{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/cisa"},"x-facet":{"type":"skill","slug":"cisa","display":"Cisa","count":17},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_b859119a-2ee"},"title":"Operational Risk Supervisor (IT)","description":"<p>We&#39;re seeking an experienced leader to stand up and manage a new IT Second Line of Defense (2LOD) team. As an Operational Risk Supervisor (IT), you&#39;ll be instrumental in enhancing our IT risk management framework, ensuring the effectiveness of our IT controls, and providing independent oversight of IT risk.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Establishing, recruiting, and leading a high-performing team of IT risk professionals</li>\n<li>Partnering with First Line of Defense (1LOD) IT teams to identify key IT risks and pinpoint critical controls</li>\n<li>Leading comprehensive IT risk assessments using established methodologies</li>\n<li>Developing and implementing a robust methodology for 2LOD IT control testing</li>\n<li>Analyzing results, identifying control deficiencies, and providing clear feedback to 1LOD teams</li>\n<li>Ensuring IT controls are thoroughly documented and accurately reflect operational practices</li>\n</ul>\n<p>As a seasoned leader, you&#39;ll have a strong background in risk management or audit, combined with IT knowledge. You&#39;ll be able to translate technical details into business risks and communicate effectively with stakeholders.</p>\n<p>If you&#39;re passionate about IT risk management and leadership, we encourage you to apply!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_b859119a-2ee","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Ford Motor Credit Company","sameAs":"https://www.fordcredit.com/","logo":"https://logos.yubhub.co/fordcredit.com.png"},"x-apply-url":"https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/61992","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$115,500-$218,100","x-skills-required":["IT risk management","Audit","Leadership","Team management","Communication","Risk assessment","Control testing","Documentation"],"x-skills-preferred":["Process improvement","IT security","GRC","Policy management","Certified Information Systems Auditor (CISA)","Certified in Risk and Information Systems Control (CRISC)","Certified Information Security Manager (CISM)","Certified Information Systems Security Professional (CISSP)"],"datePosted":"2026-04-24T12:21:31.462Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Dearborn"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Finance","skills":"IT risk management, Audit, Leadership, Team management, Communication, Risk assessment, Control testing, Documentation, Process improvement, IT security, GRC, Policy management, Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":115500,"maxValue":218100,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_11b88e19-a73"},"title":"Data Centre Security Compliance Public Sector Specialist","description":"<p>About Us</p>\n<p>At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>\n<p>We protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>\n<p>Key Responsibilities</p>\n<p><strong>Public Sector &amp; Compliance Governance</strong></p>\n<ul>\n<li>Serve as the Subject Matter Expert (SME) on NIST 800-53 control families and FedRAMP requirements.</li>\n<li>Manage Cloudflare&#39;s continuous monitoring program, inclusive of annual assessments and significant change requests.</li>\n<li>Collect, validate, and organize FedRAMP evidence and artifacts to present to auditors, FedRAMP customers, and the FedRAMP PMO.</li>\n<li>Help guide our overall security policy and governance architecture to ensure alignment with evolving government regulations.</li>\n</ul>\n<p><strong>Audit Lifecycle Management</strong></p>\n<ul>\n<li>Orchestrate end-to-end audit activities for standards such as PCI, SOC2, ISO, NIST, and FedRAMP.</li>\n<li>Coordinate with auditors to manage data center access, compliance certificate collection, and evidence defense.</li>\n<li>Work cross-functionally with Engineering, Legal, Product, and Operational teams to maintain management and technical controls.</li>\n<li>Support compliance and regulatory projects, including implementation of new legislation / regulation.</li>\n</ul>\n<p><strong>Identity &amp; Access Management (IAM) Operations</strong></p>\n<ul>\n<li>Execute monthly Periodic Access Reviews (PARs): Compare portal user lists against ACLs to ensure least-privilege access is maintained across all data centers.</li>\n<li>Manage the lifecycle of portal access: Auditing access, provisioning/deprovisioning users, and maintaining accurate documentation.</li>\n<li>Oversee physical access requests to data centers and ensure strict adherence to security policies.</li>\n<li>Drive the resolution of daily DCSC Jira tickets for portal access, physical access, audits, and site decommissioning.</li>\n<li>Automate and streamline access review processes where possible, utilizing standard communication templates to site managers.</li>\n</ul>\n<p><strong>Partner Relations &amp; Reporting</strong></p>\n<ul>\n<li>Own, influence, and orchestrate relationships within the partner Offering teams that can help drive Cloudflare offerings and strategic positioning.</li>\n<li>Monitor and implement changes to individual accountability regime requirements (such as UK, Ireland, Singapore and Australia).</li>\n<li>Maintain centralized documentation, databases, dashboards, and reporting mechanisms to track compliance health.</li>\n</ul>\n<p>Requirements</p>\n<ul>\n<li>3-6 years working in Security Compliance, Information Security, or Risk Management.</li>\n<li>Deep familiarity with all NIST 800-53 control families and FedRAMP requirements.</li>\n<li>Ability to work closely with auditors and articulate technical concepts.</li>\n<li>Experience in auditing of network, operating system, and application security.</li>\n<li>Proven experience managing an audit throughout the full audit lifecycle (from readiness to final report).</li>\n<li>Familiarity with additional security standards and frameworks such as ISO 27000, SOC 2, PCI DSS, ISMAP and IRAP.</li>\n<li>Ability to work cross-functionally with internal stakeholders and strong communications skills.</li>\n<li>High tolerance for ambiguity and ability to work efficiently and independently in a fast-paced, high-volume environment.</li>\n<li>Some travel may be required to engage with regulators and auditors.</li>\n<li>Certifications: CISSP, CIPP, CIPM, CIPT, CISA, or CRISC.</li>\n<li>A relevant professional experience working with technology partners, alliances, or third-party vendors, ideally in the following disciplines: Data center Security Compliance, Access Management, audit administration at a leading high-tech company; offering management.</li>\n<li>Technical skills including the ability to understand (1) product roadmaps; (2) market trends and factors; and (3) complex partner requirements.</li>\n<li>Strong technical proficiency with spreadsheet software (Excel/Google Sheets) including pivot tables and VLOOKUPs for data reconciliation.</li>\n<li>Organized &amp; Disciplined, with a strong focus on driving outcomes.</li>\n</ul>\n<p>Preferred</p>\n<ul>\n<li>Prior experience with Data Centre Security Compliance disciplines and audit programs and past history working at a hyperscaler or high-growth tech company.</li>\n<li>Superb organizational skills and demonstrated history managing complex processes including audit cycles, Facts gathering and analytical skills.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_11b88e19-a73","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cloudflare","sameAs":"https://www.cloudflare.com/","logo":"https://logos.yubhub.co/cloudflare.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/cloudflare/jobs/7477769","x-work-arrangement":"hybrid","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["NIST 800-53 control families","FedRAMP requirements","Identity & Access Management (IAM)","Audit Lifecycle Management","Security Compliance","Information Security","Risk Management","CISSP","CIPP","CIPM","CIPT","CISA","CRISC"],"x-skills-preferred":["Data center Security Compliance","Access Management","audit administration","product roadmaps","market trends and factors","complex partner requirements"],"datePosted":"2026-04-18T15:58:34.830Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Hybrid"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"NIST 800-53 control families, FedRAMP requirements, Identity & Access Management (IAM), Audit Lifecycle Management, Security Compliance, Information Security, Risk Management, CISSP, CIPP, CIPM, CIPT, CISA, CRISC, Data center Security Compliance, Access Management, audit administration, product roadmaps, market trends and factors, complex partner requirements"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3ba73370-831"},"title":"Internal Audit IT Manager","description":"<p>Ready to be pushed beyond what you think you’re capable of?</p>\n<p>At Coinbase, our mission is to increase economic freedom in the world.</p>\n<p>We’re seeking a very specific candidate who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system.</p>\n<p>As an Internal Audit IT Manager, you will own end-to-end delivery of complex IT and security audits across our cloud infrastructure, security operations, and crypto-native systems.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning end-to-end delivery of IT and security audits, from risk assessment and scoping through planning, fieldwork, testing, reporting, and issue validation,covering cloud infrastructure (AWS, GCP), security operations, identity and access management, data protection, IT asset management, vendor/third-party risk, and key in-scope products and services including blockchain infrastructure, centralized and self-hosted wallets, and cold storage.</li>\n</ul>\n<ul>\n<li>Driving AI-enabled audit execution, designing and implementing data analytics, automation, and Generative AI solutions to modernize how we audit (e.g., continuous monitoring, anomaly detection, automated evidence retrieval, AI-assisted workpaper drafting),while maintaining rigorous human-in-the-loop validation to ensure accuracy and audit-quality conclusions.</li>\n</ul>\n<ul>\n<li>Executing audits aligned with the multi-year IT and security audit roadmap, coordinating coverage with co-sourced partners and cross-functional risk initiatives while ensuring alignment with Coinbase&#39;s enterprise risk profile, technology strategy, and regulatory expectations across regions (US, EMEA, APAC).</li>\n</ul>\n<ul>\n<li>Driving high-quality, risk-based findings and executive-level reporting, distilling key themes, emerging risks, and root causes into clear, concise materials for senior management and the Chief Audit Executive,ensuring findings are appropriately documented and supported by evidence.</li>\n</ul>\n<ul>\n<li>Partnering with technology and security leadership across Engineering, Security, Infrastructure, Product, and Operations to build trusted relationships, challenge control design, and advise on pragmatic, risk-based, scalable remediation while maintaining third-line independence.</li>\n</ul>\n<ul>\n<li>Driving disciplined issue management, ensuring timely, risk-based remediation by management, high-quality root cause analysis, and validation of remediation activities,escalating delays or thematic concerns to senior leadership as needed.</li>\n</ul>\n<ul>\n<li>Evaluating and developing talent, assessing candidates and helping build a high-performing, technically credible audit team.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>7+ years of experience in IT/security internal audit, technology risk, or first-line security/engineering roles with significant controls exposure.</li>\n</ul>\n<ul>\n<li>Experience working in a fast-paced, cloud-native, or engineering-driven environment where technology and security practices evolve rapidly.</li>\n</ul>\n<ul>\n<li>Hands-on audit experience with cloud platforms (AWS, GCP), including IAM policies, security configurations, logging/monitoring, and CI/CD pipelines.</li>\n</ul>\n<ul>\n<li>AI-forward mindset with demonstrated experience applying Python, SQL, or AI tools to audit or security work, building workflows rather than just prompting.</li>\n</ul>\n<ul>\n<li>Relevant professional certifications (e.g., CISA, CISSP, CIA, CISM) required; CPA or CFE a plus.</li>\n</ul>\n<ul>\n<li>Working knowledge of key frameworks such as NIST CSF, COBIT, SOC 2, and ITIL.</li>\n</ul>\n<ul>\n<li>High EQ and collaborative style.</li>\n</ul>\n<ul>\n<li>Proven ability to translate complex technical findings into clear, executive-ready narratives for both technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Ability to manage multiple audits and initiatives across time zones (EMEA, APAC) with minimal oversight.</li>\n</ul>\n<ul>\n<li>Demonstrated leadership and team-development experience, including mentoring, coaching, and managing direct reports.</li>\n</ul>\n<ul>\n<li>Demonstrates the ability to responsibly use generative AI tools and copilots (e.g., LibreChat, Gemini, Glean) in daily workflows, continuously learn as tools evolve, and apply human-in-the-loop practices to deliver business-ready outputs and drive measurable improvements in efficiency, cost, and quality.</li>\n</ul>\n<p>Nice to have:</p>\n<ul>\n<li>Experience auditing or building blockchain infrastructure, crypto custody, or wallet systems (hot/cold storage).</li>\n</ul>\n<ul>\n<li>Background in a high-growth or rapidly scaling environment with complex, evolving technology stacks.</li>\n</ul>\n<ul>\n<li>Experience with GRC platforms (Workiva, Archer, AuditBoard) or building custom audit automation tooling.</li>\n</ul>\n<ul>\n<li>Familiarity with DORA, MiCA, or crypto-specific regulatory frameworks.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3ba73370-831","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Coinbase","sameAs":"https://www.coinbase.com/","logo":"https://logos.yubhub.co/coinbase.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coinbase/jobs/7755116","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$166,345-$195,700 USD","x-skills-required":["IT security","Cloud infrastructure","Security operations","Identity and access management","Data protection","IT asset management","Vendor/third-party risk","Blockchain infrastructure","Centralized and self-hosted wallets","Cold storage","AI-enabled audit execution","Data analytics","Automation","Generative AI","Continuous monitoring","Anomaly detection","Automated evidence retrieval","AI-assisted workpaper drafting","Cloud platforms","IAM policies","Security configurations","Logging/monitoring","CI/CD pipelines","Python","SQL","AI tools","NIST CSF","COBIT","SOC 2","ITIL","CISA","CISSP","CIA","CISM","CPA","CFE"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:58:31.708Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - USA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"IT security, Cloud infrastructure, Security operations, Identity and access management, Data protection, IT asset management, Vendor/third-party risk, Blockchain infrastructure, Centralized and self-hosted wallets, Cold storage, AI-enabled audit execution, Data analytics, Automation, Generative AI, Continuous monitoring, Anomaly detection, Automated evidence retrieval, AI-assisted workpaper drafting, Cloud platforms, IAM policies, Security configurations, Logging/monitoring, CI/CD pipelines, Python, SQL, AI tools, NIST CSF, COBIT, SOC 2, ITIL, CISA, CISSP, CIA, CISM, CPA, CFE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":166345,"maxValue":195700,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0c1f85bb-c33"},"title":"Senior Product Manager, Compliance","description":"<p>CoreWeave is building the infrastructure that powers the next era of AI. As we scale towards and beyond public company readiness, the CIO organisation is responsible for owning the execution of IT General Controls (ITGCs) and IT application controls across our technology environment.</p>\n<p>We are looking for a Senior Product Manager, IT SOX Compliance to join our team. This is not a traditional audit-support role. As the Product Manager, IT SOX Compliance, you will translate SOX compliance requirements into structured programs, drive accountability across IT process owners, and build the systems and workflows that make compliance scalable.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning the end-to-end IT SOX compliance program within the CIO organisation, maintaining the IT control inventory spanning ITGCs, IT-dependent controls, and automated application controls</li>\n<li>Owning the control design and documentation, including narratives and risk and control matrices (RCMs), ensuring controls are clearly defined and audit-ready</li>\n<li>Partnering with IT, Accounting (where needed), and the SOX team to ensure new systems and modules are implemented with appropriate SDLC controls in place prior to go-live; reviewing control designs to identify and mitigate SOX risks</li>\n<li>On an ongoing basis, partnering with IT process owners and control operators to ensure controls are executed in a timely manner</li>\n<li>Reviewing control evidence for quality and completeness before submission to auditors</li>\n<li>Managing the full deficiency lifecycle , from root cause analysis through remediation planning, retesting, and escalation , reporting control health to IT leadership and the SOX team</li>\n<li>Leading root cause analysis for control failures and incidents, tracking and resolving systemic gaps, and implementing and validating remediation plans to prevent recurrence</li>\n</ul>\n<p>You will work closely with the SOX team and IT process owners to ensure controls are designed, reviewed, and evidenced effectively.</p>\n<p>The ideal candidate will have 8+ years of experience in IT audit, IT risk, IT compliance, or a related field, with hands-on IT SOX experience in either a practitioner or oversight capacity. You will have deep familiarity with IT General Controls (ITGCs) , access management, change management, SDLC, and computer operations , and how they map to financial reporting risk.</p>\n<p>In addition to a competitive salary declaration, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, company-paid life insurance, voluntary supplemental life insurance, short and long-term disability insurance, flexible spending account, health savings account, tuition reimbursement, ability to participate in employee stock purchase program (ESPP), mental wellness benefits through Spring Health, family-forming support provided by Carrot, paid parental leave, flexible, full-service childcare support with Kinside, 401(k) with a generous employer match, flexible PTO, catered lunch each day in our office and data center locations, a casual work environment, and a work culture focused on innovative disruption.</p>\n<p>Why CoreWeave?</p>\n<p>At CoreWeave, we work hard, have fun, and move fast! We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on. We&#39;re not afraid of a little chaos, and we&#39;re constantly learning. Our team cares deeply about how we build our product and how we work together, which is represented through our core values: Be Curious at Your Core, Act Like an Owner, Empower Employees, Deliver Best-in-Class Client Experiences, Achieve More Together.</p>\n<p>We support and encourage an entrepreneurial outlook and independent thinking. We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems. As we get set for takeoff, the organisation&#39;s growth opportunities are constantly expanding. You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0c1f85bb-c33","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4673532006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$165,000 to $242,000","x-skills-required":["IT General Controls (ITGCs)","SOX compliance","IT audit","IT risk","IT compliance","Access management","Change management","SDLC","Computer operations","Workday","Salesforce","NetSuite/SAP","Coupa","GRC platforms","AuditBoard","ServiceNow GRC","Workiva"],"x-skills-preferred":["CISA","CISSP","CISM","CPA","Hyperscaler","Cloud infrastructure","High-growth tech environment"],"datePosted":"2026-04-18T15:52:33.779Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / San Francisco, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"IT General Controls (ITGCs), SOX compliance, IT audit, IT risk, IT compliance, Access management, Change management, SDLC, Computer operations, Workday, Salesforce, NetSuite/SAP, Coupa, GRC platforms, AuditBoard, ServiceNow GRC, Workiva, CISA, CISSP, CISM, CPA, Hyperscaler, Cloud infrastructure, High-growth tech environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":165000,"maxValue":242000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee8b8728-edf"},"title":"Security Engineer - Detection & Response","description":"<p>As a Security Engineer - Detection &amp; Response at xAI, you will lead day-to-day security threat management, identify and manage potential incidents, and work with partner teams on known or suspected security threats. You will support threat intelligence, threat hunting, intrusion detection, and incident response efforts that adhere to, and push forward, best practices.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Certifications like CISA, CRISC, CGEIT, Security+, CASP+, or similar are preferred.</li>\n<li>Drive continual improvement in processes, procedures, and automations to improve the quality and effectiveness of the team.</li>\n<li>Participate in a 24/7 on-call rotation performing security incident response.</li>\n<li>Commandeering security incidents and updating stakeholders.</li>\n<li>Identify and develop new detection use cases and optimize existing detections.</li>\n<li>Collaborate on technical directions and solutions with other teams.</li>\n<li>Research and analyze patterns in security events across X&#39;s global infrastructure.</li>\n<li>Identify, design, and lead threat hunting missions to quantify and reduce threats.</li>\n<li>Manage and support the log collection, security scanning, intrusion detection, and other security-related systems.</li>\n<li>Design and assist in the development of automation to reduce false positives and handle events automatically.</li>\n<li>Analyze the security posture of systems via testing and vulnerability impact analysis.</li>\n</ul>\n<p>Basic Qualifications:</p>\n<ul>\n<li>2+ years of relevant information security experience.</li>\n<li>Self-starter, can receive a task and execute with minimal supervision.</li>\n<li>Strong Python scripting skills for implementing security automation.</li>\n<li>Knowledge of networking and macOS, Windows, or Linux operating systems.</li>\n<li>Knowledge of cloud security fundamentals and practices (vendor agnostic).</li>\n<li>Experience managing and/or deploying security technology.</li>\n<li>Experience with building queries and dashboards for security monitoring.</li>\n<li>Knowledge of current threats and techniques and a desire to research and learn more.</li>\n<li>Experience with malware analysis, forensics, or penetration testing.</li>\n<li>Problem-solving skills or experience with troubleshooting.</li>\n</ul>\n<p>ITAR Requirements:</p>\n<p>To conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State. Learn more about the ITAR here.</p>\n<p>Preferred Skills and Experience:</p>\n<ul>\n<li>Elastic / OpenSearch or similar platforms.</li>\n<li>Open Source security automation tooling.</li>\n</ul>\n<p>Compensation and Benefits:</p>\n<p>$180,000 - $440,000 USD. Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short &amp; long-term disability insurance, life insurance, and various other discounts and perks.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee8b8728-edf","directApply":true,"hiringOrganization":{"@type":"Organization","name":"xAI","sameAs":"https://www.xai.com/","logo":"https://logos.yubhub.co/xai.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/xai/jobs/5008186007","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$180,000 - $440,000 USD","x-skills-required":["CISA","CRISC","CGEIT","Security+","CASP+","Python","Networking","macOS","Windows","Linux","Cloud Security","Security Technology","Malware Analysis","Forensics","Penetration Testing"],"x-skills-preferred":["Elastic","OpenSearch","Open Source Security Automation Tooling"],"datePosted":"2026-04-18T15:51:35.367Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"New York, NY; Palo Alto, CA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"CISA, CRISC, CGEIT, Security+, CASP+, Python, Networking, macOS, Windows, Linux, Cloud Security, Security Technology, Malware Analysis, Forensics, Penetration Testing, Elastic, OpenSearch, Open Source Security Automation Tooling","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":180000,"maxValue":440000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_9e667b9c-eb8"},"title":"Senior Security Engineer II, Vulnerability Management","description":"<p>We are seeking a Senior Security Engineer to build the Vulnerability Management program protecting CoreWeave&#39;s AI infrastructure. You will architect intelligent automation systems that defend the GPU clusters powering breakthrough AI research and enterprise AI applications.</p>\n<p>This role combines technical depth, strategic thinking, and the autonomy to design workflows that will protect infrastructure driving the future of AI.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<ul>\n<li>Build and scale AI-powered triage workflows: evaluate tools (LLM integration, TINES orchestration), architect solutions, and deploy to production</li>\n<li>Drive intelligent, risk-based vulnerability prioritization while simultaneously training AI models,your assessments become the foundation for automation</li>\n<li>Influence automation priorities: recommend which areas of the vulnerability pipeline would most benefit from automation to improve team efficiency</li>\n<li>Design and implement automated detection-to-ticket pipelines: build workflows that generate vulnerability detections, test them, scale across the environment, and auto-create Jira tickets</li>\n<li>Execute remediation campaigns: build automated workflows for EOL product removal, vulnerable software upgrades, and OS migrations at scale</li>\n<li>Manage embargoed vendor disclosures from hardware partners, including embargo verification and zero-day response coordination</li>\n<li>Lead security incident investigations related to high-profile vulnerabilities, coordinating cross-functional response and impact assessment</li>\n<li>Participate in on-call rotation for rapid-response vulnerability analysis during active zero-day events or critical security incidents</li>\n<li>Partner with IT, Infrastructure, and Engineering teams to drive remediation efforts, enforce SLAs, and escalate blockers strategically</li>\n<li>Write daily operations reports documenting vulnerability trends, remediation velocity, and emerging threats for security leadership</li>\n<li>Drive process improvements and workflow automation to improve operational efficiency and reduce manual toil</li>\n</ul>\n<p><strong>Requirements:</strong></p>\n<ul>\n<li>7+ years of relevant experience with demonstrated impact in vulnerability management, application security, platform security, or cloud security engineering</li>\n<li>Bachelor’s or Master’s degree in Computer Science, Computer Engineering, Electrical Engineering, or equivalent practical experience</li>\n<li>Proven hands-on experience building security automation (SOAR workflows, detection pipelines, or vulnerability prioritization frameworks)</li>\n<li>Deep subject matter expertise with vulnerability management best practices: CVSS, EPSS, CISA KEV, exploit intelligence, and compensating controls</li>\n<li>Strong development background with proficiency in Python, Go, or similar languages for building production-grade security tools</li>\n<li>Experience with modern vulnerability management tooling such as Wiz, Semgrep, Rapid7, or similar platforms</li>\n<li>Demonstrated ability to partner with cross-functional teams (IT, SRE, Engineering) to drive remediation without formal authority</li>\n<li>Strong familiarity with common security vulnerabilities and the ability to judge their severity and business impact</li>\n</ul>\n<p><strong>Preferred Qualifications:</strong></p>\n<ul>\n<li>Practical experience building AI/ML-powered security workflows (LLM integration, automated triage, human-in-the-loop validation)</li>\n<li>Experience managing hardware security vulnerabilities (GPU/DPU firmware, BMC/IPMI, specialized compute environments)</li>\n<li>Production experience with security automation platforms such as TINES, Splunk SOAR, or serverless frameworks (AWS Lambda)</li>\n<li>Strong DevOps, DevSecOps, or SRE background with experience in AWS/GCP/Azure cloud services and Infrastructure as Code (Terraform, CloudFormation)</li>\n<li>Deep understanding of container security and Kubernetes (image scanning, admission control, runtime protection, supply chain security)</li>\n<li>Experience supporting customer audits (SOC 2, ISO 27001, FedRAMP) with vulnerability evidence and control validation</li>\n<li>Experience integrating vulnerability management into modern CI/CD pipelines with a &#39;shift-left&#39; mentality</li>\n</ul>\n<p><strong>What We Offer:</strong></p>\n<p>The base salary range for this role is $165,000 to $242,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).</p>\n<p>The range we’ve posted represents the typical compensation range for this role. To determine actual compensation, we review the market rate for each candidate which can include a variety of factors. These include qualifications, experience, interview performance, and location.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_9e667b9c-eb8","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4650290006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$165,000 to $242,000","x-skills-required":["vulnerability management","application security","platform security","cloud security engineering","Python","Go","security automation","SOAR workflows","detection pipelines","vulnerability prioritization frameworks","CVSS","EPSS","CISA KEV","exploit intelligence","compensating controls","Wiz","Semgrep","Rapid7"],"x-skills-preferred":["AI/ML-powered security workflows","hardware security vulnerabilities","security automation platforms","DevOps","DevSecOps","SRE","container security","Kubernetes","customer audits","CI/CD pipelines"],"datePosted":"2026-04-18T15:48:06.696Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"vulnerability management, application security, platform security, cloud security engineering, Python, Go, security automation, SOAR workflows, detection pipelines, vulnerability prioritization frameworks, CVSS, EPSS, CISA KEV, exploit intelligence, compensating controls, Wiz, Semgrep, Rapid7, AI/ML-powered security workflows, hardware security vulnerabilities, security automation platforms, DevOps, DevSecOps, SRE, container security, Kubernetes, customer audits, CI/CD pipelines","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":165000,"maxValue":242000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_815dc8e7-6b9"},"title":"Technical Program Manager II","description":"<p>At Coinbase, we&#39;re on a mission to increase economic freedom in the world. We&#39;re seeking a Technical Program Manager II to join our Security &amp; Privacy department. As a Technical Program Manager II, you will work with the Security organization to build and drive meaningful business and security outcomes through complex programs while empowering our engineering/product teams to act as owners of security risk.</p>\n<p>The Security team&#39;s goal is to identify, measure, manage, mitigate, and report risk associated with products to keep our customer&#39;s funds and data safe. You will collaborate with program sponsors and cross-functional Security partners to identify, document, and objectively assess opportunities, challenges, and risks across traditional and novel Security domains using qualitative and quantitative factors, including KRIs and KPIs.</p>\n<p>You will serve as the Directly Responsible Individual (DRI) for key security initiatives or workstreams when required, owning outcomes and driving decision-making to keep programs moving forward. You will create program strategies and artifacts, including proposals, prioritization frameworks, roadmaps, dependency maps, and risk registers, to drive initiatives that incrementally increase program maturity over time.</p>\n<p>You will partner with Product, Engineering, and Security teams to influence adoption of critical initiatives, navigate technical dependencies, and support the Software Development Lifecycle (SDLC) as part of product and feature launches. You will concurrently manage multiple critical projects end-to-end: establishing milestones and timelines, managing cross-functional workstreams and dependencies, holding teams accountable for deliverable quality, and clearly communicating the impact of delays on project timelines and security risk posture.</p>\n<p>You will provide program status to Security leadership while ensuring transparency on key metrics, program effectiveness, strategic direction, and changes. You will conduct regular data analysis on security control performance to identify trends, anomalies, and areas for improvement, leveraging BI tools to drive data-informed decisions.</p>\n<p>You will drive process improvement and scaling initiatives within security programs by leveraging AI tools, automation, and retrospectives to optimize workflows, reduce manual toil, and achieve outcomes efficiently. You will author Objectives and Key Results (OKRs) to focus teams on the right short-term and long-term goals, and manage change across complex multi-quarter programs.</p>\n<p>You will rapidly identify and escalate risks to enable proactive collaboration and timely resolution.</p>\n<p>We&#39;re looking for a Technical Program Manager II with a strong understanding and proven experience of formal program management methodologies, working knowledge of and experience in cyber/security domain, fluency in leveraging AI in daily workflows to enhance efficiency, drive process improvements, and deliver high-quality, business-ready outputs.</p>\n<p>You should have exceptional skills in time management, facilitation, communication, and organization, ability to translate complex concepts simply for varied audiences, experience managing cross-functional teams and stakeholders, and comfortable navigating ambiguity and operating in environments where processes and paved roads may not yet exist.</p>\n<p>Nice to haves include professional certification such as PMP, CISSP and CISA, working knowledge of and experience in the technology and/or financial technology industry, experience working across all the three lines of defense (3LOD), and advanced understanding of Generative AI, Google Workspace, JIRA, Linear, Superset, Looker and SQL.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_815dc8e7-6b9","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Coinbase","sameAs":"https://www.coinbase.com/","logo":"https://logos.yubhub.co/coinbase.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coinbase/jobs/7595357","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$167,280-$196,800 USD","x-skills-required":["Formal program management methodologies","Cyber/security domain","AI tools","Automation","Retrospectives","Objectives and Key Results (OKRs)","Time management","Facilitation","Communication","Organization","Cross-functional teams","Stakeholders","Ambiguity","Process improvements","Data analysis","BI tools","Security control performance","Risk management","Program management","Project management","Software Development Lifecycle (SDLC)"],"x-skills-preferred":["Generative AI","Google Workspace","JIRA","Linear","Superset","Looker","SQL","PMP","CISSP","CISA","Financial technology industry","Three lines of defense (3LOD)"],"datePosted":"2026-04-18T15:47:39.344Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - USA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Formal program management methodologies, Cyber/security domain, AI tools, Automation, Retrospectives, Objectives and Key Results (OKRs), Time management, Facilitation, Communication, Organization, Cross-functional teams, Stakeholders, Ambiguity, Process improvements, Data analysis, BI tools, Security control performance, Risk management, Program management, Project management, Software Development Lifecycle (SDLC), Generative AI, Google Workspace, JIRA, Linear, Superset, Looker, SQL, PMP, CISSP, CISA, Financial technology industry, Three lines of defense (3LOD)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":167280,"maxValue":196800,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d33e3000-9c7"},"title":"Senior, Tech Risk and AI Automation","description":"<p>We&#39;re seeking a highly motivated and analytical Senior, Tech Risk and AI Automation, to play a pivotal role in building an AI-first internal audit and risk function. This role is the first of its kind and an opportunity for an audit individual with a passion for technology and innovation to drive the future of assurance and risk through AI and automation.</p>\n<p>You will be at the forefront of our efforts to build and scale an industry-leading AI assurance program. While your initial focus will be on leveraging agentic AI to transform SOX testing, you&#39;ll have opportunities to impact cross-functional areas including security, platform regulatory risks and non-financial metrics.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Architect and scale our SOX compliance program by designing, developing, and maintaining AI-driven testing that enhances accuracy, provides real-time insights, and reduces manual overhead.</li>\n<li>Spearhead the testing of internal controls using agentic AI systems to identify and mitigate potential threats.</li>\n<li>Partner closely with Engineering, IT, and business teams to integrate our AI automation with internal systems, enabling end-to-end automated assurance workflows.</li>\n<li>Serve as a subject matter expert and champion for the use of AI and automation in risk management.</li>\n<li>Contribute to a culture of innovation and excellence within the Risk Advisory and Assurance team.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>2 to 4 years of experience in a Big 4 accounting firm, internal audit, and/or compliance function with a demonstrated passion for technology and automation.</li>\n<li>Subject matter expertise in SOX and/or security compliance testing in the technology industry, preferably platform companies.</li>\n<li>Self-motivated, results-oriented technology-first thinker with a proactive and creative approach to problem-solving.</li>\n<li>Collaborator with a strong work ethic and enthusiasm for learning, who thrives in a fast-paced, dynamic environment.</li>\n</ul>\n<p>Preferred qualifications include:</p>\n<ul>\n<li>Professional certifications such as CISA, CPA, CIA, and/or CISSP.</li>\n<li>Hands-on experience leveraging AI tools and prompting.</li>\n<li>Familiarity with programming languages such as SQL and Python.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d33e3000-9c7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Reddit","sameAs":"https://www.redditinc.com","logo":"https://logos.yubhub.co/redditinc.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/reddit/jobs/7758354","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SOX compliance","agentic AI","internal controls","risk management","AI-driven testing","automated assurance workflows"],"x-skills-preferred":["CISA","CPA","CIA","CISSP","AI tools","prompting","SQL","Python"],"datePosted":"2026-04-18T15:47:08.049Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - British Columbia, Canada"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Technology","skills":"SOX compliance, agentic AI, internal controls, risk management, AI-driven testing, automated assurance workflows, CISA, CPA, CIA, CISSP, AI tools, prompting, SQL, Python"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6bc635c8-b18"},"title":"Staff Security Analyst, Customer Assurance","description":"<p>Secure Every Identity instituting AI is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era.</p>\n<p>We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p>The Okta Security team’s mission is to strengthen Okta’s position as the leading Identity-as-a-Service solution by identifying and resolving risks to the employees, product, and most importantly, our customers. The Security Trust &amp; Culture team works to enhance customer trust in Okta’s identity services . We serve as a strategic resource working closely with Okta’s go-to-market teams.</p>\n<p>As a Staff level analyst of Customer Assurance, you will support prioritising and efficiently responding to questions about our security programme and other due diligence related requests. You will act as a critical bridge between our customers and our internal engineering teams, ensuring Okta’s security posture is communicated effectively.</p>\n<p>Tasks will include training local Sales teams, managing complex escalations in the regional market, and driving technological changes to help Customer Assurance scale its efforts globally. This position requires a unique combination of skills including an ability to coordinate the analysis of technical issues, to communicate clearly about security-relevant topics with both internal and external customers, to collaborate with internal business units to ensure execution of time-sensitive projects, and to present to upper management or the broader organisation as required.</p>\n<p>The ideal candidate will have experience with SaaS cloud security risk assessment and a solid understanding of the core principles of identity management. If you want to make a difference in the security programme of a global cloud provider, we want you on board.</p>\n<p>Job Duties and Responsibilities:</p>\n<p>Serve as the critical bridge between Okta’s customers and internal Engineering/Product Security teams. You must be able to unpack complex customer security concerns, hold in-depth technical discussions with internal engineering to align on solutions, and translate Okta’s security architecture back to the customer to resolve high-stakes inquiries.</p>\n<p>Take end-to-end ownership of highly technical security questionnaires and due-diligence requests, Partner seamlessly with internal subject matter experts,including our specialised Federal/FedRAMP teams,to ensure accurate, timely, and high-quality responses for highly regulated customers.</p>\n<p>Drive technological changes within Customer Assurance by identifying and implementing AI and automation strategies to streamline workflows, scale global efforts, and reduce response times.</p>\n<p>Train and empower regional Go-To-Market and Sales teams on standard engagement protocols, ensuring they can leverage Customer Assurance resources smoothly to accelerate deals.</p>\n<p>Collaborate with the Security Trust &amp; Culture team and Regional CSOs to develop, publish, and maintain forward-facing security collateral, FAQs, and field communications.</p>\n<p>Work within a global team, participating or leading global handoffs between American timezones and European or Asian, when required for large security or industry events.</p>\n<p>Requirements:</p>\n<p>Bachelor’s degree in Computer Science or Management Information Systems, or equivalent work experience in technology or information security fields</p>\n<p>Minimum 3 years information security, project management, or related experience</p>\n<p>A strong, fundamental understanding of core Security principles, architectures, and operations.</p>\n<p>Understanding of IT and cloud methodologies, information security, privacy, identity management, risk assessments and IT regulation and compliance standards</p>\n<p>Strong oral, written, and presentation skills</p>\n<p>Strong written and verbal communication skills, with a proven ability to distill complex technical concepts into clear, concise responses for both technical customers and internal executive stakeholders.</p>\n<p>Helpful Certifications / Skills:</p>\n<p>Okta Certified Professional/Administrator</p>\n<p>Certificate of Cloud Security Knowledge (CCSK) and/or Certificate of Cloud Auditing Knowledge (CCAK)</p>\n<p>Certified Information Security Auditor (CISA)</p>\n<p>Experience with generative AI tools or process automation platforms is a strong plus.</p>\n<p>Familiarity with Federal or highly regulated compliance frameworks (e.g., FedRAMP, StateRAMP, NIST 800-53, or DoD IL4/IL5)</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6bc635c8-b18","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7743848","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$148,000-$203,500 USD","x-skills-required":["Okta Certified Professional/Administrator","Certificate of Cloud Security Knowledge (CCSK) and/or Certificate of Cloud Auditing Knowledge (CCAK)","Certified Information Security Auditor (CISA)","generative AI tools or process automation platforms","Federal or highly regulated compliance frameworks (e.g., FedRAMP, StateRAMP, NIST 800-53, or DoD IL4/IL5)"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:47:00.421Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Bellevue, Washington; Chicago, Illinois; New York, New York; Washington, DC"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Okta Certified Professional/Administrator, Certificate of Cloud Security Knowledge (CCSK) and/or Certificate of Cloud Auditing Knowledge (CCAK), Certified Information Security Auditor (CISA), generative AI tools or process automation platforms, Federal or highly regulated compliance frameworks (e.g., FedRAMP, StateRAMP, NIST 800-53, or DoD IL4/IL5)","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":148000,"maxValue":203500,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3ad8987a-19b"},"title":"Staff Compliance Analyst - Federal","description":"<p>We are looking for a Staff Federal Security Compliance Analyst to join our Federal Security and Compliance team. As a Staff Federal Security Compliance Analyst, you will serve as a lead of our compliance strategy, safeguarding and strengthening our position as a leading IDaaS provider for the public sector. Your mission is to bridge the gap between engineering, product, and federal regulatory bodies, driving the maintenance of our FedRAMP and DoD authorizations, leading complex audits, and mentoring junior analysts to ensure a security-first culture.</p>\n<p>The responsibilities listed below represent the core functions of this role:</p>\n<ul>\n<li>Strategic Audit Leadership: Lead end-to-end FedRAMP and DoD audits, serving as the primary point of contact for external 3PAOs and government agencies.</li>\n<li>Continuous Monitoring Strategy: Oversee and evolve the continuous monitoring (ConMon) program. Design sophisticated reporting mechanisms for vulnerability management and risk posture for executive leadership.</li>\n<li>Engineering Advisory: Act as a senior consultant to Engineering and Product teams, translating complex NIST 800-53 requirements into actionable technical specifications for cloud-native environments.</li>\n<li>Impact Assessment &amp; Risk Management: Lead the assessment of high-impact changes to federal systems. Ensure that system evolutions maintain a rigorous security posture without sacrificing innovation.</li>\n<li>Cross-Functional Alignment: Drive synchronization between GRC, Security, Marketing, Sales, Engineering, and Product to ensure federal requirements are integrated into the broader corporate roadmap.</li>\n<li>Programmatic Gap Analysis: Proactively identify and lead initiatives to close gaps between current capabilities and future regulatory requirements (e.g., emerging NIST standards, new DoD mandates, or IL6 requirements).</li>\n<li>Evidence Automation &amp; FedRAMP 20x Readiness: Drive the build-out and support of automated evidence collection and control validation. Lead the transition toward &quot;FedRAMP 2.0&quot; standards (including OSCAL integration), defining and monitoring Key Security Indicators (KSIs) to provide real-time compliance visibility.</li>\n</ul>\n<p>Minimum Required Knowledge, Skills, and Abilities:</p>\n<ul>\n<li>Education: Bachelor’s degree in Computer Science, MIS, Cybersecurity, or a related technical field.</li>\n<li>Experience: 7+ years of experience in security compliance, with at least 4-5 years specifically focused on the FedRAMP/NIST 800-53 framework.</li>\n<li>Automation &amp; Compliance Engineering: Demonstrated experience with automation tools or scripting (e.g., Python, Go, or SQL) for automated evidence collection. Familiarity with API-based control validation and OSCAL-based tooling (e.g., Trestle, LULA, or similar GRC automation frameworks).</li>\n<li>Technical Depth: Deep understanding of cloud-native infrastructure (IaaS, PaaS, SaaS) and how infrastructure components (networking, OS, databases) support a distributed cloud application.</li>\n<li>Framework Mastery: Expert-level knowledge of NIST SP 800-53, FedRAMP High/Moderate, and DoD SRG (IL4, IL5, and familiarity with IL6).</li>\n<li>Operational Knowledge: Proven experience with access management, CI/CD pipelines, disaster recovery, and encryption/key management in a cloud context.</li>\n<li>Analytical Leadership: Ability to analyze complex &quot;edge-case&quot; security scenarios and provide remediation paths that align with both business goals and regulatory requirements.</li>\n<li>Communication: Exceptional presentation skills with the ability to explain technical compliance risks to non-technical executive stakeholders.</li>\n</ul>\n<p>Preferred Certifications &amp; Skills:</p>\n<ul>\n<li>Advanced Certifications: CISSP (highly preferred), CISA, or CCSK.</li>\n<li>Cloud Expertise: AWS Certified Solutions Architect or Cloud Practitioner.</li>\n<li>Tooling: Expert-level proficiency with JIRA, ServiceNow, and Okta.</li>\n<li>Technical Background: Prior experience in a DevOps, Security Engineering, or Systems Administration role is a significant plus.</li>\n</ul>\n<p>Additional requirements:</p>\n<ul>\n<li>This position requires the ability to access federal environments and/or have access to protected federal data. As a condition of employment for this position, the successful candidate must be able to submit documentation establishing U.S. Person status (e.g. a U.S. Citizen, National, Lawful Permanent Resident, Refugee, or Asylee. 22 CFR 120.15) upon hire.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3ad8987a-19b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7571077","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$161,000-$221,000 USD","x-skills-required":["Automation & Compliance Engineering","Cloud-native infrastructure","API-based control validation","OSCAL-based tooling","NIST SP 800-53","FedRAMP High/Moderate","DoD SRG (IL4, IL5)","Access management","CI/CD pipelines","Disaster recovery","Encryption/key management"],"x-skills-preferred":["CISSP","CISA","CCSK","AWS Certified Solutions Architect","Cloud Practitioner","JIRA","ServiceNow","Okta"],"datePosted":"2026-04-18T15:45:27.832Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Automation & Compliance Engineering, Cloud-native infrastructure, API-based control validation, OSCAL-based tooling, NIST SP 800-53, FedRAMP High/Moderate, DoD SRG (IL4, IL5), Access management, CI/CD pipelines, Disaster recovery, Encryption/key management, CISSP, CISA, CCSK, AWS Certified Solutions Architect, Cloud Practitioner, JIRA, ServiceNow, Okta","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":161000,"maxValue":221000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0bf3955d-b31"},"title":"IT Audit Analyst","description":"<p>We are looking for a dynamic and detail-oriented IT Audit Analyst or Senior IT Audit Analyst to join our growing Internal Audit team.</p>\n<p>In this role, you will play a key part in evaluating and strengthening ZoomInfo&#39;s IT control environment, with a primary focus on executing SOX compliance testing across IT general controls, automated controls, and system integrations.</p>\n<p>This position offers meaningful exposure to US GAAP, SOX compliance, and complex IT control environments, as well as the opportunity to work with automation and AI-driven tools.</p>\n<p>You will work closely with US-based teams and stakeholders across IT and business functions, requiring a shifted schedule with availability until 12:00 PM PST to enable effective collaboration.</p>\n<p>The ideal candidate brings strong analytical and communication skills, a proactive approach to problem solving, and a desire to grow in a fast-paced, high-growth SaaS environment.</p>\n<p>Key Responsibilities:</p>\n<ul>\n<li>Execute IT audit plans including evaluation of IT general controls (ITGCs), automated controls, application controls, and system integrations in support of ZoomInfo&#39;s SOX compliance program</li>\n</ul>\n<ul>\n<li>Conduct risk and control assessments across IT environments, identifying control gaps and providing practical recommendations for improvement and remediation</li>\n</ul>\n<ul>\n<li>Perform SOX compliance testing for IT general controls across key domains including access management, change management, computer operations, and system development</li>\n</ul>\n<ul>\n<li>Document audit workpapers clearly and thoroughly, ensuring documentation meets professional standards and supports audit conclusions</li>\n</ul>\n<ul>\n<li>Communicate audit findings effectively, including control deficiencies, root cause analysis, and recommended remediation steps, to both technical and non-technical stakeholders</li>\n</ul>\n<ul>\n<li>Partner with IT and business unit stakeholders to build collaborative relationships and ensure effective audit outcomes</li>\n</ul>\n<ul>\n<li>Support the monitoring of management action plans and remediation efforts related to identified control deficiencies</li>\n</ul>\n<ul>\n<li>Leverage audit management technology (AuditBoard) and data analytics tools to enhance audit efficiency and quality</li>\n</ul>\n<ul>\n<li>Contribute to the continuous improvement of audit methodologies, tools, and best practices, including the adoption of AI and automation capabilities</li>\n</ul>\n<ul>\n<li>Stay current on changes in the IT landscape, regulatory environment, and industry trends to assess impacts on ZoomInfo&#39;s IT risk and control profile</li>\n</ul>\n<p>Required Qualifications:</p>\n<ul>\n<li>Bachelor&#39;s degree in Accounting, Finance, Management Information Systems, Business Administration, or a related field</li>\n</ul>\n<ul>\n<li>CISA, CA or equivalent certification in good standing</li>\n</ul>\n<ul>\n<li>IT Audit Analyst: 3+ years of experience in IT audit, IT risk, or SOX compliance within a public company, Big 4 accounting firm, or equivalent corporate setting</li>\n</ul>\n<ul>\n<li>Senior IT Audit Analyst: 5+ years of experience in IT audit, IT risk, or SOX compliance within a public company, Big 4 accounting firm, or equivalent corporate setting</li>\n</ul>\n<ul>\n<li>Strong knowledge of IT general controls (ITGCs), automated controls, and IT risk assessment practices</li>\n</ul>\n<ul>\n<li>Solid understanding of SOX requirements, COSO framework, and COBIT standards as they relate to IT audit</li>\n</ul>\n<ul>\n<li>Familiarity with cloud-based platforms, SaaS applications, databases, and middleware solutions in the context of IT audit and SOX compliance</li>\n</ul>\n<ul>\n<li>Experience working with audit management technology; AuditBoard experience preferred</li>\n</ul>\n<ul>\n<li>Strong experience with data analytics and automation tools as applied to internal audit</li>\n</ul>\n<ul>\n<li>Excellent written and verbal communication skills in English, with the ability to present findings clearly to both technical and non-technical stakeholders</li>\n</ul>\n<ul>\n<li>Strong analytical, critical thinking, and problem-solving skills with the ability to manage multiple priorities and meet deadlines</li>\n</ul>\n<ul>\n<li>Ability to work independently and collaboratively in a fast-paced, global environment</li>\n</ul>\n<p>Preferred Qualifications:</p>\n<ul>\n<li>Experience with enterprise SaaS applications such as Salesforce, Workday, or Okta in an audit or controls context</li>\n</ul>\n<ul>\n<li>Hands-on experience with data visualization tools and advanced analytics techniques</li>\n</ul>\n<ul>\n<li>Familiarity with scripting or programming concepts such as Python as applied to audit automation and data analysis</li>\n</ul>\n<ul>\n<li>Familiarity with artificial intelligence and prompt engineering as applied to audit and risk management workflows</li>\n</ul>\n<ul>\n<li>Experience with agile audit methodologies or continuous auditing frameworks</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0bf3955d-b31","directApply":true,"hiringOrganization":{"@type":"Organization","name":"ZoomInfo","sameAs":"https://www.zoominfo.com/","logo":"https://logos.yubhub.co/zoominfo.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/zoominfo/jobs/8441742002","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SOX compliance","IT general controls","automated controls","application controls","system integrations","audit management technology","data analytics tools","AI-driven tools","cloud-based platforms","SaaS applications","databases","middleware solutions","CISA","CA","SOX requirements","COSO framework","COBIT standards"],"x-skills-preferred":["enterprise SaaS applications","data visualization tools","advanced analytics techniques","scripting or programming concepts","Python","artificial intelligence","prompt engineering","agile audit methodologies","continuous auditing frameworks"],"datePosted":"2026-04-18T15:43:48.246Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Chennai, Tamil Nadu, India"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"SOX compliance, IT general controls, automated controls, application controls, system integrations, audit management technology, data analytics tools, AI-driven tools, cloud-based platforms, SaaS applications, databases, middleware solutions, CISA, CA, SOX requirements, COSO framework, COBIT standards, enterprise SaaS applications, data visualization tools, advanced analytics techniques, scripting or programming concepts, Python, artificial intelligence, prompt engineering, agile audit methodologies, continuous auditing frameworks"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_22e2b8bb-55b"},"title":"Cybersecurity Officer","description":"<p>As the Cybersecurity Officer for Waymark, you will be responsible for advancing our core mission through the development of robust programs encompassing information security. As an organization working with patients and providers to improve health outcomes, it is critical to build and maintain appropriate systems and safeguards designed to protect the integrity and confidentiality of information.</p>\n<p>You are technical, a strong operator, and strategic thinker, looking to build, improve, and scale reliable security processes whenever possible. Your leadership of the information security program at Waymark will include all facets of cybersecurity, and the associated user experience of our remote teams, and community-based care workers. You will be responsible for security policy and implementation and operation of technical and administrative safeguards to support those policies. You will use your experience to inform sound judgement to achieve the appropriate management of security risks in a manner consistent with the company’s values. You will use your in-depth knowledge of security in a modern cloud based organization, to identify and address risks to the company, through a combination of hands-on technical contributions and directing and overseeing staff with security responsibilities. You will interact with the broader executive leadership team to communicate evolving needs, matching the security strategy to the size and stage of growth of the company and the information we safeguard.</p>\n<p>This is a remote friendly position that can be located anywhere in the United States.</p>\n<p><strong>Key Responsibilities &amp; Duties</strong></p>\n<ul>\n<li>Oversee the internal cybersecurity program, road map, and strategy, which includes developing and implementing procedures and policies designed to protect Waymark communications, systems, and assets from internal and external threats and that safeguards health information.</li>\n<li>Oversee and manage Waymark’s MSSP and outsourced IT vendor, including responsibility for security and IT budgets, and IT tools used by Waymark.</li>\n<li>Partner with Product, Engineering, Legal, and Compliance leadership to determine risks and deploy risk management processes, supporting Waymark’s secure software development lifecycle and ensuring that our internally developed products and services meet the expectations of our patients, customers and regulators</li>\n<li>Own, define and oversee the necessary security operational functions such as Identity Management, Vulnerability Management, Incident Response, Security Awareness, and Vendor Risk Management</li>\n<li>Serve as Waymark’s HIPAA Security Officer, ensuring compliance with the HIPAA Security Rule, working closely with the legal team to document, review, maintain, and implement standards, policies, and procedures within security disciplines.</li>\n<li>Lead the strategy, implementation, and maintenance of industry-standard security certifications, including SOC2 Type II.</li>\n<li>Conduct research, analysis, and correlation across a wide variety of source data to identify and prevent compromise of our networks, host systems, and data.</li>\n<li>Track and report on network security to the Waymark executive leadership team</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_22e2b8bb-55b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Waymark","sameAs":"https://www.waymark.com/","logo":"https://logos.yubhub.co/waymark.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/waymark/jobs/4675847005","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$140,000 - $185,000","x-skills-required":["BSCS or equivalent experience in an operational security role","10+ years of experience in security and/or information assurance roles, and risk management","Knowledge of information security management frameworks, such as NIST cybersecurity framework","Experience and/or ability to learn and apply hands-on skills in a cloud native production environment","Experience implementing cloud security technologies, including encryption, network security, intrusion detection, and could monitoring"],"x-skills-preferred":["Key industry certifications in information security, such as CISSP, CISM and CISA","Experience in a startup of 100 - 500 people","Experience with securing a production SaaS product hosted in AWS","Experience conducting or managing technical audit engagements, or directly responding to auditor inquiries"],"datePosted":"2026-04-17T13:07:42.117Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"US - Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Healthcare","skills":"BSCS or equivalent experience in an operational security role, 10+ years of experience in security and/or information assurance roles, and risk management, Knowledge of information security management frameworks, such as NIST cybersecurity framework, Experience and/or ability to learn and apply hands-on skills in a cloud native production environment, Experience implementing cloud security technologies, including encryption, network security, intrusion detection, and could monitoring, Key industry certifications in information security, such as CISSP, CISM and CISA, Experience in a startup of 100 - 500 people, Experience with securing a production SaaS product hosted in AWS, Experience conducting or managing technical audit engagements, or directly responding to auditor inquiries","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":140000,"maxValue":185000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1bdc3caf-792"},"title":"Governance, Risk, and Compliance (GRC) SME - Senior Consultant","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>\n<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>\n<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>\n<p>Direct and lead NIST CSF risk assessments</p>\n<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>\n<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>\n<p><strong>Requirements</strong></p>\n<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>\n<p>Your security experience must include:</p>\n<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>\n<p>1-5 years+ in the field of cyber security/infosec.</p>\n<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Your diverse Security experience should include one or some of below:</p>\n<p>A good understanding of NIST CSF</p>\n<p>A post graduate degree in cyber /information security</p>\n<p>Cyber Due Diligence Assessments</p>\n<p>Third- Party &amp; Supply chain Cyber Risk Management</p>\n<p>Incident Response Plan review</p>\n<p>Supporting bids, RFP responses and proposals</p>\n<p>Crisis Management Exercises (CMX)</p>\n<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>\n<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>\n<p>Helping the design of Cyber Security Roadmaps</p>\n<p>Supporting Post Incident Reviews</p>\n<p>Reading and summarising Cyber Threat Intelligence reports</p>\n<p>Cyber Security Risk Assessments or Maturity Assessments</p>\n<p>Design and/deliver awareness training.</p>\n<p>Worked on Identity and Access Management projects.</p>\n<p>Worked on Privileged access management projects</p>\n<p><strong>Our ideal candidate may have some of the following skills:</strong></p>\n<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Enjoy working with different clients from different industries.</p>\n<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>\n<p>Be able to build strong and effective business relationships at all levels</p>\n<p>Be able to support and oversee staff with less experience in their tasks</p>\n<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>\n<p><strong>About your team</strong></p>\n<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1bdc3caf-792","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity frameworks","risk management","regulatory compliance","security governance","NIST CSF","cyber due diligence assessments","third-party and supply chain cyber risk management","incident response plan review","crisis management exercises","accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM","target operating models","RACI matrices","cybersecurity roadmaps","post-incident reviews","cyber threat intelligence reports","cybersecurity risk assessments","identity and access management","privileged access management"],"x-skills-preferred":["stakeholder management","problem-solving","resilience","data and information gathering","data and information validation","data and information synthesis","data and information documentation","data and information communication","interpersonal skills","written communication skills","verbal communication skills"],"datePosted":"2026-03-09T16:53:00.785Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f56e4b3a-ca5"},"title":"Third Party Risk Management (TPRM) Consultant - Principal","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are seeking an experienced Principal Third Party Risk Management (TPRM) Consultant to lead and shape our Third Party Risk and GRC services within the cyber security consultancy. This is a senior leadership role responsible for driving strategy, managing complex client engagements, and delivering enterprise-scale TPRM and GRC programmes across multiple industries. As a subject matter expert in Third Party Risk Management, Governance, Risk &amp; Compliance (GRC) and vendor risk frameworks, you will design, implement, and operate robust third-party risk management frameworks that align with regulatory, security, and business requirements. You will act as a trusted advisor to clients, lead large transformation initiatives, manage teams, and ensure high-quality delivery of risk, compliance, and assurance services.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>·       <strong>TPRM Proposals &amp; Strategy</strong>: Lead the development of TPRM and GRC proposals, defining scope, delivery models, governance structures, and operating models and design enterprise-level Third Party Risk Management strategies aligned with regulatory, operational, and cyber risk requirements.</p>\n<p>·       <strong>Client Engagement Leadership</strong>: Lead and manage complex client engagements in Third Party Risk Management, vendor risk, and GRC and act as engagement lead and trusted advisor for executive stakeholders (CISO, CRO, Risk, Compliance, Procurement, Legal). In addition to that ensure successful delivery of TPRM services including assessments, frameworks, tooling, and operationalisation.</p>\n<p>·       <strong>Security Assessment &amp; Audit Leadership</strong>: Lead third-party security assessments, audits, and assurance activities and define assessment methodologies, risk scoring models, control frameworks, and reporting structures as well as oversee supplier due diligence, onboarding risk processes, and continuous monitoring programmes.</p>\n<p>·       <strong>Technical &amp; Methodological Authority</strong>: Serve as subject matter expert for TPRM, GRC platforms, and vendor risk methodologies and provide leadership in the use of GRC and TPRM tooling (e.g. OneTrust, Archer, ServiceNow GRC, similar platforms).</p>\n<p>·       <strong>Project, Delivery &amp; Programme Leadership</strong>: Act as Project Manager, Delivery Lead, and Programme Lead for large-scale TPRM initiatives and manage multi-stream delivery, dependencies, risks, and stakeholder alignment.</p>\n<p>·       <strong>Team Leadership &amp; Management</strong>: Lead, mentor, and develop a team of consultants (up to 5 direct reports) and build high-performing delivery teams and ensure capability development in TPRM and GRC.</p>\n<p>·       <strong>Risk &amp; Compliance Management:</strong> Identify, assess, and manage third-party risks across cyber, operational, regulatory, and reputational domains and advise clients on risk treatment strategies, remediation plans, and control improvements.</p>\n<p>·       <strong>Continuous Improvement &amp; Innovation</strong>: Drive continuous improvement in TPRM methodologies, delivery models, and service offerings and stay current with regulatory developments, emerging risks, and industry best practices in third-party risk and supply chain security.</p>\n<p><strong><strong>Requirements</strong></strong></p>\n<p><strong>Essential Skills and Experience:</strong></p>\n<p>·       Extensive experience in Third Party Risk Management (TPRM) and Governance, Risk &amp; Compliance (GRC) at enterprise level.</p>\n<p>·       Strong background as Security Assessor, Auditor, and Risk Consultant.</p>\n<p>·       Proven experience leading TPRM, vendor risk, and supplier assurance programmes.</p>\n<p>·       Experience acting as Project Manager, Delivery Lead, and Programme Lead for complex engagements.</p>\n<p>·       Hands-on experience with GRC / TPRM platforms, ideally including OneTrust.</p>\n<p>·       Ability to design and implement third-party risk frameworks, policies, and governance models.</p>\n<p>·       Strong stakeholder management skills at executive and board level.</p>\n<p>·       Proven people management experience, including team leadership and mentoring.</p>\n<p>·       Ability to balance security, risk, compliance, and business enablement.</p>\n<p><strong>Qualifications:</strong></p>\n<p>·       Minimum 10 years of experience in cyber security, risk management, GRC, audit, or related domains.</p>\n<p>·       CISA (Certified Information Systems Auditor) strongly preferred.</p>\n<p>·       Lead Auditor certification (e.g. ISO 27001 Lead Auditor) highly desirable.</p>\n<p>·       Additional certifications such as CISM, CRISC, CISSP are an advantage.</p>\n<p>·       Experience working across multiple industries (e.g. Financial Services, Healthcare, Critical Infrastructure, Government, Technology).</p>\n<p>·       Experience with regulatory-driven environments and compliance-led transformation programmes.</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please_ _<strong>apply now.</strong>_</p>\n<p><strong><strong>Benefits</strong></strong></p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology.  We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, <strong>Equity</strong> and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal ambitions. Curious to learn more? We’d love to hear from you.... <strong>Apply today!</strong></p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f56e4b3a-ca5","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/3AGuZh2zhvyMa3e9DNdg37/remote-third-party-risk-management-(tprm)-consultant---principal-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Third Party Risk Management","Governance, Risk & Compliance","Vendor Risk Management","Security Assessment","Audit Leadership","Project Management","Delivery Leadership","Programme Leadership","Team Leadership","Risk Management","Compliance Management","Continuous Improvement","Innovation"],"x-skills-preferred":["OneTrust","Archer","ServiceNow GRC","CISA","Lead Auditor certification","CISM","CRISC","CISSP"],"datePosted":"2026-03-09T16:51:45.581Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Consulting","industry":"Technology","skills":"Third Party Risk Management, Governance, Risk & Compliance, Vendor Risk Management, Security Assessment, Audit Leadership, Project Management, Delivery Leadership, Programme Leadership, Team Leadership, Risk Management, Compliance Management, Continuous Improvement, Innovation, OneTrust, Archer, ServiceNow GRC, CISA, Lead Auditor certification, CISM, CRISC, CISSP"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f7bc3829-4cd"},"title":"IT Auditor, Sr Associate/Staff","description":"<p><strong>Overview</strong></p>\n<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p><strong>Job Description</strong></p>\n<p>We are seeking a motivated and detail-oriented audit professional with a strong interest in technology, information security, and risk management. You will be responsible for planning and executing IT and/or Information Security audits in accordance with the annual audit plan. You will also perform IT risk assessments to identify key risks and support the development and refinement of the annual IT audit plan.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Planning and executing IT and/or Information Security audits in accordance with the annual audit plan.</li>\n<li>Performing IT risk assessments to identify key risks and support the development and refinement of the annual IT audit plan.</li>\n<li>Evaluating the design and operating effectiveness of IT General Controls (ITGCs) and, where applicable, IT Application Controls.</li>\n<li>Supporting SOX compliance activities, including walkthroughs, control testing, issue identification, and remediation follow-up.</li>\n<li>Conducting audits over key systems and platforms, including ERP and cloud-based applications (e.g., SAP and/or Salesforce).</li>\n<li>Collaborating with business, IT, and Information Security stakeholders to understand processes, risks, and controls.</li>\n<li>Preparing clear, concise audit documentation, reports, and presentations that communicate findings, risks, and recommendations.</li>\n<li>Tracking and validating remediation of audit findings and control deficiencies.</li>\n<li>Staying current on emerging technology risks, regulatory expectations, and industry best practices related to IT and cybersecurity.</li>\n</ul>\n<p><strong>Benefits</strong></p>\n<p>At Synopsys, innovation is driven by our incredible team around the world. We feel honored to work alongside such talented and passionate individuals who choose to make a difference here every day. We&#39;re proud to provide the comprehensive benefits and rewards that our team truly deserves.</p>\n<ul>\n<li>Health &amp; Wellness: Comprehensive medical and healthcare plans that work for you and your family.</li>\n<li>Time Away: In addition to company holidays, we have ETO and FTO Programs.</li>\n<li>Family Support: Maternity and paternity leave, parenting resources, adoption and surrogacy assistance, and more.</li>\n<li>ESPP: Purchase Synopsys common stock at a 15% discount, with a 24 month look-back.</li>\n<li>Retirement Plans: Save for your future with our retirement plans that vary by region and country.</li>\n<li>Compensation: Competitive salaries.</li>\n</ul>\n<p><strong>Team</strong></p>\n<p>You will join a collaborative and forward-thinking Internal Audit team that partners closely with the business and technology functions. The team values quality, integrity, and open communication, and provides opportunities to work across a broad range of systems, processes, and risks. You&#39;ll gain exposure to senior stakeholders, develop your technical and audit expertise, and play a meaningful role in strengthening the organization&#39;s control environment.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f7bc3829-4cd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/bengaluru/it-auditor-sr-associate-staff/44408/92463617200","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["IT audit","information security","risk management","SOX compliance","ERP","cloud-based applications","SAP","Salesforce","IT General Controls","IT Application Controls","auditing","risk assessment","control testing","issue identification","remediation follow-up","auditing documentation","reporting","presentation","emerging technology risks","regulatory expectations","industry best practices"],"x-skills-preferred":["CISA","CIA","CISSP","auditing software","risk management software"],"datePosted":"2026-03-08T22:18:27.923Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Bengaluru"}},"employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Technology","skills":"IT audit, information security, risk management, SOX compliance, ERP, cloud-based applications, SAP, Salesforce, IT General Controls, IT Application Controls, auditing, risk assessment, control testing, issue identification, remediation follow-up, auditing documentation, reporting, presentation, emerging technology risks, regulatory expectations, industry best practices, CISA, CIA, CISSP, auditing software, risk management software"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_c76d0c6d-ec7"},"title":"Technical Policy Manager, Cyber Harms","description":"<p><strong>About the Role:</strong></p>\n<p>We are looking for a cybersecurity expert to lead our efforts to prevent AI misuse in the cyber domain. As a Cyber Harms Technical Policy Manager, you will lead a team applying deep technical expertise to inform the design of safety systems that detect harmful cyber behaviours and prevent misuse by sophisticated threat actors.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Lead and grow a team of technical specialists focused on cyber threat modelling and evaluation frameworks</li>\n<li>Design and oversee execution of capability evaluations (&#39;evals&#39;) to assess the cyber-relevant capabilities of new models</li>\n<li>Create comprehensive cyber threat models, including attack vectors, exploit chains, precursor identification, and weaponization techniques</li>\n<li>Develop and iterate on usage policies that govern responsible use of our models for emerging capabilities and use cases related to cyber harms</li>\n<li>Serve as the primary domain expert on cyber harms, advising cross-functional teams on threat landscapes and mitigation strategies</li>\n<li>Collaborate closely with internal and external threat modelling experts to develop training data for safety systems, and with ML engineers to train these systems, optimising for both robustness against adversarial attacks and low false-positive rates for legitimate security researchers</li>\n<li>Analyse safety system performance in traffic, identifying gaps and proposing improvements</li>\n<li>Conduct regular reviews of existing policies and enforcement systems to identify and address gaps and ambiguities related to cybersecurity risks</li>\n<li>Develop rigorous stress-testing of safeguards against evolving cyber threats and product surfaces</li>\n<li>Partner with Research, Product, Policy, Security Team, and Frontier Red Team to ensure cybersecurity safety is embedded throughout the model development lifecycle</li>\n<li>Translate cybersecurity domain knowledge into actionable safety requirements and clearly articulated policies</li>\n<li>Contribute to external communications, including model cards, blog posts, and policy documents related to cybersecurity safety</li>\n<li>Monitor emerging technologies and threat landscapes for their potential to contribute to new risks and mitigation strategies, and strategically address these</li>\n<li>Mentor and develop team members, fostering a culture of technical excellence and responsible AI development</li>\n</ul>\n<p><strong>You may be a good fit if you have:</strong></p>\n<ul>\n<li>An M.S. or PhD in Computer Science, Cybersecurity, or a related technical field, OR equivalent professional experience in offensive or defensive cybersecurity</li>\n<li>5+ years of hands-on experience in cybersecurity, with deep expertise in areas such as vulnerability research, exploit development, network security, malware analysis, or penetration testing</li>\n<li>2+ years of experience managing technical teams or leading complex technical projects with multiple stakeholders</li>\n<li>Experience in scientific computing and data analysis, with proficiency in programming (Python preferred)</li>\n<li>Deep expertise in modern cybersecurity, including both offensive techniques (vulnerability research, exploit development, penetration testing, malware analysis) and defensive measures (detection, monitoring, incident response)</li>\n<li>Demonstrated ability to create threat models and translate technical cyber risks into policy frameworks</li>\n<li>Familiarity with responsible disclosure practices, vulnerability coordination, and cybersecurity frameworks (e.g., MITRE ATT&amp;CK, NIST Cybersecurity Framework, CWE/CVE systems)</li>\n<li>Strong analytical and writing skills, with the ability to navigate ambiguity and explain complex technical concepts to non-technical stakeholders</li>\n<li>Experience developing policies or guidelines at scale, balancing safety concerns with enabling legitimate use cases</li>\n<li>A passion for learning new skills and an ability to rapidly adapt to changing techniques and technologies</li>\n<li>Comfort working in a fast-paced environment where priorities may shift as AI capabilities evolve</li>\n<li>Track record of translating specialised technical knowledge into actionable safety policies or enforcement guidelines</li>\n</ul>\n<p><strong>Preferred Qualifications:</strong></p>\n<ul>\n<li>Background in AI/ML systems, particularly experience with large language models</li>\n<li>Experience developing ML-based security systems or adversarial ML research</li>\n<li>Experience working with defence, intelligence, or security organisations (e.g., NSA, CISA, national labs, security contractors)</li>\n<li>Published security research, disclosed vulnerabilities, or participated in bug bounty programs</li>\n<li>Understanding of Trust &amp; Safety operations and content moderation at scale</li>\n<li>Certifications such as OSCP, OSCE, GXPN, or equivalent demonstrating technical depth</li>\n<li>Understanding of dual-use security research concerns and ethical considerations in AI safety</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_c76d0c6d-ec7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Anthropic","sameAs":"https://job-boards.greenhouse.io","logo":"https://logos.yubhub.co/anthropic.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/anthropic/jobs/5066981008","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"The annual compensation for this role is not specified in the job posting.","x-skills-required":["cybersecurity","vulnerability research","exploit development","network security","malware analysis","penetration testing","scientific computing","data analysis","programming (Python)","threat modelling","policy frameworks","responsible disclosure practices","vulnerability coordination","cybersecurity frameworks (e.g., MITRE ATT&CK, NIST Cybersecurity Framework, CWE/CVE systems)"],"x-skills-preferred":["AI/ML systems","large language models","ML-based security systems","adversarial ML research","defence, intelligence, or security organisations","NSA, CISA, national labs, security contractors","published security research","disclosed vulnerabilities","bug bounty programs","Trust & Safety operations","content moderation at scale","OSCP, OSCE, GXPN, or equivalent certifications","dual-use security research concerns","ethical considerations in AI safety"],"datePosted":"2026-03-08T13:50:25.823Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco, CA, Washington, DC"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cybersecurity, vulnerability research, exploit development, network security, malware analysis, penetration testing, scientific computing, data analysis, programming (Python), threat modelling, policy frameworks, responsible disclosure practices, vulnerability coordination, cybersecurity frameworks (e.g., MITRE ATT&CK, NIST Cybersecurity Framework, CWE/CVE systems), AI/ML systems, large language models, ML-based security systems, adversarial ML research, defence, intelligence, or security organisations, NSA, CISA, national labs, security contractors, published security research, disclosed vulnerabilities, bug bounty programs, Trust & Safety operations, content moderation at scale, OSCP, OSCE, GXPN, or equivalent certifications, dual-use security research concerns, ethical considerations in AI safety"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee2db308-a07"},"title":"Senior Manager IT Security & LISO","description":"<p><strong>What you&#39;ll do</strong></p>\n<p>As Senior Manager IT Security &amp; LISO, you will be responsible for the following tasks:</p>\n<ul>\n<li>Strategische Verantwortung für den Aufbau, die Weiterentwicklung und Steuerung des Informationssicherheitsmanagementsystems (ISMS) im Einklang mit Konzernvorgaben (TISAX®)</li>\n<li>Umsetzung und Sicherstellung der Einhaltung der IT-Sicherheitsrichtlinien, Standards und Verfahren, im Rahmen von IT-Projekten (SDE), abgestimmt auf die Business-Prozesse im Retail- und Automotive-Umfeld</li>\n<li>Vorbereitung, Durchführung und Nachbereitung interner sowie externer Audits (z.B. TISAX-Assessments, etc.)</li>\n<li>Analyse von Sicherheitsvorfällen, Leitung von Incident-Response-Prozessen sowie Überwachung von Maßnahmenplänen</li>\n<li>Unterstützung bei IT-Projekten als beratende Funktion sowie übernahme der Verantwortung für die technische Prüfung und die IT-Sicherheitsfreigabe von Lösungen</li>\n<li>Enge Abstimmung und Zusammenarbeit mit Konzern-Informationssicherheit, IT, Datenschutzbeauftragtem, Compliance und Risikomanagement</li>\n<li>Leitung von Schulungs- und Sensibilisierungsprogrammen für alle Ebenen der Organisation</li>\n<li>Monitoring und Reporting von KPIs und KRIs (Key Risk Indicators)</li>\n<li>Ansprechpartner bei IT-Projekten mit Bezug auf IT-Sicherheit inkl. Auswahl und Steuerung von externen Dienstleistern sowie Abstimmung/Synchronisierung mit den relevanten PAG IT-Bereichen</li>\n</ul>\n<p><strong>Anforderungen</strong></p>\n<ul>\n<li>Erfolgreich abgeschlossenes Studium im Bereich IT, Informationssicherheit, Wirtschaftsinformatik oder eine vergleichbare Qualifikation</li>\n<li>Mindestens 5 Jahre Berufserfahrung im Bereich Informationssicherheit, vorzugsweise in einem Unternehmen mit Automotive-Bezug oder komplexer Retail-IT-Struktur</li>\n<li>Erfahrung in der Informationssicherheit und Kenntnisse über gängige Sicherheitsstandards und -praktiken, Zertifizierung in diesem Bereich von Vorteil (z.B. CISM, CISA)</li>\n<li>Fundierte Kenntnisse im Berechtigungs- und Zugriffsmanagement, Risk Management, Incident Handling und Business Continuity Management</li>\n<li>Ausgeprägte Fähigkeit, sowohl operative als auch strategische Themen sicherheitsrelevant zu bewerten und pragmatische Lösungen zu entwickeln</li>\n<li>Erfahrung in der Steuerung interdisziplinärer Teams und externer Partner von Vorteil</li>\n<li>Ausgezeichnete Kommunikations- und Präsentationsfähigkeiten, sowohl in Deutsch als auch in Englisch</li>\n<li>Hohes Maß an Eigeninitiative, Durchsetzungsstärke und ausgeprägtes Verantwortungsbewusstsein</li>\n</ul>\n<p><strong>Unternehmen</strong></p>\n<p>Unsere Philosophie: Die Funktion optimieren. Die Form kompromisslos auf das Wesentliche reduzieren. Das Bekannte überwinden, um immer wieder die neue, beste Lösung zu entdecken. Nur so entstehen einzigartige Designobjekte, die das Vorhersehbare hinter sich lassen, maximale Performance bieten und zu lebenslangen Begleitern werden.</p>\n<p>Erlebe die Faszination Porsche Lifestyle unter: www.porsche-design.de</p>\n<p><strong>Hinweise zur Bewerbung</strong></p>\n<p>Bitte fülle unser Online-Bewerbungsformular aus und füge am Ende Deine vollständigen Bewerbungsdokumente bei, die aus Anschreiben, Lebenslauf, Arbeits- und (Hoch-) Schulzeugnissen sowie ggf. weiteren Bescheinigungen (Aufenthaltsgenehmigung, sofern erforderlich) bestehen.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee2db308-a07","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Porsche Lifestyle GmbH & Co. KG","sameAs":"https://jobs.porsche.com","logo":"https://logos.yubhub.co/jobs.porsche.com.png"},"x-apply-url":"https://jobs.porsche.com/index.php?ac=jobad&id=16485","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["IT Security","Informationssicherheit","Wirtschaftsinformatik","Sicherheitsstandards","Sicherheitspraktiken","Berechtigungs- und Zugriffsmanagement","Risk Management","Incident Handling","Business Continuity Management"],"x-skills-preferred":["CISM","CISA"],"datePosted":"2025-12-08T16:24:04.987Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ludwigsburg"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Automotive","skills":"IT Security, Informationssicherheit, Wirtschaftsinformatik, Sicherheitsstandards, Sicherheitspraktiken, Berechtigungs- und Zugriffsmanagement, Risk Management, Incident Handling, Business Continuity Management, CISM, CISA"}]}