Design and implement systems including CCTV, access control, intrusion detection, and biometrics.. Lead zoning layouts, mantrap flows, visitor access, and badging protocols.. Ensure high resiliency with dual-path communications, UPS backups, and penetration testing programs.. Security ecosystems like Genetec, LenelS2, Honeywell, or Avigilon. Remote-first culture with access to WeWork spaces
In your role, you will predominantly be using Rust alongside platform-native languages & APIs to implement high-performance networking code that runs on multiple desktop platforms.. You will also have to interact with other languages, such as Dart, Typescript, and Python.. Experience with systems programming and familiarity with core OS concepts of one or more desktop OSes (macOS, Windows, and Linux). Great experience using lower-level languages, such as Rust, C, C. Athenian Project : In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Director, Senior Cloud Security Architect. KPMG is currently seeking a Director, Senior Cloud Security Architect to join our Global Information Solution Group which is part of KPMG International.. + Minimum ten years of recent experience such as security architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security. + Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Azure Cybersecurity Expert, or equivalent are highly desirable. + In-depth understanding of cloud security principles, best practices, and industry frameworks such as Cloud Security Alliance (CSA), Center for Internet Security (CIS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)
Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center.. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring.. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices.. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
As a Security Engineer, Application Security you will be responsible for identifying and mitigating security vulnerabilities within software applications through building security tools, code reviews, penetration testing, and security assessments.. Perform Security Assessments : Conduct regular security assessments, code reviews, and penetration testing to identify vulnerabilities in applications and software.. Vulnerability Management : Track, analyze, and manage vulnerabilities in applications, providing guidance and support for remediation efforts.. Deep understanding of security technologies, tools, and best practices, including experience with secure coding practices, threat modeling, risk assessments, and incident response.. OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.
5+ years of detection engineering, incident response, or threat hunting experience.. Knowledge of EDR, SIEM, SOAR, or related security tools.. Experience performing security operations or investigations involving large-scale Kubernetes environments.. Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics.. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. Principal Product Manager, AI Security Remote Location: Seattle, WA; San Francisco Bay Area; Austin, TX; or Washington, DC Position Summary HackerOne is seeking an exceptional Product Manager to spearhead the development of our cutting-edge AI Security product portfolio. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.
Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center.. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring.. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices.. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
Develop and manage Google Cloud Platform (GCP) security strategy; use your extensive knowledge of IT security and architecture to create and implement a comprehensive security strategy for GCP and workbench, ensuring it aligns with the firm's goals and addresses evolving threats. Support security operations and incident response by providing expert knowledge of GCP in such activities as incident response, threat hunting, forensic analysis, and remediation; assist with identification of insecure or vulnerable configurations, review security changes, and ensure strong integrated security monitoring. Keep up with the latest cybersecurity practices and technologies, promote skills development within the wider security team by mentoring and leading knowledge-sharing sessions, and provide thought leadership in security monitoring and incident response with GCP. Minimum eight years of recent experience in security architecture, preferably with a specialization in GCP and security tooling integration; deep technical expertise across multiple technical domains, including security incident response. Bachelor's degree from an accredited college or university is preferred; certifications in Certified Information Systems Security Professional (CISSP) and Google Professional Cloud Security Engineer are preferred
Collaborate with various functions on domains such as Vulnerability Management and Penetration Testing, building a unified working model for continuous assurance. Establish and implement standards and criteria following recognized security compliance frameworks for cloud security and governance. In-depth knowledge of security compliance frameworks and privacy regulations (e.g., SOC2, PCI DSS, HITRUST, ISO, CSA Star, TPN, PCI, HIPAA, etc.. Expertise in core organizational processes such as SDLC, Identity/User Access Management, Backup and Disaster Recovery processes, Vulnerability Management, System Monitoring, End Point Security, and Network Operations. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
Sugar Mountain is a creative food company that is home to extraordinary brands like Beecher’s Handmade Cheese, Mishima Reserve, and The Butcher’s Table. Drive cybersecurity, compliance, and risk management, including incident response, data protection, and continuity planning. Expertise in IT infrastructure, cloud platforms, cybersecurity, ERP systems, and enterprise applications (e.g., Windows Server, Microsoft 365, network architecture).. Strategic mindset with the ability to align technology with evolving business needs and priorities.. Sugar Mountain has created the Beecher's Foundation, a non-profit funded by a portion of sales from companies under the Sugar Mountain umbrella.
Piper Companies is seeking a Resident Network Engineer to join a leading Cable Service Provider in Seattle, WA in an On-Site environment.. 5+ years of experience supporting networking and security products in LAN/WAN/Internet environments.. Understanding of security best practices: Stateful firewall, NAT, ALG's, DOS/DDOS mitigation, IPS/IDS, AppFW, SIEM, Threat intelligence.. Strong knowledge of IP service provider protocols: TCP/IP, subnetting, routing protocols (OSPF, IS-IS, MPLS, RSVP, IPv6, BGP), VPNs.. resident engineer, network engineer, SRX, JUNOS, firewall, security, BGP, OSPF, MPLS, IPSEC, NAT, IDS, IPS, SIEM, AppFW, cloud, hybrid cloud, SD-WAN, SASE, network operations, NOC, SOC, TCP/IP, subnetting, routing, switching, JNCIP, JNCIE, Spirent, Ixia, Agilent, hyperconvergence
Identity and Access Management Business Analyst Contract. This position leads the creation of the business architecture and process and manages the business requirements and experience for a common Identity and access management solution for the customer facing digital websites forclient.. Develops security, identity and access management strategy and solutions across customer facing products.. Previous experience and knowledge of risk management methods and their application towards security, identity and access management within a regulated industry.. Knowledge of Identity and Access Management industry trends, standards, and disciplines.
Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts. Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.). A professional portfolio of OSINT related scripts, tools, or frameworks. Demonstrated involvement in the larger OSINT community (please share relevant links). Get notified about new Threat Intelligence Lead jobs in Spokane County, WA.
Oversee the development, management, maintenance, and communication of internal cybersecurity policies, including education, testing, and validation of benchmarks and standards, including but not limited to PCI-DSS. Lead incident response and crisis management efforts, including simulations and post-mortem reviews, to ensure continuous improvement of Aritzia’s cybersecurity posture.. Technical expertise in network security, incident response, threat intelligence, and security architecture, as well as proficiency in leveraging advanced tools and analytics to enhance threat detection, response capabilities, and overall cybersecurity operations.. Our in-house bistro and cafe is a private oasis where employees can enjoy curated, subsidized Everyday Luxury dining. The SET — Our in-office fitness studio and gym with state-of-the-art equipment, custom-created classes and optional personal training.
KPMG is currently seeking a Senior Specialist, Identity and Access Management to join our Managed Services practice.. Diagnose and resolve Privileged Access Management (PAM) incidents, focusing mainly on PAM based on Information Technology Infrastructure Library (ITIL) Incident Management principles. Minimum three years of recent experience in Identity and Access Management (IAM) with minimum one year of recent experience in the IAM domain for Incident Management, Change and Problem Management, Service Request Fulfillment, and the IAM domain within an ITIL managed services context. Bachelor's degree from an accredited college/university in information technology or a related field is required; CyberArk or another equivalent cybersecurity PAM certification is preferred; ITIL certification with a focus on Incident Management is preferred. Clear understanding of PAM processes, controls, and systems, chiefly CyberArk PAM; experience with Microsoft Azure AD, SailPoint Identity Security Cloud (ISC), Microsoft Identity Manager (MIM), Okta, Ping Identity, and Hitachi Password Manager preferred