Own and support the day-to-day operations of our Cybersecurity Program, including Cybersecurity Governance Risk & Compliance (GRC), Cybersecurity Assurance, Privacy Ops, Product Security, Security Operations Center (SOC), IT Security, and Incident Response; Partner closely with IT and Engineering teams on cybersecurity needs. Build and maintain processes and controls, and prioritize risk remediation effectively.
Job listings
The Junior Security Analyst will play a critical role in Nava PBCβs Information Technology department, supporting the organizationβs cybersecurity initiatives. The primary focus will be assisting with deploying security hardware, implementing advanced monitoring systems, and responding to security alerts. This role involves working with tools like CrowdStrike and hardware security keys to enhance the companyβs endpoint protection and centralized security monitoring capabilities.
Seeking a strategic, technically skilled Senior Technology Partner to lead security and compliance efforts across our global HR technology stack. While specializing in Workday, this role also governs the extended ecosystem including solutions like Cornerstone, Greenhouse, Eightfold, Workboard, Snowflake, Beeline, Viser, Qualtrics, and ServiceNow.
The Senior Application Security Engineer ensures the security of the organizationβs business applications, coordinating with development teams on risk assessment, vulnerability analysis, and remediation. This role involves applying secure code practices, ensuring compliance, and integrating security processes within the SDLC and CI/CD processes. Responsibilities include training developers, performing security reviews, and assisting with audits.
As a key security member at Valon, you will play a critical role in ensuring the security of our organization's systems, cloud infrastructure, products and data. This role is responsible for ensuring the companyβs technical controls meet security compliance requirements, managing risks and remediation, supporting operational and monitoring efforts, and driving program management activities.
Lead the transformation and acceleration of Vulnerability Management (VM) into a core information security strength at CNA. You will lead an enterprise-wide VM program and team, developing strategy, driving priorities and initiatives with partners, and managing vulnerabilities per organizational risk tolerance across on-premises and cloud environments. Role blends deep technical expertise with strategic leadership, ensuring vulnerabilities across our environment are identified, prioritized, and remediated in a timely manner.
Engineer and deploy clever controls to prevent security incidents, lead incident response efforts, and integrate security best practices. Conduct security assessments and penetration tests. Automate detection and response workflows to stay ahead of emerging security threats. Responsible for on-call rotations and contributing to the security of cloud-native environments.
Lead the design, development, and delivery of privacy-preserving systems and practices as the Senior Manager, Privacy Engineering. You will drive the technical privacy strategy across engineering and product teams, partnering with stakeholders across Security, Legal, Data, and Product to ensure privacy is embedded at every stage of the development lifecycle.
Zscaler's Red Canary Cyber Incident Response Team (CIRT) is seeking a SkillBridge Intern to push the boundaries of threat detection and response. The intern will use Zscalerβs detection platform to analyze EDR telemetry, alerts, and log sources across several detection domains, publish threats for customers, research coverage opportunities, create new detectors, and improve the CIRT workflow through orchestration & automation.
Seeking a Security Information and Event Management (SIEM) Analyst with a strong understanding of SIEM systems. The role involves configuring, maintaining, and troubleshooting the system, writing query and correlation rules, generating reports and alerts, and conducting baseline analysis. Requires advanced knowledge in current data and voice technologies, security technologies and tools, and a strong understanding of information security related regulations, standards, and best practices.