This pay range represents the base hourly rate or base annual full-time salary for all positions in the job grade within which this position falls. The actual base salary offer will depend on a variety of factors including experience, education, geography and other relevant factors. This position is eligible for a CVS Health bonus, commission or short-term incentive program in addition to the base pay range listed above. This position also includes an award target in the company’s equity award program. \u003Cbr /> \u003C/p>\u003Cp style=\"text-align:left\">Our people fuel our future. Our teams reflect the customers, patients, members and communities we serve and we are committed to fostering a workplace where every colleague feels valued and that they belong.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">\u003Cb>Great benefits for great people\u003C/b>\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">We take pride in our comprehensive and competitive mix of pay and benefits – investing in the physical, emotional and financial wellness of our colleagues and their families to help them be the healthiest they can be. In addition to our competitive wages, our great benefits include:\u003C/p>\u003Cul>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cb>Affordable medical plan options,\u003C/b> a \u003Cb>401(k) plan \u003C/b>(including matching company contributions), and an \u003Cb>employee stock purchase plan\u003C/b>.\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cb>No-cost programs for all colleagues \u003C/b>including wellness screenings, tobacco cessation and weight management programs, confidential counseling and financial coaching.\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cb>Benefit solutions that address the different needs and preferences of our colleagues\u003C/b> including paid time off, flexible work schedules, family leave, dependent care resources, colleague assistance programs, tuition assistance, retiree medical access and many other benefits depending on eligibility.\u003C/p>\u003C/li>\u003C/ul>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">For more information, visit \u003Ca target=\"_blank\" href=\"https://jobs.cvshealth.com/us/en/benefits\">\u003Cspan class=\"WJQ0\">https://jobs.cvshealth.com/us/en/benefits\u003C/span>\u003C/a>\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>We anticipate the application window for this opening will close on: 08/22/2025\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state and local laws.\u003C/p>","https://cvshealth.wd1.myworkdayjobs.com/cvs_health_careers/job/WA---Work-from-home/Staff-Security-Engineer_R0667744","CVS Health",{"id":352,"name":350,"urlSafeSlug":353,"logo":354},"499b17a6-17e7-417f-8b0d-ced45f934fa1","CVS-Health","acwwybrxoozoyvddv6wy",[356],{"city":357,"region":358,"country":16},"Washington","Utah","2025-08-15T00:00:00Z",28,"Candidates must have 7+ years of Information Security experience, including 3+ years with Python and SQL or similar languages. A minimum of 5 years of hands-on experience with a major cloud platform (GCP, AWS, Azure) and 4 years of administrative experience with major datalake and/or SIEM platforms are required. A Bachelor's degree from an accredited university or equivalent work experience is also necessary. Preferred qualifications include 7+ years of experience with SOAR and 5+ years of experience with SIEMs like Splunk, ELK, LogRhythm, QRadar, Logpoint, Sentinel, or Chronicle, along with excellent communication and presentation skills.","The Security Engineer will familiarize themselves with the security stack's capabilities and the Security Platform team's standard operating procedures. Responsibilities include onboarding, parsing, and monitoring data for the security platform, troubleshooting platform issues, and collaborating with systems, security architecture, application, database, and storage teams. They will create visualizations, queries, detections, and automations, understand enterprise logs and relevant processes, and participate in the entire software lifecycle, including testing, CI/CD, and production operations. The role also involves documenting platform processes, implementing data quality checks, providing technical guidance to Cyber Defense team members, and working collaboratively with team members on business solutions and implementations. Any other assigned tasks are also part of the role.",{"employment":364,"compensation":366,"experience":367,"visaSponsorship":370,"location":371,"skills":372,"industries":382},{"type":365},{"id":62,"name":63,"description":162},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":368},[369],{"id":167,"name":168,"description":169},{"type":74},{"type":74},[83,373,374,375,376,377,378,379,380,381],"Python","SQL","Cloud Platforms (GCP, AWS, Azure)","Cyber Defense","Data Analysis","Data Visualization","Automation","CI/CD","Software Development Lifecycle",[383,386],{"id":384,"name":385},"718dd966-07ce-4c5c-a644-7b0f8bea9daf","Healthcare",{"id":89,"name":387},"Information Technology",{"id":389,"title":390,"alternativeTitles":391,"slug":407,"jobPostId":389,"description":408,"isReformated":58,"applyUrl":409,"company":410,"companyOption":411,"locations":414,"listingDate":416,"listingSite":360,"isRemote":15,"requirements":417,"responsibilities":418,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":419},"b0f788f0-7b68-4dab-abc9-63a09ebe8b6c","Strategic Advisory Services Consultant (Remote)",[392,393,394,395,396,397,398,399,400,401,402,403,404,405,406],"Cybersecurity Strategy Consultant","Information Security Advisory Consultant","Security Program Development Consultant","Incident Response Strategy Consultant","IT Security Management Consultant","Cybersecurity Risk Advisory Consultant","Security Governance Consultant","Information Security Program Manager","Cybersecurity Consulting Manager","Strategic Security Advisor","Remote Cybersecurity Consultant","Security Operations Strategy Consultant","Cybersecurity Advisory Services Lead","Information Security Strategy Advisor","Cybersecurity Program Architect","strategic-advisory-services-consultant-remote-b0f788f0-7b68-4dab-abc9-63a09ebe8b6c","Employment Type: Full time\n\n\u003Cp style=\"text-align:left\">As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp>\u003Cb>About the Role:\u003C/b>\u003C/p>\u003Cp>CrowdStrike’s Strategic Advisory Services team assists our customers with a wide array of proactive engagements to help enhance security programs, educate employees, and develop tailored cyber initiatives. The Consultant role is one of the primary contributors to engagement delivery, with a strong focus on task-oriented activities, reporting, and supporting engagement leadership to ensure projects are performed on time and to our highest standards. Consultants will also have the opportunity to contribute to thought leadership, methodology development, and other “back of office” tasks, as a secondary function of the role.\u003C/p>\u003Cp>\u003C/p>\u003Cp>\u003Cb>\u003Cspan>Am I a Strategic Consultant Candidate?\u003C/span>\u003C/b>\u003C/p>\u003Cul>\u003Cli>\u003Cp>Do you find yourself keeping up with the latest cyber breaches?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Do you want to help companies protect themselves against malicious adversaries?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you interested in learning your customer’s maturity and pain points to develop a plan to improve?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you looking for opportunities to learn from the best in the business while developing your own skill set?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you comfortable working independently as well as with a team?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you ready to “do the work” while also being given opportunities to contribute to the broader business where possible?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Do you crave new and innovative work that actually matters to your customer?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Do you have strong communication and writing skills?\u003C/p>\u003C/li>\u003Cli>\u003Cp>Are you the smartest person on your current team? Would you prefer to engage peers who challenge you daily?\u003C/p>\u003C/li>\u003C/ul>\u003Cp>\u003C/p>\u003Cp>\u003Cb>\u003Cspan>What You'll Do:\u003C/span>\u003C/b>\u003C/p>\u003Cul>\u003Cli>\u003Cp>Contribute to the delivery of large and complex strategic advisory service engagements, engaging with management-level individuals across a wide range of industry segments.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Assess and develop cybersecurity and incident response programs in a proactive fashion to help mature the security posture of organizations prior to an incident.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Develop cutting-edge scenarios to help customers exercise the full range of their response capabilities.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Produce and ensure delivery of high-quality written and verbal reports, presentations, recommendations, and findings to customer management.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Identify and address emerging trends in cybersecurity, drawing on both government and private sector perspectives.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Contribute thought leadership and experiences to internal programs and teams.\u003C/p>\u003C/li>\u003C/ul>\u003Cp>\u003C/p>\u003Cp>\u003Cb>\u003Cspan>What You'll Need:\u003C/span>\u003C/b>\u003Cbr />\u003Ci>Successful candidates \u003Cspan>will have at least 2-6 years of experience in one or more of the following areas:\u003C/span>\u003C/i>\u003C/p>\u003Cul>\u003Cli>\u003Cp>IT / Security Management Consulting: you’ve held leadership positions and owned relationships with organizational executives as a management or technical consultant. You’ve worked on a range of infosec and IT issues, including both technical cyber security (applying controls, improving architectures, etc.) and operational cyber security (organizational alignment, cyber policy review, etc.)\u003C/p>\u003C/li>\u003Cli>\u003Cp>Security Program Development: you’ve personally contributed to the development, management, and implementation of a security program, helping organizations build, enhance, or recalibrate their plans for a successful future-leaning security program. This may include aspects of developing a SOC, CSIRT, Fusion Center, or several security initiatives that support a centralized security function.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Security Analysis / Operations: you’ve held leadership or key delivery positions in organizations or on teams that focus on organizational security (such as SOCs, IR teams, etc.). You understand cybersecurity from a practitioner standpoint, and importantly, you also understand how to consolidate and communicate results to senior leaders.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Business Strategy / Risk Analysis: you’ve helped businesses address a range of risks, including cyber risks, across their organization. You’re familiar with how organizational risk frameworks are developed, and you have experience helping organizations improve and apply their risk frameworks to address cyber risks.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Cybersecurity Policy: you’ve been responsible for developing new policies or enhancing existing policies that inform how private or government organization performs and manages its various cyber security activities. You have played a key role in developing policies, plans, and/or playbooks focusing on cyber security activities, and have ideally been part of the process of transitioning these plans into practice within an organization.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Public / Government Affairs: you have significant experience helping government organizations, or entities that work closely with governments, refine cyber security priorities and communicate clearly about these priorities. You are highly experienced in working across various sets of technical and non-technical stakeholders in an organization to develop defensible, actionable priorities and plans for improving cyber security.\u003C/p>\u003C/li>\u003C/ul>\u003Cp>\u003C/p>\u003Cp>\u003Ci>Additionally, all candidates must possess the following qualifications:\u003C/i>\u003C/p>\u003Cul>\u003Cli>\u003Cp>Exceptional written and verbal communications skills, specifically in fast-paced professional environments.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Demonstrated ability to establish and maintain positive working relationships with a wide range of customers and team members.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Capable of completing complex tasks involving strategic analysis and development, without supervision.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Desire to grow and expand cyber aptitude, technical awareness, and soft skills.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Strong time management skills, including the ability to complete tasks for multiple projects simultaneously.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Consistent positive work environment and attitude.\u003C/p>\u003C/li>\u003Cli>\u003Cp>Ability to travel to engage with clients, up to 30% of the time, often on less than three weeks’ notice.\u003C/p>\u003C/li>\u003C/ul>\u003Cp>\u003C/p>\u003Cp>\u003Cb>\u003Cspan>Education:\u003C/span>\u003C/b>\u003C/p>\u003Cp>We are seeking candidates with the right combination of training and skills to join our team. Experience, drive, and results are key and advanced degrees are not required. Successful candidates coming from an academic background will likely have a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Math, Information Security, Information Assurance, Information Security Management, Cybersecurity, Cybersecurity Policy, Public Policy, Intelligence Studies, or a related discipline. Additional consideration for Master's degrees. Applicants without a degree but with relevant military or work experience and/or training will be considered, and should apply their previous experience to the qualification areas above.\u003C/p>\u003Cp>\u003C/p>\u003Cp>\u003Cspan>#LI-DL1\u003C/span>\u003C/p>\u003Cp>\u003Cspan>#LI-Remote\u003C/span>\u003C/p>This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment.\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">\u003Cb>Benefits of Working at CrowdStrike:\u003C/b>\u003C/p>\u003Cul>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Remote-friendly and flexible work culture\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Market leader in compensation and equity awards\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Comprehensive physical and mental wellness programs \u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Competitive vacation and holidays for recharge \u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Paid parental and adoption leaves\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Professional development opportunities for all employees regardless of level or role\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Vibrant office culture with world class amenities\u003C/span>\u003C/p>\u003C/li>\u003Cli>\u003Cp style=\"text-align:left\">\u003Cspan>Great Place to Work Certified™ across the globe\u003C/span>\u003C/p>\u003C/li>\u003C/ul>\u003Cdiv>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at \u003Ca href=\"mailto:recruiting@crowdstrike.com\" target=\"_blank\">\u003Cspan>\u003Cspan class=\"WKM0\">recruiting@crowdstrike.com\u003C/span>\u003C/span>\u003C/a> for further assistance.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">\u003Ca href=\"http://www.eeoc.gov/sites/default/files/2023-06/22-088_EEOC_KnowYourRights6.12ScreenRdr.pdf\" target=\"_blank\">Find out more about your rights as an applicant.\u003C/a>\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">CrowdStrike participates in the E-Verify program.\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:left\">\u003Ca href=\"http://e-verify.uscis.gov/web/media/resourcesContents/E-Verify_Participation_Poster_ES.pdf\" target=\"_blank\">Notice of E-Verify Participation\u003C/a>\u003C/p>\u003C/div>\u003Cp style=\"text-align:left\">\u003Cspan>\u003Ca href=\"https://www.e-verify.gov/sites/default/files/everify/posters/IER_RightToWorkPoster%20Eng_Es.pdf\" target=\"_blank\">Right to Work\u003C/a>\u003C/span>\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $95,000 - $140,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.\u003Cp>\u003C/p>\u003Cp>\u003Cspan>For detailed information about the U.S. benefits package, please \u003C/span>\u003Ca href=\"http://crowdstrike.wd5.myworkdayjobs.com/crowdstrikecareers/page/a78c53e64ec61001f47d48a4699e0000\" target=\"_blank\">click here\u003C/a>\u003Cspan>. \u003C/span>\u003C/p>\u003Cp>\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>\u003Cp style=\"text-align:inherit\">\u003C/p>Expected Close Date of Job Posting is:10-27-2025","https://crowdstrike.wd5.myworkdayjobs.com/crowdstrikecareers/job/USA---Remote/Strategic-Advisory-Services-Consultant--Remote-_R24620","Crowdstrike",{"id":412,"name":410,"urlSafeSlug":410,"logo":413},"28d09eb0-bc52-4a4a-b18a-85f01b0f5626","qogfqwtschjchtjlzyr3",[415],{"city":17,"region":17,"country":16},"2025-08-28T00:00:00Z","Candidates should have 2-6 years of experience in IT/Security Management Consulting, holding leadership positions and managing executive relationships, with expertise in technical and operational cybersecurity issues. Alternatively, experience in Security Program Development, including building, managing, and implementing security programs, is required. Strong communication and writing skills are essential, along with the ability to work independently and collaboratively. A self-motivated attitude and a desire for rapid skill acceleration are also necessary.","The consultant will contribute to the delivery of strategic advisory service engagements, interacting with management-level individuals across various industries. Responsibilities include assessing and developing cybersecurity and incident response programs to proactively mature organizational security postures, and creating scenarios to test customer response capabilities. The role also involves producing high-quality written and verbal reports, presentations, recommendations, and findings for customer management, as well as identifying and addressing emerging cybersecurity trends and contributing thought leadership to internal programs.",{"employment":420,"compensation":422,"experience":423,"visaSponsorship":428,"location":429,"skills":430,"industries":440},{"type":421},{"id":62,"name":63,"description":162},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":424},[425,427],{"id":68,"name":69,"description":426},"Build upon established skills and take on more responsibility.",{"id":71,"name":72,"description":310},{"type":74},{"type":74},[270,431,432,433,434,435,436,437,438,439],"Strategic Advisory","Engagement Delivery","Reporting","Project Management","Customer Relationship Management","Risk Assessment","Security Program Enhancement","Cyber Initiatives Development","AI-native platform",[441,442],{"id":269,"name":270},{"id":94,"name":95},{"id":444,"title":445,"alternativeTitles":446,"slug":460,"jobPostId":444,"description":461,"isReformated":15,"applyUrl":462,"company":463,"companyOption":464,"locations":468,"listingDate":470,"listingSite":240,"isRemote":15,"requirements":471,"responsibilities":472,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":473},"fb0b5c2c-6677-4179-b10e-a6a9abcaf668","Chief Information Security Officer",[133,134,447,448,449,450,451,452,453,454,455,456,457,458,459],"Director of Information Security","Information Security Executive","Corporate CISO","Enterprise Information Security Leader","Information Security Strategy Lead","Data Protection Officer (with security focus)","Cybersecurity Executive","Information Risk Management Director","Security Governance Lead","Chief Security Officer (Information Focus)","Information Security Program Director","Head of Cybersecurity Strategy","Information Security Operations Chief","chief-information-security-officer-fb0b5c2c-6677-4179-b10e-a6a9abcaf668","## About Flock Safety\nFlock Safety is the leading safety technology platform, helping communities thrive by taking a proactive approach to crime prevention and security. Our hardware and software suite connects cities, law enforcement, businesses, schools, and neighborhoods in a nationwide public-private safety network. Trusted by over 5,000 communities, 4,500 law enforcement agencies, and 1,000 businesses, Flock delivers real-time intelligence while prioritizing privacy and responsible innovation.\n\nWe’re a high-performance, low-ego team driven by urgency, collaboration, and bold thinking. Working at Flock means tackling big challenges, moving fast, and continuously improving. It’s intense but deeply rewarding for those who want to make an impact.\n\nWith nearly $700M in venture funding and a $7.5B valuation, we’re scaling intentionally and seeking top talent to help build the impossible. If you value teamwork, ownership, and solving tough problems, Flock could be the place for you.\n\n## The Opportunity\nCome join and lead the growing Information Security team at Flock! We are seeking a self-motivated, experienced and tech-savvy individual who is passionate about security in a corporate setting, enthusiastic about technology, and motivated by its potential to drive safety in our communities.\n\nThis role will support our growing company and will serve a key role in building and scaling our Information Security team. You will collaborate with cross-functional partners across the company to improve the effectiveness of the Information Security team.\n\nThis position reports to the Chief Legal Officer.\n\n## Responsibilities\n- In cooperation with the executive leadership team, direct the development and implementation of an effective strategy to assess and manage security risks, manage crises and incidents, validate the maintenance of departmental continuity of operations, and safeguard Flock’s intellectual property, trade secrets, sensitive data, and critical business processes.\n- Hire and/or develop staff to identify, develop, implement, and maintain security processes, standards, and policies throughout the organization to treat and limit exposure and liability in all areas of information, financial, physical, personal, and reputational risk.\n- In close collaboration with Flock’s Legal Team, ensure Flock is compliant with local, national, and international regulatory requirements pertaining to privacy, data protection, and related areas.\n- Continuously remain abreast of and deploy state-of-the-art technology solutions and innovative security management techniques to safeguard the organization’s personnel, customer data, deployed devices, partner ecosystems, and assets.\n- Establish, validate, monitor, and maintain appropriate standards and associated risk controls, including for company-owned and deployed physical infrastructure, to maintain a risk posture supporting overall corporate and business objectives.\n- Develop and maintain relationships with high level officials in law enforcement and other relevant government entities, to include in-country security and international security agencies, intelligence, and other relevant governmental functions as well as private sector counterparts, worldwide.\n- Engage with fellow executive leadership and board of directors to create visibility into relevant security topics such as the evolving threat landscape, and mitigation strategies.\n- Partner with stakeholders to ensure changes to technologies, working practices, and business activities do not disrupt Flock’s security ecosystem or business workflows.\n- Enable the revenue organization by responding to the security needs of current and prospective customers.\n- Report key metrics that demonstrate the effectiveness of the program to internal and external stakeholders, including the Board of Directors.\n- Manage team capacity, budget, and resource allocation to align with company growth initiatives.\n- Recruit, manage, and mentor internal security staff.\n\n## Compensation & Benefits\n- **Salary:** $350K - $380K\n- **Location Type:** Remote\n- **Employment Type:** FullTime","https://jobs.ashbyhq.com/flock%20safety/14b43520-9326-4d5b-8f0c-4e3beacf38dc","Flock Safety",{"id":465,"name":463,"urlSafeSlug":466,"logo":467},"ec23435d-fd9d-491d-98c6-d338ddff2dce","FlockSafety","t2lg8tsc975fgvyr54yk",[469],{"city":17,"region":17,"country":16},"2025-09-17T07:18:29.863Z","Candidates should have extensive experience in information security within a corporate setting and a passion for security technology. A strong understanding of privacy, data protection, and regulatory requirements is necessary. Experience in building and scaling security teams, developing security strategies, and managing security risks is essential. The role requires the ability to collaborate with cross-functional partners and executive leadership, including the board of directors.","The Chief Information Security Officer will lead the Information Security team, develop and implement strategies to assess and manage security risks, and oversee crisis and incident management. This role involves hiring and developing staff to establish security processes, standards, and policies, and ensuring compliance with regulatory requirements. The CISO will also deploy state-of-the-art security technology, establish and monitor risk controls, and build relationships with government and private sector entities. Responsibilities include engaging with executive leadership and the board on security topics, partnering with stakeholders to ensure security is maintained during technology and business changes, responding to customer security needs, reporting on program effectiveness, and managing team capacity, budget, and resource allocation.",{"employment":474,"compensation":476,"experience":479,"visaSponsorship":482,"location":483,"skills":484,"industries":493},{"type":475},{"id":62,"name":63,"description":17},{"minAnnualSalary":477,"maxAnnualSalary":478,"currency":306,"details":17},350000,380000,{"experienceLevels":480},[481],{"id":167,"name":168,"description":17},{"type":74},{"type":74},[485,82,486,487,488,489,490,491,492],"Information Security Strategy","Crisis Management","Incident Management","Business Continuity","Intellectual Property Protection","Data Security","Team Leadership","Cross-functional Collaboration",[494,495,497],{"id":94,"name":95},{"id":89,"name":496},"Safety Technology",{"id":89,"name":498},"Security",{"id":500,"title":340,"alternativeTitles":501,"slug":517,"jobPostId":500,"description":518,"isReformated":15,"applyUrl":519,"company":520,"companyOption":521,"locations":524,"listingDate":530,"listingSite":156,"isRemote":15,"requirements":531,"responsibilities":532,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":533},"f1e98c82-eafc-415c-8b37-24a7c948021a",[502,503,504,505,506,507,508,509,510,511,512,513,514,515,516],"Security Compliance Engineer","GRC Security Engineer","Information Security Audit Engineer","Security Risk and Compliance Engineer","Product Security Compliance Lead","Security Operations and Audit Specialist","Cybersecurity GRC Engineer","Security Governance Engineer","Compliance Automation Engineer","Security Remediation Engineer","Data Protection Compliance Engineer","Information Security Risk Assessor","Security Audit and Compliance Manager","Technical Security Compliance Engineer","Security Operations GRC Analyst","security-operations-engineer-f1e98c82-eafc-415c-8b37-24a7c948021a","## About the Role\nAs a member of the Cybersecurity team, you’ll report directly to our Director of Security. In this role, you will be a key member of the team, focusing on maintaining and improving our security across external systems and product-related issues. You'll ensure our systems are secure and comply with regulations like SOC 2, GDPR, and CCPA, while also playing a vital part in our incident response and vulnerability management.\n\nYou will have a direct impact on our organization by helping to manage major security risks and ensuring our systems are trustworthy for both customers and our sales team. You'll work daily with a wide range of teams, including product, engineering, legal, and HR, acting as the main point of contact between our company and external auditors.\n\nThis role is open in San Francisco, New York City, or Remote locations.\n\nUnsure that you check all the boxes? You should still apply! We’ll review your application for other opportunities. We're always on the lookout for talented people and we're committed to developing each employee's career with over 1,800 training classes offered every year.\n\n## The Impact You’ll Make\n- **Audit management**: Serve as the primary point of contact for external auditors, translating technical details into clear, simple language for internal teams. You'll immediately take ownership of the upcoming SOC 2 Type II audit, gathering necessary documentation and explaining our security measures.\n- **Risk assessment**: Help identify and reduce security and compliance risks, with a focus on product-related issues and external systems. You'll identify how high-level risks, such as data leakage from AI tools, can become a real problem.\n- **Process improvement**: Find ways to make our compliance processes more efficient, ideally using automation and modern compliance platforms like Vanta.\n- **Threat management**: Oversee and track timely fixes for vulnerabilities identified by tools like Orca Security and ensure they are resolved within our deadlines.\n- **Incident response**: Help guide the team through the process of responding to security incidents, ensuring we have the right logging and monitoring systems in place with Datadog. You will act as a project manager to make sure follow-up actions and solutions are completed.\n- **Regulatory compliance**: Provide technical knowledge to implement and enforce legal requirements, ensuring our systems comply with regulations such as GDPR and CCPA.\n\n## Skills You’ll Bring\n- Bachelor’s degree in computer science, engineering, or equivalent experience.\n- **5+ years of experience** in security operations or governance, risk, and compliance (GRC).\n- You have **successfully led multiple SOC 2 Type II audits**. Bonus points if you have experience with an ISO 27001 audit.\n- Experience with risk assessments, designing and testing controls, and managing remediation efforts.\n- Familiarity with risk assessment methods and a solid understanding of how to automate routine tasks.\n- You can **manage competing priorities** and keep complex projects on track.\n- You can **explain audit findings and technical security concepts** to both executives and engineers without causing confusion.\n\n## Benefits and Perks\n- Competitive salary and equity\n- 100% employee coverage for medical, dental and vision premiums\n- Short and long term disability benefits at no cost to the employee\n- Basic life and AD&D insurance at no cost to the employee\n- 401K Plan (Pre-tax and Roth)\n- 4 weeks of paid time off and work/life balance\n- Up to 12 weeks of paid family leave (care for a family member, bond with a new child, etc.)\n- Up to 6 weeks of paid disability leave (up to 12 weeks for pregnancy disability leave)\n- Join a community of fellow Rollers as a member of one of our Employee Resource Groups\n- Ample opportunities to volunteer with local organizations with NextRoll Gives Back\n- For additional benefits not mentioned, visit our Careers page\n\n## Additional Information\nMinimum salary of $112,833 to maximum salary of $167,198 + equity + benefits.\nThe range provided is NextRoll’s","https://job-boards.greenhouse.io/nextrollinc/jobs/8154935002","NextRoll",{"id":522,"name":520,"urlSafeSlug":520,"logo":523},"5408c1e6-0923-46c6-b76c-6e7f9ab14c72","oexpgvzk62vjqrfazgqx",[525,528],{"city":526,"region":527,"country":16},"New City","New York",{"city":17,"region":17,"country":529},"Remote","2025-09-16T07:19:57.833Z","Candidates should possess a Bachelor's degree in computer science, engineering, or equivalent experience, along with over 5 years of experience in security operations or governance, risk, and compliance (GRC). Proven success in leading multiple SOC 2 Type II audits is required, with ISO 27001 audit experience being a plus. The role also requires experience with risk assessments, control design and testing, remediation management, familiarity with risk assessment methods, and the ability to automate routine tasks. Strong project management skills to handle competing priorities and explain technical security concepts to diverse audiences are essential.","The Security Operations Engineer will serve as the primary point of contact for external auditors, translating technical details into understandable language for internal teams and leading SOC 2 Type II audit efforts. This role involves identifying and mitigating security and compliance risks, particularly those related to products and external systems, and assessing high-level risks like data leakage from AI tools. Responsibilities include improving compliance processes through automation and modern platforms, overseeing and tracking the timely remediation of vulnerabilities identified by security tools, and guiding incident response processes with appropriate logging and monitoring. Additionally, the engineer will provide technical expertise to enforce legal requirements and ensure system compliance with regulations such as GDPR and CCPA.",{"employment":534,"compensation":536,"experience":537,"visaSponsorship":541,"location":542,"skills":543,"industries":550},{"type":535},{"id":62,"name":63,"description":17},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":538},[539,540],{"id":68,"name":69,"description":17},{"id":71,"name":72,"description":17},{"type":74},{"type":74},[270,77,544,545,180,177,436,319,546,547,548,549,379],"GDPR","CCPA","Audit Management","Vanta","Orca Security","Data Leakage",[551,552],{"id":94,"name":95},{"id":269,"name":270},{"id":554,"title":555,"alternativeTitles":556,"slug":566,"jobPostId":554,"description":567,"isReformated":15,"applyUrl":568,"company":569,"companyOption":570,"locations":573,"listingDate":576,"listingSite":240,"isRemote":15,"requirements":577,"responsibilities":578,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":579},"32898865-1dc6-4294-b36b-34f22b2ed444","Security Engineer",[38,11,557,558,337,559,340,560,561,344,562,563,502,564,565],"Application Security Engineer","Product Security Engineer","DevSecOps Engineer","Security Analyst","Security Specialist","Vulnerability Management Engineer","Threat Detection Engineer","Network Security Engineer","Endpoint Security Engineer","security-engineer-32898865-1dc6-4294-b36b-34f22b2ed444","### Position Overview\n- **Location Type:** Not Specified\n- **Employment Type:** Full-Time\n- **Salary:** $150K - $250K\n- **Description:** As a Security Engineer at Privy, you'll be working at the intersection of distributed systems and blockchain security, securing products used by millions of people. Security is fundamentally embedded into the core of the product and business. You'll help build and maintain our security posture working alongside experienced security leaders and exceptional engineering talent. We value creativity, empathy, and a builder's mindset—security is about finding secure paths forward for our products and customers so they can ship confidently, and safely.\n\n### Requirements\n- 5+ years of experience in security engineering or related fields\n- Experience with implementing or maintaining security systems in production environments\n- Comfort with making changes to production environments\n- Understanding of modern web security best practices and common vulnerabilities\n- Ability to communicate complex security concepts clearly to both technical and non-technical audiences\n- Collaborative approach to security that emphasizes education and enablement\n- Excitement about all things security\n\n### Responsibilities\n- Establish and improve baseline security practices across the organization as a member of the security team\n- Triage and respond to security alerts from EDR, dependency scanners, and other tools\n- Collaborate with engineering to enhance security in our development pipeline (CI/CD, GitHub, etc.)\n- Provide security guidance to internal teams and customer developers\n- Respond to and remediate bug bounty reports\n- Develop deep knowledge of our stack, including client, backend, infrastructure, TEEs, and security policies\n- Advise customers on secure implementation patterns and remediate security vulnerabilities\n- Explore and implement innovative security options that set Privy apart from competitors\n\n### Bonus Points (Optional)\n- Experience with corporate security or information security in startups\n- Blockchain security experience\n- Detection and response or incident response background\n- AWS security expertise\n- Bug bounty hunting or red team experience\n- Experience building security-focused developer tools\n- Published about your work in security (presentations, blog posts, open source contributions)\n\n### Company Information\n- **Security at Privy:** Security at Privy is about enabling engineers and users. We build security that empowers developers and protects users through intuitive interfaces and thoughtful implementation. We believe security should be accessible and understandable, not mysterious or intimidating. Our team works to advance onchain system security through new paradigms, community involvement, and open collaboration. We understand that security is only as good as it is made usable, and used in practice.\n- **Equal Opportunity Employer:** Privy is an equal opportunity employer. We celebrate diversity.","https://jobs.ashbyhq.com/privy/97b90b81-8023-4925-901a-4a76b9fe6e7f","Privy",{"id":571,"name":569,"urlSafeSlug":569,"logo":572},"7d9065bd-dfa0-4a41-908f-0d37a533daad","medp37fwznxooodxhybc",[574,575],{"city":527,"region":527,"country":16},{"city":17,"region":17,"country":529},"2025-03-25T01:05:12.951Z","Candidates should possess 5+ years of experience in security engineering or related fields, demonstrating comfort in making changes to production environments and a strong understanding of modern web security best practices and common vulnerabilities. They should also be able to communicate complex security concepts clearly to both technical and non-technical audiences and exhibit a collaborative approach to security that emphasizes education and enablement.","As a Security Engineer at Privy, you will establish and improve baseline security practices across the organization, triage and respond to security alerts, collaborate with engineering to enhance security in the development pipeline, provide security guidance to internal teams and customer developers, respond to and remediate bug bounty reports, develop deep knowledge of Privy's stack, advise customers on secure implementation patterns, and explore and implement innovative security options. Furthermore, you will contribute to building security that empowers developers and protects users through intuitive interfaces and thoughtful implementation.",{"employment":580,"compensation":582,"experience":585,"visaSponsorship":588,"location":589,"skills":591,"industries":605},{"type":581},{"id":62,"name":63,"description":17},{"minAnnualSalary":304,"maxAnnualSalary":583,"currency":306,"details":584},250000,"Salary range for Security Engineer position at Privy",{"experienceLevels":586},[587],{"id":71,"name":72,"description":17},{"type":74},{"type":590},4,[592,593,594,317,595,596,597,598,599,600,601,380,602,603,604],"Security Engineering","Web Security","Vulnerabilities","Security Best Practices","Security Alerts","Security Policies","Security Guidance","Security Vulnerabilities","Security Remediation","Security Pipeline","GitHub","Security Awareness","Security Innovation",[606,607,608,610],{"id":269,"name":270},{"id":89,"name":83},{"id":89,"name":609},"Distributed Systems",{"id":89,"name":272},{"id":612,"title":613,"alternativeTitles":614,"slug":628,"jobPostId":612,"description":629,"isReformated":15,"applyUrl":630,"company":631,"companyOption":632,"locations":636,"listingDate":638,"listingSite":156,"isRemote":15,"requirements":639,"responsibilities":640,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":641},"6a2bb578-3b1b-4266-bc2f-f4e530a57adf","Risk Engineer",[615,616,617,618,619,620,621,622,623,624,502,625,33,626,627],"Cybersecurity Risk Engineer","Compliance Risk Engineer","Information Security Risk Engineer","Cloud Security Risk Engineer","NIST CSF Risk Engineer","SOC II Risk Engineer","PCI-DSS Risk Engineer","Third-Party Risk Management Engineer","Security Controls Engineer","Enterprise Risk Management Engineer","Risk Management Specialist","Security Program Engineer","Cloud Compliance Engineer","risk-engineer-6a2bb578-3b1b-4266-bc2f-f4e530a57adf","## About EarnIn\nAs one of the first pioneers of earned wage access, our passion at EarnIn is building products that deliver real-time financial flexibility for those with the unique needs of living paycheck to paycheck. Our community members access their earnings as they earn them, with options to spend, save, and grow their money without mandatory fees, interest rates, or credit checks.\nWe’re fortunate to have an incredibly experienced leadership team, combined with world-class funding partners like A16Z, Matrix Partners, DST, Ribbit Capital, and a very healthy core business with a tremendous runway. We’re growing fast and are excited to continue bringing world-class talent onboard to help shape the next chapter of our growth journey.\n\n## POSITION SUMMARY\nWe are looking for a passionate and motivated Risk Engineer to join our Security Assurance team! You’ll make an impact on our rapidly growing product portfolio, while we continuously take a risk-based approach to enable the growth of our business. You’ll be responsible for ensuring operational excellence for the security certification program and influencing the cybersecurity risk management program at a fast-growing FinTech company!\n\nYou should have a natural sense of curiosity, a propensity for action, and a collaborative approach to problem-solving. You’ll be excited to collaborate and partner across our engineering organization and all parts of our business. You enjoy building and improving things, big & small projects. You prefer automating things and delighting your customers.\n\nThis position will be remote within the US. The base salary range for this full-time position is $147,800 - $180,600 plus equity and benefits. Our salary ranges are determined by role, level, and location. EarnIn provides excellent benefits for our employees, including healthcare, internet/cell phone reimbursement, a learning and development stipend, and potential opportunities to travel to our Mountain View HQ.\n\n## WHAT YOU'LL DO\n- Lead and own audit readiness for NIST CSF, AICPA SOC II Type 2, and PCI-DSS\n- Own a cyber risk assessment and drive maturity in the third-party risk management program (TPRM)\n- Support go-to-market and compliance teams by addressing security and compliance inquiries (e.g., responding to security questionnaires, RFPs, and due diligence requests).\n- Operationalize the enterprise risk register and risk management across multiple business units.\n- Establish and enforce security compliance-related processes and documentation.\n- Automate processes and implement compliance-related tooling, drive adoption of Compliance as Code\n- Execute and own excellence of operational tasks.\n\n## WHAT WE'RE LOOKING FOR\n- **3+ years of experience** defining, measuring, and maturing a compliance program required (5+ years strongly preferred)\n- **Bachelor’s, or equivalent industry experience**\n- **Risk-approach mindset** to enable the business and growth\n- **Ability to manage multiple concurrent priorities** in a fast-paced environment\n- **Experience operationalizing risk assessment frameworks** and implementing risk management programs\n- **Demonstrated experience with at least three security control frameworks**, such as PCI-DSS, SOC II Type 2, NIST, ISO 27001, FFIEC, SOX, etc.\n- **Demonstrated experience with building and automating processes and controls**\n- **Understanding of key cloud-based security platforms**, including but not limited to: AWS, OKTA, Cloudflare, SIEM, CrowdStrike, Vanta, Cycode, JAMF, InTune, etc.\n- **Familiarity with key security processes**, including but not limited to Vulnerability Management, Risk Management, Identity and Access Governance, Change Management, CI/CD, Detection and Response, BCP/DR,\n- **Strong analytical skills** with the ability to translate data insights into actionable recommendations for leadership.\n- **Experience in mapping, redesigning, and optimizing business processes** to align with security, privacy, and compliance requirements.\n- **Adept at building trust and fostering collaboration**","https://job-boards.greenhouse.io/earnin/jobs/7257446","EarnIn",{"id":633,"name":631,"urlSafeSlug":634,"logo":635},"7c6e6a08-f51b-4925-a6c4-0ac475dee6ed","Earnin","kyn2e79zvwlrizfjvclb",[637],{"city":17,"region":17,"country":16},"2025-09-18T07:18:39.002Z","Candidates should have a Bachelor's degree or equivalent industry experience, with at least 3 years of experience defining, measuring, and maturing a compliance program (5+ years strongly preferred). A risk-approach mindset is essential, along with the ability to manage multiple concurrent priorities in a fast-paced environment. Demonstrated experience with at least three security control frameworks such as PCI-DSS, SOC II Type 2, NIST, or ISO 27001 is required, as is experience building and automating processes and controls. Familiarity with key cloud-based security platforms (AWS, OKTA, Cloudflare, etc.) and security processes (Vulnerability Management, Risk Management, IAM, etc.) is necessary. Strong analytical skills and experience in mapping, redesigning, and optimizing business processes for security, privacy, and compliance are also required.","The Risk Engineer will lead and own audit readiness for NIST CSF, AICPA SOC II Type 2, and PCI-DSS. They will own a cyber risk assessment and drive maturity in the third-party risk management program (TPRM). Responsibilities include supporting go-to-market and compliance teams by addressing security and compliance inquiries, operationalizing the enterprise risk register, and establishing/enforcing security compliance processes and documentation. The role involves automating processes, implementing compliance tooling, driving adoption of Compliance as Code, and executing operational tasks with excellence.",{"employment":642,"compensation":644,"experience":648,"visaSponsorship":652,"location":653,"skills":654,"industries":663},{"type":643},{"id":62,"name":63,"description":17},{"minAnnualSalary":645,"maxAnnualSalary":646,"currency":306,"details":647},147800,180600,"Base salary plus equity and benefits. Includes healthcare, internet/cell phone reimbursement, and a learning and development stipend.",{"experienceLevels":649},[650,651],{"id":71,"name":72,"description":17},{"id":167,"name":168,"description":17},{"type":74},{"type":74},[655,656,657,658,659,660,379,661,662],"Risk Engineering","Security Assurance","Cybersecurity Risk Management","Risk-based Approach","Operational Excellence","Security Certification","Problem-Solving","Collaboration",[664],{"id":328,"name":329},{"id":666,"title":667,"alternativeTitles":668,"slug":675,"jobPostId":666,"description":676,"isReformated":15,"applyUrl":677,"company":678,"companyOption":679,"locations":682,"listingDate":684,"listingSite":240,"isRemote":15,"requirements":685,"responsibilities":686,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":687},"68ad9924-bd10-40e8-b8dc-d0a5cfb3259a","Enterprise Security Engineer",[337,565,669,670,562,38,11,340,671,672,673,674,339,344,560],"Identity and Access Management Engineer","SaaS Security Specialist","IT Security Engineer","Mac Security Engineer","AWS Security Engineer","Azure Security Engineer","enterprise-security-engineer-68ad9924-bd10-40e8-b8dc-d0a5cfb3259a","### Position Overview\n- **Location Type:** Remote\n- **Job Type:** Full-Time\n- **Salary:** $260K - $325K\n\nAs an Enterprise Security Engineer at OpenAI, you will be responsible for implementing and managing the security of OpenAI’s internal information systems’ infrastructure and processes. You will work closely with our IT and Security teams to develop security capabilities, enforce security policies, and monitor internal systems for security threats. This role is open to remote employees, or relocation assistance is available to San Francisco.\n\n### Requirements\n- Experience in protecting and managing macOS fleets.\n- Experience deploying and managing endpoint security solutions (e.g. management frameworks, EDR tools).\n- Experience with public cloud service providers (e.g. Amazon AWS, Microsoft Azure).\n- Experience with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM.\n\n### Responsibilities\n- Develop and implement security measures to protect the company's information assets against unauthorized access, disclosure, or misuse.\n- Monitor internal and external systems for security threats and respond to alerts.\n- Contribute to and enforce the company’s IT and Security policies and procedures.\n- Work closely with the IT department to harden the infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling.\n- Advise employees on best practices for maintaining the security of their endpoints, and office AV and network infrastructure.\n- Devise novel sharing controls and associated monitoring to protect company data, including intelligent groups management, Data Loss Prevention (DLP) and other security controls as appropriate.\n- Employ forward-thinking models like “secure by default” and “zero trust” to create sustainably secure environments for knowledge workers and developers.\n- Identify and remediate vulnerabilities in internal systems, adhering to best practices for data security.\n- Use AI-driven models to develop systems for improved security detection and response, data classification, and other security-related tasks.\n- Educate employees on the importance of data security, and advise them on best practices for maintaining a secure environment.\n- Contribute to OpenAI’s endpoint and cloud security roadmaps by staying up to date with the latest security threats, and making recommendations for improving our security posture.\n\n### Company Information\n- **About the Team:** Within the OpenAI Security organization, our IT team works to ensure our team of researchers, engineers, and staff have the tools they need to work comfortably, securely, and with minimal interruptions. As an Enterprise Security Engineer, you will work in a highly technical and employee-focused environment. Our IT team is a small and nimble team, where you’ll have the opportunity to dive into a wide breadth of areas and build from the ground up. We’re well supported and well resourced, and have a mandate to deliver a world-class enterprise security program to our teams.","https://jobs.ashbyhq.com/openai/47048627-427e-4566-b349-847e52a5def1","OpenAI",{"id":680,"name":678,"urlSafeSlug":678,"logo":681},"b9abb3b3-3119-4b5c-af43-80caa62c25a9","mtjdghbxvseizkan336m",[683],{"city":17,"region":17,"country":16},"2025-05-13T08:02:16.475Z","Candidates should possess experience in protecting and managing macOS fleets, experience deploying and managing endpoint security solutions such as management frameworks and EDR tools, and experience with public cloud service providers like Amazon AWS and Microsoft Azure. Familiarity with identity and access management frameworks and protocols, including SAML, OAUTH, and SCIM is also required, along with experience in data security and vulnerability remediation.","As an Enterprise Security Engineer, you will be responsible for developing and implementing security measures to protect OpenAI’s information assets, monitoring internal and external systems for security threats and responding to alerts, contributing to and enforcing security policies and procedures, and working closely with the IT department to harden infrastructure using best practices in AzureAD, GSuite, Github, and other SaaS tooling. You will also advise employees on best practices, devise novel sharing controls, employ forward-thinking security models, identify and remediate vulnerabilities, and educate employees on data security, while contributing to OpenAI’s endpoint and cloud security roadmaps.",{"employment":688,"compensation":690,"experience":694,"visaSponsorship":697,"location":698,"skills":699,"industries":717},{"type":689},{"id":62,"name":63,"description":17},{"minAnnualSalary":691,"maxAnnualSalary":692,"currency":306,"details":693},260000,325000,"Salary range for Enterprise Security Engineer role",{"experienceLevels":695},[696],{"id":71,"name":72,"description":17},{"type":74},{"type":74},[700,701,702,703,704,705,706,707,708,709,710,711,712,713,714,715,716],"macOS management","endpoint security","EDR tools","cloud services (AWS, Azure)","identity and access management","SAML","OAUTH","SCIM","security policies","AzureAD","G Suite","Github","Data Loss Prevention (DLP)","zero trust","secure by default","vulnerability remediation","AI-driven security models",[718,719,720],{"id":89,"name":83},{"id":269,"name":270},{"id":89,"name":721},"Cloud Security",{"id":723,"title":555,"alternativeTitles":724,"slug":727,"jobPostId":723,"description":728,"isReformated":15,"applyUrl":729,"company":730,"companyOption":731,"locations":734,"listingDate":736,"listingSite":240,"isRemote":15,"requirements":737,"responsibilities":738,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":739},"75649459-a798-4c09-895e-077fce0642fc",[212,214,215,337,557,725,669,340,726,559,344,38,11,502,562],"Infrastructure Security Engineer","Incident Response Engineer","security-engineer-75649459-a798-4c09-895e-077fce0642fc","## Overview\nCoinTracker makes cryptocurrency portfolio tracking and tax compliance simple. CoinTracker enables consumers and businesses to seamlessly track their cryptocurrency portfolio, investment performance, taxes, and more. We are a globally distributed team on a mission to enable everyone in the world to use crypto with peace of mind.\n\n### Some things we’re proud of\n- Building foundational tools in the cryptocurrency space\n- Over 1M tax forms generated\n- $80B+ in cryptocurrency is tracked on CoinTracker (~over 5% of the entire crypto market)\n- Partnered with Coinbase, H&R Block, Intuit TurboTax, MetaMask, OpenSea, Solana, and Uniswap\n- Founders: Jon previously built TextNow (200M downloads), Chandan was previously a product manager at Google & Google[x]\n- $100M+ venture capital raised from Accel, General Catalyst, Y Combinator, Initialized Capital, Coinbase Ventures, Kraken Ventures, Intuit Ventures, 776 Ventures, Balaji Srinivasan, Claire Hughes Johnson, Gokul Rajaram, Serena Williams, Zach Perret\n- Awesome benefits\n\n## Your Mission\nEstablish and scale CoinTracker’s security foundation to meet the needs of our growing B2C, B2B, and B2G businesses.\n\n## Your One Year Outcomes\n- **Define and implement the security roadmap**: Identify short-term wins and establish the long-term foundation to scale CoinTracker’s security posture\n- **Establish core security foundations**: Conduct a security gap assessment, implement baseline policies and controls, and lead third-party audits (e.g. SOC 2, pen test) to validate and strengthen our posture\n- **Embed security into engineering workflows**: Introduce secure development practices (e.g. threat modeling, code scanning, secrets management), and partner with teams to proactively identify and mitigate risks in our systems and architecture\n- **Drive security operations**: Define and operationalize security incident response processes, improve monitoring and detection capabilities, establish ongoing vulnerability management, and lead security postmortems to drive continuous improvements\n\n## What You Will Do\nAs CoinTracker’s first Security Engineer, you’ll be hands-on in building the infrastructure, processes, and culture needed to protect our systems, data, and users.\n- Define and execute the security roadmap, balancing near-term wins with long-term investments across infrastructure, cloud, application security, and security operations\n- Conduct security gap assessments and implement baseline controls, policies, and best practices\n- Lead key security initiatives including third-party audits (e.g. SOC 2, penetration testing), security certifications (ISO 27001), incident response readiness, and vulnerability management\n- Partner closely with engineering teams to embed security into SDLC — from threat modeling to code scanning to secrets management\n- Foster a strong security culture across the company by driving awareness, education, and best practices\n\n## What We Look For\n### Role-agnostic\n- **Impact**: Demonstrated ability to drive business impact\n- **Mission alignment**: Hungry and motivated about making progress towards our mission of Enabling everyone in the world to use crypto with peace of mind.\n- **Trust**: Say what you believe. Do what you say.\n- **Communication**: Able to clearly talk about the details and also zoom out to the bigger picture\n\n### Role-specific\n- 8+ years of experience in security engineering or related technical roles, ideally in fast-paced startup or growth-stage environments\n- Deep understanding of core security domains including application security, infrastructure and cloud security, identity and access management, security operations and incident response\n- Hands-on experience implementing security measures and working directly with engineering and infrastructure teams\n- Experience with security frameworks like SOC 2, ISO 27001, NIST, and GDPR\n- Experience leading or supporting third-party audits, penetration testing, and internal risk assessments\n- Resourceful","https://jobs.ashbyhq.com/cointracker/7ad4d43b-3956-4fc1-8132-b18eef269bae","Cointracker",{"id":732,"name":730,"urlSafeSlug":730,"logo":733},"e15dafb4-4fda-4a62-95d2-f6519bb41a33","hls9a14lzek1zhhs6w21",[735],{"city":17,"region":17,"country":16},"2025-08-16T07:18:09.041Z","Candidates should have 8+ years of experience in security engineering or related technical roles, ideally in fast-paced startup or growth-stage environments. A deep understanding of core security domains including application security, infrastructure and cloud security, identity and access management, security operations and incident response is required. Hands-on experience implementing security measures and working directly with engineering and infrastructure teams, along with experience with security frameworks like SOC 2, ISO 27001, NIST, and GDPR, is necessary. Experience leading or supporting third-party audits, penetration testing, and internal risk assessments is also required.","The Security Engineer will establish and scale CoinTracker’s security foundation to meet the needs of growing businesses. This includes defining and implementing the security roadmap, establishing core security foundations through gap assessments and baseline controls, and embedding security into engineering workflows. The role involves driving security operations by defining incident response processes, improving monitoring and detection, establishing vulnerability management, and leading security postmortems. Responsibilities also include defining and executing the security roadmap, conducting security gap assessments, implementing baseline controls and policies, leading key security initiatives such as third-party audits and security certifications, and partnering closely with engineering teams to embed security into the SDLC.",{"employment":740,"compensation":742,"experience":743,"visaSponsorship":747,"location":748,"skills":749,"industries":760},{"type":741},{"id":62,"name":63,"description":162},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":744},[745,746],{"id":71,"name":72,"description":310},{"id":167,"name":168,"description":169},{"type":74},{"type":74},[750,751,597,752,753,77,259,754,253,755,756,757,758,759],"Security Roadmap","Security Gap Assessment","Security Controls","Third-Party Audits","Secure Development Practices","Code Scanning","Secrets Management","Risk Mitigation","Security Incident Response","Monitoring",[761,763,764],{"id":89,"name":762},"Cryptocurrency",{"id":328,"name":329},{"id":89,"name":90},{"id":766,"title":767,"alternativeTitles":768,"slug":784,"jobPostId":766,"description":785,"isReformated":15,"applyUrl":786,"company":787,"companyOption":788,"locations":791,"listingDate":794,"listingSite":360,"isRemote":15,"requirements":795,"responsibilities":796,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":797},"7e477ceb-ee3b-4b70-8dca-01157b775804","Cyber Security UX Lead",[769,770,771,772,773,774,775,776,777,778,779,780,781,782,783],"Lead UX Designer - Cybersecurity","Senior UX Strategist - Security Products","Cybersecurity UX Manager","Principal UX Designer - Security Platforms","Head of UX - Security Technology","UX Lead, Information Security","Director of UX - Cyber Solutions","Senior UX Architect - Security Systems","Lead Product Designer - Cybersecurity","UX Team Lead - Security Software","Cybersecurity User Experience Lead","Senior UX Researcher - Security","UX Lead, Compliance Technology","Lead UX Engineer - Security Applications","Cybersecurity Design Lead","cyber-security-ux-lead-7e477ceb-ee3b-4b70-8dca-01157b775804","## About NVIDIA\nAt NVIDIA, we’re tapping into the unlimited potential of AI to define the next era of computing. An era in which our GPU acts as the brains of computers, robots, and self-driving cars that can understand the world. Doing what’s never been done before takes vision, innovation, and the world’s best talent!\n\nDo you have a strong interest in developing secure, scalable, and consistent user interfaces for intricate enterprise systems? Do you thrive at the intersection of user empathy, systems thinking, and security-conscious design?\n\nWe’re looking for a Cybersecurity UX leader to drive strategy, design, and implementation of user experiences for critical security systems. In this role, you’ll collaborate across teams to unify design standards, engage directly with users, and deliver intuitive, secure tooling that supports enterprise-scale operations. Join us to shape the future of secure UX across our cybersecurity!\n\n## What You’ll Be Doing\n- Spearhead UX strategy and implementation for cybersecurity\n- Collaborate with engineering and product teams to establish and deploy consistent design systems and reusable components\n- Engage directly with customers to capture feedback, validate inventive hypotheses, and iterate on solutions.\n- Identify and resolve inconsistencies in user experience across tools and workflows\n- Facilitate workshops to align on UX goals and system-wide build patterns\n- Develop and maintain UX documentation, templates, and standards to reduce duplication and improve usability\n- Help define and evolve the UX function within the security organization, which may include hiring and mentoring designers\n\n## What We Need to See\n- **15+ years of experience** in UX development, with at least **3 years in a leadership or management role**\n- Track record of building scalable, user-centered solutions for complex enterprise environments\n- Strong skills in usability testing, information architecture, systems building, and rapid prototyping\n- Hands-on experience with tools like **Figma, Adobe CC, and user testing platforms**\n- Ability to synthesize customer feedback into actionable build improvements\n- Experience managing or mentoring UX teams and working with cross-functional collaborators\n- Excellent communication and executive presentation skills\n- Bachelor’s degree or equivalent experience\n\n## Ways to Stand Out from the Crowd\n- Experience leading UX for security or compliance-focused products\n- Experience in front-end engineering or visual composition\n- Demonstrated success in unifying fragmented UX across multiple tools or platforms\n- A portfolio that showcases systems thinking, customer engagement, and measurable impact\n- Ability to define and build a new UX leadership role from the ground up\n\n## Compensation and Benefits\n- **Base Salary Range:** 184,000 USD - 287,500 USD (determined by location, experience, and internal pay equity)\n- **Eligibility for equity and benefits**\n\n## Employment Details\n- **Employment Type:** Full time\n- **Application Deadline:** Applications accepted at least until September 26, 2025.\n\n## NVIDIA's Commitment to Diversity\nNVIDIA is committed to fostering a diverse work environment and proud to be an equal opportunity employer. As we highly value diversity in our current and future employees, we do not discriminate (including in our hiring and promotion practices) on the basis of race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law.","https://nvidia.wd5.myworkdayjobs.com/nvidiaexternalcareersite/job/US-CA-Remote/Cyber-Security-UX-Lead_JR2004032","NVIDIA",{"id":789,"name":787,"urlSafeSlug":787,"logo":790},"3cd4b225-8559-433f-8b19-7f0bd97cae5a","txhnjc4c5hu3msapwpp7",[792],{"city":17,"region":793,"country":16},"California","2025-09-22T00:00:00Z","Candidates must have 15+ years of UX development experience, with at least 3 years in a leadership role, and a Bachelor's degree or equivalent experience. Strong skills in usability testing, information architecture, systems building, and rapid prototyping are required, along with hands-on experience with tools like Figma, Adobe CC, and user testing platforms. Experience managing or mentoring UX teams, working with cross-functional collaborators, and excellent communication and executive presentation skills are also necessary. Experience leading UX for security or compliance-focused products, front-end engineering or visual composition, and unifying fragmented UX across multiple tools or platforms are preferred. A portfolio showcasing systems thinking, customer engagement, and measurable impact is highly desirable.","The Cybersecurity UX Lead will spearhead UX strategy and implementation for cybersecurity, collaborate with engineering and product teams to establish and deploy consistent design systems and reusable components, and engage directly with customers to capture feedback, validate hypotheses, and iterate on solutions. This role involves identifying and resolving inconsistencies in user experience across tools and workflows, facilitating workshops to align on UX goals and system-wide build patterns, and developing and maintaining UX documentation, templates, and standards. The lead will also help define and evolve the UX function within the security organization, potentially including hiring and mentoring designers.",{"employment":798,"compensation":800,"experience":801,"visaSponsorship":804,"location":805,"skills":806,"industries":819},{"type":799},{"id":62,"name":63,"description":17},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":802},[803],{"id":167,"name":168,"description":17},{"type":74},{"type":74},[807,808,809,810,811,812,813,814,815,816,817,818],"UX strategy","UX implementation","Cybersecurity UX","Design systems","Reusable components","Customer feedback","User experience","Usability testing","Information architecture","Systems building","Rapid prototyping","Figma",[820,821],{"id":94,"name":95},{"id":269,"name":270},{"id":823,"title":824,"alternativeTitles":825,"slug":841,"jobPostId":823,"description":842,"isReformated":58,"applyUrl":843,"company":844,"companyOption":845,"locations":848,"listingDate":852,"listingSite":55,"isRemote":15,"requirements":853,"responsibilities":854,"status":18,"expiryDate":17,"isGoogleIndexed":58,"summary":855},"b692643f-616e-4857-ad1d-cd156faceaba","Lead Cyber Defense Analyst - Remote",[826,827,828,829,830,831,832,833,834,835,836,837,838,839,840],"Cybersecurity Operations Lead","Senior Incident Response Lead","Information Security Lead Analyst","SOC Lead Analyst","Cyber Defense Team Lead","Lead Security Analyst - Incident Response","Remote Cyber Defense Manager","Lead Security Operations Engineer","Senior Cyber Threat Analyst","Lead Digital Forensics Investigator","Cybersecurity Incident Manager","Lead Security Operations Center Analyst","Senior SOC Lead","Lead Cyber Incident Responder","Information Security Operations Lead","lead-cyber-defense-analyst-remote-b692643f-616e-4857-ad1d-cd156faceaba","Location Type: Remote\n\nEmployment Type: Full-time\n\n\u003Ch2>Company Description\u003C/h2>\n\u003Cp>Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to accomplish their financial goals and help them save time and money.\u003C/p>\u003Cp>We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments.\u003C/p>\u003Cp>We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com.\u003C/p>\n\u003Ch2>Job Description\u003C/h2>\n\u003Cp>As a Cyber Defense Lead, you will join Experian's Cyber Fusion Center, performing in-depth analysis, evaluation and response to security threats. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. It is the first line of defense in Experian's broader incident response and incident management responsibilities. The team receives and triages cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). You will report into the Sr. Manager of SecOps and Threat Detection.\u003C/p>\u003Cp>\u003Cstrong>You'll have opportunity to:\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Monitor the daily operations of the team, being the primary liaison between analysts and leadership\u003C/li>\u003Cli>Provide advanced support and act as a designated contact for the Cyber Defense Analysts (e.g., consulting on investigation / analysis)\u003C/li>\u003Cli>Oversee response activities for security events and alerts associated with cyber threats, intrusions, or compromises\u003C/li>\u003Cli>Use investigative experience and technical skills to analyze events using security tooling and logging (e.g., SIEM, EDR) and assess potential risk\u003C/li>\u003Cli>Monitor for anomalous changes in metrics, notable open incidents, quality concerns, or observed risks\u003C/li>\u003Cli>Complete assigned caseload throughout the incident response lifecycle, including analysis, containment, eradication, recovery, and lessons learned\u003C/li>\u003Cli>Ensure incident updates are performed, documented and that case hand-off processes are completed\u003C/li>\u003Cli>Be a mentor to Cyber Defense Analysts, providing feedback on the quality of work to analyst(s) and management\u003C/li>\u003Cli>Lead the development of relevant Standard Operating Procedures (SOPs), and training materials\u003C/li>\u003Cli>Collaborate with the Cyber Threat Intelligence (CTI) and content development teams (Threat Detection Engineering) on use case developments\u003C/li>\u003C/ul>\n\u003Ch2>Qualifications\u003C/h2>\n\u003Cul>\u003Cli>5+ years of information security experience working within a Security Operations Center or Cyber Security Incident Response Teams; at least 1 of which ideally includes experience as a team lead\u003C/li>\u003Cli>Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security, or a related field.\u003C/li>\u003Cli>History of interpreting device and application logs from a variety of sources (e.g., Firewalls, Proxies, System Logs, Splunk) to identify cause\u003C/li>\u003Cli>1+ professional certifications related to Digital Forensics, Incident Response, or Ethical Hacking(e.g., GCIH, GMON, GSOC, CEH, GCFA, ENCE)\u003C/li>\u003Cli>Information security management certifications (CISSP, CISM)\u003C/li>\u003Cli>Knowledge of the Incident Response Life Cycle, MITRE ATT&CK Framework, and Cyber Kill Chain\u003C/li>\u003Cli>Understanding of common Operating Systems (Windows, Linux, Mac OS), Networking (Firewalls, Proxies, NetFlow), Cloud Infrastructure (AWS, Azure, GCP), and Security Technologies (Anti-Virus, Intrusion Prevention, Web Application Firewalls)\u003C/li>\u003Cli>Experience with Security Monitoring applications such as SIEM (e.g., QRadar, Splunk), EDR (e.g., CrowdStrike Falcon, Microsoft Defender)\u003C/li>\u003Cli>Experience with SOAR technologies such as Palo Alto XSOAR and Google SecOps (Chronicle)\u003C/li>\u003Cli>Security analysis and architecture knowledge using tools including Defender for Cloud, Wiz.io, GuardDuty, CloudTrail, or CloudWatch.\u003C/li>\u003Cli>Record of improving the way work is performed, originating action and ideas to lead enhancements to existing processes.\u003C/li>\u003Cli>Abvailable to work outside of normal work hours to respond to cybersecurity incidents\u003C/li>\u003C/ul>\n\u003Ch2>Additional Information\u003C/h2>\n\u003Cp>\u003Cstrong>Benefits/Perks:\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Great compensation package and bonus plan\u003C/li>\u003Cli>Core benefits including medical, dental, vision, and matching 401K\u003C/li>\u003Cli>Flexible work environment, ability to work remote, hybrid or in-office\u003C/li>\u003Cli>Flexible time off including volunteer time off, vacation, sick and 12-paid holidays\u003C/li>\u003Cli>Explore all our exciting benefits here: \u003Ca href=\"https://yourexperianbenefits.com/cand-index.html\">https://yourexperianbenefits.com/cand-index.html\u003C/a>\u003C/li>\u003C/ul>\u003Cp>At Experian, our people and culture set us apart. We're deeply committed to creating an environment where everyone feels they belong and can excel. From inclusion and authenticity to work/life balance, development, wellness, collaboration, and recognition, we focus on what truly matters. Our people-first approach has earned us global recognition: World's Best Workplaces™ 2024 (Fortune Top 25), Great Place To Work™ 2025 in 26 countries, and Glassdoor Best Places to Work 2024, among others.\u003C/p>\u003Cp>Want to see what life at Experian is really like? Explore Experian Life on social or visit our Careers Site.\u003C/p>\u003Cp>Our compensation reflects the cost of labor across several U.S. geographic markets. The base pay range for this position is listed above. Within this range, individual pay is determined by work location and additional factors such as job-related skills, experience, and education. You will be also eligible for a variable pay opportunity.\u003C/p>\u003Cp>Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.\u003C/p>\u003Cp>#LI-Remote\u003C/p>\n\u003Ch2>Additional Details\u003C/h2>\n\u003Cul>\n\u003Cli>Department: Legal & Compliance\u003C/li>\n\u003Cli>Industry: Financial Services\u003C/li>\n\u003Cli>Function: Information Technology\u003C/li>\n\u003Cli>Experience Level: Mid-Senior Level\u003C/li>\n\u003Cli>Type of Employment: Full-time\u003C/li>\n\u003Cli>Language: English\u003C/li>\n\u003Cli>Posted by: Christine Thomson\u003C/li>\n\u003Cli>Remote: Yes\u003C/li>\n\u003C/ul>\n","https://jobs.smartrecruiters.com/Experian/744000082510638-lead-cyber-defense-analyst-remote","Expedia",{"id":846,"name":844,"urlSafeSlug":844,"logo":847},"55dad93b-f880-4fd3-9415-d801b6afe38c","nerakkfib4vn5co7bmr3",[849],{"city":850,"region":851,"country":16},"New Orleans","Louisiana","2025-09-17T17:54:24.489Z","Candidates must possess 5+ years of information security experience within a Security Operations Center or Cyber Security Incident Response Team, with at least 1 year in a team lead role. A Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security, or a related field is required. Applicants should have a history of interpreting various device and application logs, hold at least one professional certification in Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, GMON, GSOC, CEH, GCFA, ENCE), and possess information security management certifications (CISSP, CISM). Familiarity with the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, common Operating Systems, Networking, Cloud Infrastructure (AWS, Azure, GCP), and Security Technologies is essential. Experience with SIEM (e.g., QRadar, Splunk), EDR (e.g., CrowdStrike Falcon, Microsoft Defender), and SOAR technologies (e.g., Palo Alto XSOAR, Google Sec) is also required.","The Cyber Defense Lead will monitor daily team operations and serve as the primary liaison between analysts and leadership. They will provide advanced support and act as a designated contact for Cyber Defense Analysts, overseeing response activities for security events and alerts. Responsibilities include analyzing events using security tooling and logging to assess potential risk, monitoring for anomalous changes, and completing assigned caseloads throughout the incident response lifecycle. The Lead will ensure incident updates are performed and documented, manage case hand-off processes, mentor Cyber Defense Analysts, and lead the development of Standard Operating Procedures (SOPs) and training materials. Collaboration with Cyber Threat Intelligence and Threat Detection Engineering teams on use case developments is also a key responsibility.",{"employment":856,"compensation":858,"experience":859,"visaSponsorship":862,"location":863,"skills":864,"industries":868},{"type":857},{"id":62,"name":63,"description":162},{"minAnnualSalary":17,"maxAnnualSalary":17,"currency":17,"details":17},{"experienceLevels":860},[861],{"id":167,"name":168,"description":169},{"type":74},{"type":74},[270,315,318,180,865,377,866,867],"Security Monitoring","Investigation","Leadership",[869,871,872,873,875,877],{"id":89,"name":870},"Data and Technology",{"id":331,"name":332},{"id":384,"name":385},{"id":89,"name":874},"Automotive",{"id":89,"name":876},"Agribusiness",{"id":89,"name":878},"Insurance",["Reactive",880],{"$ssite-config":881},{"env":882,"name":883,"url":884},"production","nuxt-app","https://jobo.world",["Set"],["ShallowReactive",887],{"landing-page-remote-cybersecurity-us":-1,"jobs-remote-cybersecurity-us-1":-1},"/jobs/remote-cybersecurity-us",{}]