The Infrastructure Application Security Architect is responsible for developing and implementing a comprehensive information security program. Key duties include designing secure application architectures, ensuring secure coding and deployment, and defining security policies. This position requires a deep understanding of secure application development practices, API security, and risk identification in system configurations.
Job listings
Facilitate architecture, design, and deployment of information security solutions, compliance and policies. Manage and oversee HIPAA, SOC 2, and ISO compliance policy implementations, certifications and audit processes. Evaluates security trends, evolving threats, risks and vulnerabilities and applies tools to mitigate risk as necessary. Design and implement best practice security solutions to mitigate security threats and risks.
Join UChicago Medicine as a Payment Card Industry Data Security Standards (PCI DSS) Risk Analyst on the Information Security and Privacy GRC team. This remote role will ensure PCI DSS compliance across business units by understanding payment processes, maintaining documentation, and communicating PCI requirements. The position acts as a subject matter expert for Payment Card Industry Data Security Standards, overseeing the implementation of PCI controls.
As a Cloud Engineer at Cresteo, you'll be part of transforming the tech industry through our honest, transparent, and people-centric approach. Your role will be diverse and dynamic and you'll be instrumental in developing and maintaining our software solutions, working with a varied technology stack, and ensuring that our products are functional, efficient, reliable, and scalable.
The Senior Security Engineer - IAM will ensure Company technology, systems, processes, and practices, have security defined, integrated, and implemented, according to the SPS security framework to identify, protect, detect, respond, and recover from security events. Together with the security team, this role will ensure that risk-based controls are implemented to protect SPS.