g., PCI DSS, CIS, ISO 27001, NIST CSF). Preferred Skills and Qualifications: Intermediate level experience in architecting & implementing internal PKI & Secrets Management services. Intermediate level knowledge of Kubernetes (K8s) Security foundations, including admission controllers, K8s Network Policies, K8s RBAC, and K8s Ingress architectures. Intermediate level proficiency in DDoS mitigation techniques using AWS Shield, CDN traffic scrubbing, and origin protection mechanisms. Intermediate level proficiency in Azure. What We Offer: Accelerated Growth Environment : An environment designed for swift skill and knowledge enhancement, where you have the autonomy to lead experiments and tests on a massive scale. Top Tier Compensation Package : Competitive base, equity, and upside that tracks with your impact. Flexible Time Off : Enjoy unlimited Flex Time Off, giving you the flexibility to manage your schedule and take time to recharge as needed. Comprehensive Benefits Package : Prioritize your well-being with a comprehensive benefits package, featuring 401k, and premium Health, Vision, and Dental Insurance options. The anticipated gross base pay range is below for this role. Actual compensation will vary depending on factors such as a candidate’s qualifications, skills, experience, and competencies. Base annual salary is one component of StubHub’s total compensation and competitive benefits package, which includes equity, 401(k), paid time off, paid parental leave, and comprehensive health benefits. Salary Range $200,000 — $250,000 USD About Us StubHub is the world’s leading marketplace to buy and sell tickets to any live event, anywhere. Through StubHub in North America and viagogo, our international platform, we service customers in 195 countries in 33 languages and 49 available currencies. With more than 300 million tickets available annually on our platform to events around the world -- from sports to music, comedy to dance, festivals to theater -- StubHub offers the safest, most convenient way to buy or sell tickets to the most memorable live experiences. Come join our team for a front-row seat to the action. For California Residents: California Job Applicant Privacy Notice found here We are an equal opportunity employer and value diversity on our team. We do not discriminate on the basis of race, color, religion, sex, national origin, gender, sexual orientation, age, disability, veteran status, or any other legally protected status.

Posted 2 weeks ago

P logo

Security Engineer (K3s Security & Isolation Specialist)

PhizenixHillsboro, Oregon

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

The Security Engineer will focus on hardening and isolating K3s clusters to minimize blast radius in the event of compromise. This includes enforcing Linux security modules (SELinux, AppArmor), leveraging TPM for secure boot and attestation, implementing least privilege across nodes and workloads, and ensuring multi-tenant isolation within hybrid Kubernetes environments (x86, ARM, accelerators).

Responsibilities

Security Architecture & Policy Enforcement

  • Design and implement security-first cluster configurations for K3s nodes.
  • Enforce mandatory access control (MAC) using SELinux and AppArmor profiles for pods and system services.
  • Integrate TPM-based attestation and secure boot for cluster nodes to ensure trust in hardware and OS integrity.
  • Establish node, pod, and namespace isolation strategies to reduce lateral movement risk.
  • Harden cluster components (API server, etcd, kubelet) following CIS and NSA Kubernetes security benchmarks.

Blast Radius Reduction

  • Define and enforce workload sandboxing strategies (seccomp, AppArmor, SELinux contexts, gVisor/Kata if applicable).
  • Configure minimal privilege policies (RBAC, PodSecurityStandards, NetworkPolicies) to ensure least-privilege execution.
  • Implement namespace, node pool, and hardware partitioning to confine workloads and protect sensitive applications.
  • Apply resource quotas, limits, and scheduling constraints to contain denial-of-service blast radius.

Integration with Identity & Secrets Management

  • Work with Security team to ensure strong identity, authentication, and authorization models.
  • Integrate TPM-backed secrets storage and HSM/KMS systems for cryptographic operations.
  • Ensure secure distribution of workload secrets with solutions like SealedSecrets, HashiCorp Vault, or SOPS.

Runtime & Supply Chain Security

  • Enforce image signing and verification with cosign or Notary.
  • Integrate SBOM scanning and vulnerability management into CI/CD pipelines.
  • Monitor workloads for runtime anomalies (Falco, Cilium Tetragon, or equivalent).
  • Apply kernel hardening measures (seccomp-bpf, kernel lockdown, IMA/EVM with TPM).

Monitoring & Incident Response

  • Build observability hooks for security events (audit logs, syscall monitoring, TPM attestations).
  • Define blast radius response runbooks for compromised pods or nodes.
  • Work with SRE and Security teams to test chaos/security drills simulating breaches.

Deliverables

  • K3s cluster baseline hardened with SELinux and AppArmor profiles.
  • TPM-enabled secure boot and node attestation pipeline.
  • Enforced PodSecurityStandards and workload sandboxing (seccomp, gVisor/Kata optional).
  • Documentation of isolation strategies (namespaces, node pools, network segmentation).
  • Audit-ready evidence of compliance with CIS/NSA Kubernetes security benchmarks.
  • Security runbooks for containment and blast radius reduction.

Required Skills & Experience

  • Strong knowledge of K3s/Kubernetes internals, especially security features.
  • Hands-on experience with SELinux, AppArmor, seccomp, and Linux capabilities.
  • Experience with TPM (Trusted Platform Module) for secure boot and attestation.
  • Deep understanding of Pod Security (PodSecurityPolicies/Standards, OPA/Gatekeeper/Kyverno).
  • Experience implementing RBAC, NetworkPolicies, and workload isolation at scale.
  • Proficiency in Linux kernel security mechanisms and debugging.
  • Familiarity with container runtimes (containerd, CRI-O, gVisor, Kata) and their security implications.
  • Strong background in incident response, forensic data collection, and audit logging in Kubernetes.

Nice to Have

  • Contributions to Kubernetes SIG-Security or open-source security tooling.
  • Experience with supply chain security frameworks (SLSA, NIST 800-190).
  • Familiarity with confidential computing (TEE/SGX/SEV) for workload isolation.
  • Hands-on with Cilium Tetragon, Falco, or other runtime security tools.
  • Knowledge of air-gapped deployments and hardened Linux distributions (e.g., Flatcar, Bottlerocket).

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall