{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/cism"},"x-facet":{"type":"skill","slug":"cism","display":"Cism","count":13},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f8c5a32f-1c7"},"title":"Sr. Cyber Security GRC Specialist","description":"<p>At Bayer, we&#39;re seeking a Sr. Cyber Security GRC Specialist to support the development, implementation, and ongoing operation of Cyber Security Governance, Risk, and Compliance (GRC) activities within the organisation.</p>\n<p>As a Sr. Cyber Security GRC Specialist, you will partner with Cyber Security, IT, compliance, and business stakeholders to help measure adherence to Bayer policies and procedures aligned to industry standards; assess the effectiveness of security and compliance processes; track key IT security deliverables; and contribute to audit readiness.</p>\n<p>Your tasks and responsibilities will include:</p>\n<ul>\n<li>Supporting Cyber Security risk management activities to identify, assess, and help mitigate risks, including contributing to the operation and continuous improvement of the Cyber Security framework;</li>\n<li>Developing and maintaining key performance indicators (KPIs), dashboards, and metrics to measure the effectiveness of initiatives;</li>\n<li>Collaborating with cross-functional teams to help integrate Cyber Security assurance principles into business processes and systems;</li>\n<li>Providing guidance and day-to-day support across the organisation on Cyber Security assurance topics, following established standards and practices;</li>\n<li>Monitoring regulatory changes and industry trends and summarising impacts to policies, controls, and risk posture;</li>\n<li>Coordinating evidence collection and responding to auditor inquiries in partnership with control owners and subject matter experts;</li>\n<li>Contributing to strategic initiatives by supporting planning, tracking milestones, and producing high-quality deliverables;</li>\n<li>Supporting continuous improvement of the data classification framework that categorises data based on sensitivity and risk;</li>\n<li>Partnering with stakeholders at all levels of the organisation to help ensure appropriate classification of data assets across the organisation;</li>\n<li>Assisting with periodic reviews and updates to classification policies to align with regulatory changes and business needs;</li>\n<li>Supporting identification and management of the organisation&#39;s critical data assets (&#39;crown jewels&#39;);</li>\n<li>Helping implement and maintain security requirements and protection measures for high-value data assets in partnership with relevant teams;</li>\n<li>Participating in assessments and control reviews related to crown jewel data to support compliance with security standards;</li>\n<li>Supporting data discovery and inventory activities to improve visibility of data assets across the organisation;</li>\n<li>Utilising data discovery tools and techniques to help identify sensitive data and its locations;</li>\n<li>Maintaining an up-to-date inventory of data assets, including classification and documented protection measures;</li>\n<li>Working closely with IT, compliance, and legal teams to help ensure alignment on data protection requirements and implementation plans;</li>\n<li>Serving as a point of contact for data security inquiries by triaging requests and connecting teams with the right standards, processes, and subject matter experts;</li>\n<li>Promoting strong collaboration and alignment with broader GRC capabilities and ways of working.</li>\n</ul>\n<p>The primary location for this role will be Creve Coeur, MO (St. Louis, MO metro area).</p>\n<p>If you&#39;re interested in this opportunity, please submit your application.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f8c5a32f-1c7","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Bayer","sameAs":"https://talent.bayer.com","logo":"https://logos.yubhub.co/talent.bayer.com.png"},"x-apply-url":"https://talent.bayer.com/careers/job/562949976820204","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$114,400 - $171,600","x-skills-required":["Cyber Security","Risk Management","Compliance","Data Classification","Data Protection","Security Standards","Auditing","Strategic Planning","Team Collaboration","Communication"],"x-skills-preferred":["CISSP","CISM","CRISC","Security+"],"datePosted":"2026-04-18T22:10:56.879Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Creve Coeur"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Pharmaceuticals","skills":"Cyber Security, Risk Management, Compliance, Data Classification, Data Protection, Security Standards, Auditing, Strategic Planning, Team Collaboration, Communication, CISSP, CISM, CRISC, Security+","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":114400,"maxValue":171600,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3ba73370-831"},"title":"Internal Audit IT Manager","description":"<p>Ready to be pushed beyond what you think you’re capable of?</p>\n<p>At Coinbase, our mission is to increase economic freedom in the world.</p>\n<p>We’re seeking a very specific candidate who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system.</p>\n<p>As an Internal Audit IT Manager, you will own end-to-end delivery of complex IT and security audits across our cloud infrastructure, security operations, and crypto-native systems.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning end-to-end delivery of IT and security audits, from risk assessment and scoping through planning, fieldwork, testing, reporting, and issue validation,covering cloud infrastructure (AWS, GCP), security operations, identity and access management, data protection, IT asset management, vendor/third-party risk, and key in-scope products and services including blockchain infrastructure, centralized and self-hosted wallets, and cold storage.</li>\n</ul>\n<ul>\n<li>Driving AI-enabled audit execution, designing and implementing data analytics, automation, and Generative AI solutions to modernize how we audit (e.g., continuous monitoring, anomaly detection, automated evidence retrieval, AI-assisted workpaper drafting),while maintaining rigorous human-in-the-loop validation to ensure accuracy and audit-quality conclusions.</li>\n</ul>\n<ul>\n<li>Executing audits aligned with the multi-year IT and security audit roadmap, coordinating coverage with co-sourced partners and cross-functional risk initiatives while ensuring alignment with Coinbase&#39;s enterprise risk profile, technology strategy, and regulatory expectations across regions (US, EMEA, APAC).</li>\n</ul>\n<ul>\n<li>Driving high-quality, risk-based findings and executive-level reporting, distilling key themes, emerging risks, and root causes into clear, concise materials for senior management and the Chief Audit Executive,ensuring findings are appropriately documented and supported by evidence.</li>\n</ul>\n<ul>\n<li>Partnering with technology and security leadership across Engineering, Security, Infrastructure, Product, and Operations to build trusted relationships, challenge control design, and advise on pragmatic, risk-based, scalable remediation while maintaining third-line independence.</li>\n</ul>\n<ul>\n<li>Driving disciplined issue management, ensuring timely, risk-based remediation by management, high-quality root cause analysis, and validation of remediation activities,escalating delays or thematic concerns to senior leadership as needed.</li>\n</ul>\n<ul>\n<li>Evaluating and developing talent, assessing candidates and helping build a high-performing, technically credible audit team.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>7+ years of experience in IT/security internal audit, technology risk, or first-line security/engineering roles with significant controls exposure.</li>\n</ul>\n<ul>\n<li>Experience working in a fast-paced, cloud-native, or engineering-driven environment where technology and security practices evolve rapidly.</li>\n</ul>\n<ul>\n<li>Hands-on audit experience with cloud platforms (AWS, GCP), including IAM policies, security configurations, logging/monitoring, and CI/CD pipelines.</li>\n</ul>\n<ul>\n<li>AI-forward mindset with demonstrated experience applying Python, SQL, or AI tools to audit or security work, building workflows rather than just prompting.</li>\n</ul>\n<ul>\n<li>Relevant professional certifications (e.g., CISA, CISSP, CIA, CISM) required; CPA or CFE a plus.</li>\n</ul>\n<ul>\n<li>Working knowledge of key frameworks such as NIST CSF, COBIT, SOC 2, and ITIL.</li>\n</ul>\n<ul>\n<li>High EQ and collaborative style.</li>\n</ul>\n<ul>\n<li>Proven ability to translate complex technical findings into clear, executive-ready narratives for both technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Ability to manage multiple audits and initiatives across time zones (EMEA, APAC) with minimal oversight.</li>\n</ul>\n<ul>\n<li>Demonstrated leadership and team-development experience, including mentoring, coaching, and managing direct reports.</li>\n</ul>\n<ul>\n<li>Demonstrates the ability to responsibly use generative AI tools and copilots (e.g., LibreChat, Gemini, Glean) in daily workflows, continuously learn as tools evolve, and apply human-in-the-loop practices to deliver business-ready outputs and drive measurable improvements in efficiency, cost, and quality.</li>\n</ul>\n<p>Nice to have:</p>\n<ul>\n<li>Experience auditing or building blockchain infrastructure, crypto custody, or wallet systems (hot/cold storage).</li>\n</ul>\n<ul>\n<li>Background in a high-growth or rapidly scaling environment with complex, evolving technology stacks.</li>\n</ul>\n<ul>\n<li>Experience with GRC platforms (Workiva, Archer, AuditBoard) or building custom audit automation tooling.</li>\n</ul>\n<ul>\n<li>Familiarity with DORA, MiCA, or crypto-specific regulatory frameworks.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3ba73370-831","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Coinbase","sameAs":"https://www.coinbase.com/","logo":"https://logos.yubhub.co/coinbase.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coinbase/jobs/7755116","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$166,345-$195,700 USD","x-skills-required":["IT security","Cloud infrastructure","Security operations","Identity and access management","Data protection","IT asset management","Vendor/third-party risk","Blockchain infrastructure","Centralized and self-hosted wallets","Cold storage","AI-enabled audit execution","Data analytics","Automation","Generative AI","Continuous monitoring","Anomaly detection","Automated evidence retrieval","AI-assisted workpaper drafting","Cloud platforms","IAM policies","Security configurations","Logging/monitoring","CI/CD pipelines","Python","SQL","AI tools","NIST CSF","COBIT","SOC 2","ITIL","CISA","CISSP","CIA","CISM","CPA","CFE"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:58:31.708Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - USA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"IT security, Cloud infrastructure, Security operations, Identity and access management, Data protection, IT asset management, Vendor/third-party risk, Blockchain infrastructure, Centralized and self-hosted wallets, Cold storage, AI-enabled audit execution, Data analytics, Automation, Generative AI, Continuous monitoring, Anomaly detection, Automated evidence retrieval, AI-assisted workpaper drafting, Cloud platforms, IAM policies, Security configurations, Logging/monitoring, CI/CD pipelines, Python, SQL, AI tools, NIST CSF, COBIT, SOC 2, ITIL, CISA, CISSP, CIA, CISM, CPA, CFE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":166345,"maxValue":195700,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0c1f85bb-c33"},"title":"Senior Product Manager, Compliance","description":"<p>CoreWeave is building the infrastructure that powers the next era of AI. As we scale towards and beyond public company readiness, the CIO organisation is responsible for owning the execution of IT General Controls (ITGCs) and IT application controls across our technology environment.</p>\n<p>We are looking for a Senior Product Manager, IT SOX Compliance to join our team. This is not a traditional audit-support role. As the Product Manager, IT SOX Compliance, you will translate SOX compliance requirements into structured programs, drive accountability across IT process owners, and build the systems and workflows that make compliance scalable.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning the end-to-end IT SOX compliance program within the CIO organisation, maintaining the IT control inventory spanning ITGCs, IT-dependent controls, and automated application controls</li>\n<li>Owning the control design and documentation, including narratives and risk and control matrices (RCMs), ensuring controls are clearly defined and audit-ready</li>\n<li>Partnering with IT, Accounting (where needed), and the SOX team to ensure new systems and modules are implemented with appropriate SDLC controls in place prior to go-live; reviewing control designs to identify and mitigate SOX risks</li>\n<li>On an ongoing basis, partnering with IT process owners and control operators to ensure controls are executed in a timely manner</li>\n<li>Reviewing control evidence for quality and completeness before submission to auditors</li>\n<li>Managing the full deficiency lifecycle , from root cause analysis through remediation planning, retesting, and escalation , reporting control health to IT leadership and the SOX team</li>\n<li>Leading root cause analysis for control failures and incidents, tracking and resolving systemic gaps, and implementing and validating remediation plans to prevent recurrence</li>\n</ul>\n<p>You will work closely with the SOX team and IT process owners to ensure controls are designed, reviewed, and evidenced effectively.</p>\n<p>The ideal candidate will have 8+ years of experience in IT audit, IT risk, IT compliance, or a related field, with hands-on IT SOX experience in either a practitioner or oversight capacity. You will have deep familiarity with IT General Controls (ITGCs) , access management, change management, SDLC, and computer operations , and how they map to financial reporting risk.</p>\n<p>In addition to a competitive salary declaration, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, company-paid life insurance, voluntary supplemental life insurance, short and long-term disability insurance, flexible spending account, health savings account, tuition reimbursement, ability to participate in employee stock purchase program (ESPP), mental wellness benefits through Spring Health, family-forming support provided by Carrot, paid parental leave, flexible, full-service childcare support with Kinside, 401(k) with a generous employer match, flexible PTO, catered lunch each day in our office and data center locations, a casual work environment, and a work culture focused on innovative disruption.</p>\n<p>Why CoreWeave?</p>\n<p>At CoreWeave, we work hard, have fun, and move fast! We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on. We&#39;re not afraid of a little chaos, and we&#39;re constantly learning. Our team cares deeply about how we build our product and how we work together, which is represented through our core values: Be Curious at Your Core, Act Like an Owner, Empower Employees, Deliver Best-in-Class Client Experiences, Achieve More Together.</p>\n<p>We support and encourage an entrepreneurial outlook and independent thinking. We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems. As we get set for takeoff, the organisation&#39;s growth opportunities are constantly expanding. You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0c1f85bb-c33","directApply":true,"hiringOrganization":{"@type":"Organization","name":"CoreWeave","sameAs":"https://www.coreweave.com","logo":"https://logos.yubhub.co/coreweave.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coreweave/jobs/4673532006","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$165,000 to $242,000","x-skills-required":["IT General Controls (ITGCs)","SOX compliance","IT audit","IT risk","IT compliance","Access management","Change management","SDLC","Computer operations","Workday","Salesforce","NetSuite/SAP","Coupa","GRC platforms","AuditBoard","ServiceNow GRC","Workiva"],"x-skills-preferred":["CISA","CISSP","CISM","CPA","Hyperscaler","Cloud infrastructure","High-growth tech environment"],"datePosted":"2026-04-18T15:52:33.779Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Livingston, NJ / New York, NY / Sunnyvale, CA / San Francisco, CA / Bellevue, WA"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"IT General Controls (ITGCs), SOX compliance, IT audit, IT risk, IT compliance, Access management, Change management, SDLC, Computer operations, Workday, Salesforce, NetSuite/SAP, Coupa, GRC platforms, AuditBoard, ServiceNow GRC, Workiva, CISA, CISSP, CISM, CPA, Hyperscaler, Cloud infrastructure, High-growth tech environment","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":165000,"maxValue":242000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee6641b6-6a0"},"title":"Model Behavior Tutor - Style, Taste & Aesthetics","description":"<p><strong>About the Role</strong></p>\n<p>You will ensure every Grok response is elegantly written,concise yet rich, distinctive yet never overwrought.</p>\n<p><strong>Responsibilities</strong></p>\n<ul>\n<li>Rank and rewrite outputs for stylistic excellence, voice consistency, and aesthetic impact.</li>\n<li>Curate training data from the highest-quality writing across literature, essays, technical exposition, and historical texts.</li>\n<li>Eliminate clichés, corporate-speak, verbosity, and low-status signalling.</li>\n<li>Teach the model when brevity is elegance and when controlled extravagance is warranted.</li>\n</ul>\n<p><strong>Basic Qualifications</strong></p>\n<ul>\n<li>Professional academic editing or copywriting experience.</li>\n<li>Exquisite aesthetic judgment and immediate recognition of “cheap” vs. “expensive” prose.</li>\n<li>Extremely broad and deep reading in literature, philosophy, science writing, and classics.</li>\n<li>Proficiency in reviewing and critiquing written materials, with strong skills in content organisation, narrative enhancement, and emulating various styles and voices.</li>\n<li>Ruthless self-editing instincts and strong ability to utilise reference materials, style guides, and resources for accurate, standard-adherent annotations.</li>\n</ul>\n<p><strong>Preferred Skills and Experience</strong></p>\n<ul>\n<li>Published literary fiction, essays, or criticism.</li>\n</ul>\n<p><strong>Location and Other Expectations</strong></p>\n<ul>\n<li>Tutor roles may be offered as full-time, part-time, or contractor positions, depending on role needs and candidate fit.</li>\n<li>For contractor positions, hours will vary widely based on project scope and contractor availability, with no fixed commitments required. On average most projects may involve at least 10 hours per week to achieve deliverables effectively though this is not a fixed commitment and depends on the scope of work. Contractors have full flexibility to set their own hours and determine the exact amount of time needed to complete deliverables.</li>\n<li>Tutor roles may be performed remotely from any location worldwide, subject to legal eligibility, time-zone compatibility, and role specific needs.</li>\n<li>For US based candidates, please note we are unable to hire in the states of Wyoming and Illinois at this time.</li>\n<li>We are unable to provide visa sponsorship.</li>\n<li>For those who will be working from a personal device, your computer must be a Chromebook, Mac with MacOS 11.0 or later, or Windows 10 or later.</li>\n</ul>\n<p><strong>Compensation and Benefits</strong></p>\n<p>US based candidates: $45/hour - $70/hour depending on factors including relevant experience, skills, education, geographic location, and qualifications. International candidates: Information will be provided to you during the recruitment process.</p>\n<p>Benefits vary based on employment type, location and jurisdiction. Benefits for eligible U.S. based positions include health insurance, 401(k) plan, and paid sick leave. Specific details and role specific information will be provided to you during the interview process.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee6641b6-6a0","directApply":true,"hiringOrganization":{"@type":"Organization","name":"xAI","sameAs":"https://www.xai.com/","logo":"https://logos.yubhub.co/xai.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/xai/jobs/5017523007","x-work-arrangement":"remote","x-experience-level":null,"x-job-type":"full-time|part-time|contract","x-salary-range":"$45/hour - $70/hour","x-skills-required":["academic editing","copywriting","aesthetic judgment","reading in literature","philosophy","science writing","classics","content organisation","narrative enhancement","emulating various styles and voices","reference materials","style guides","resources"],"x-skills-preferred":["published literary fiction","essays","criticism"],"datePosted":"2026-04-18T15:44:32.215Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","skills":"academic editing, copywriting, aesthetic judgment, reading in literature, philosophy, science writing, classics, content organisation, narrative enhancement, emulating various styles and voices, reference materials, style guides, resources, published literary fiction, essays, criticism"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_22e2b8bb-55b"},"title":"Cybersecurity Officer","description":"<p>As the Cybersecurity Officer for Waymark, you will be responsible for advancing our core mission through the development of robust programs encompassing information security. As an organization working with patients and providers to improve health outcomes, it is critical to build and maintain appropriate systems and safeguards designed to protect the integrity and confidentiality of information.</p>\n<p>You are technical, a strong operator, and strategic thinker, looking to build, improve, and scale reliable security processes whenever possible. Your leadership of the information security program at Waymark will include all facets of cybersecurity, and the associated user experience of our remote teams, and community-based care workers. You will be responsible for security policy and implementation and operation of technical and administrative safeguards to support those policies. You will use your experience to inform sound judgement to achieve the appropriate management of security risks in a manner consistent with the company’s values. You will use your in-depth knowledge of security in a modern cloud based organization, to identify and address risks to the company, through a combination of hands-on technical contributions and directing and overseeing staff with security responsibilities. You will interact with the broader executive leadership team to communicate evolving needs, matching the security strategy to the size and stage of growth of the company and the information we safeguard.</p>\n<p>This is a remote friendly position that can be located anywhere in the United States.</p>\n<p><strong>Key Responsibilities &amp; Duties</strong></p>\n<ul>\n<li>Oversee the internal cybersecurity program, road map, and strategy, which includes developing and implementing procedures and policies designed to protect Waymark communications, systems, and assets from internal and external threats and that safeguards health information.</li>\n<li>Oversee and manage Waymark’s MSSP and outsourced IT vendor, including responsibility for security and IT budgets, and IT tools used by Waymark.</li>\n<li>Partner with Product, Engineering, Legal, and Compliance leadership to determine risks and deploy risk management processes, supporting Waymark’s secure software development lifecycle and ensuring that our internally developed products and services meet the expectations of our patients, customers and regulators</li>\n<li>Own, define and oversee the necessary security operational functions such as Identity Management, Vulnerability Management, Incident Response, Security Awareness, and Vendor Risk Management</li>\n<li>Serve as Waymark’s HIPAA Security Officer, ensuring compliance with the HIPAA Security Rule, working closely with the legal team to document, review, maintain, and implement standards, policies, and procedures within security disciplines.</li>\n<li>Lead the strategy, implementation, and maintenance of industry-standard security certifications, including SOC2 Type II.</li>\n<li>Conduct research, analysis, and correlation across a wide variety of source data to identify and prevent compromise of our networks, host systems, and data.</li>\n<li>Track and report on network security to the Waymark executive leadership team</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_22e2b8bb-55b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Waymark","sameAs":"https://www.waymark.com/","logo":"https://logos.yubhub.co/waymark.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/waymark/jobs/4675847005","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$140,000 - $185,000","x-skills-required":["BSCS or equivalent experience in an operational security role","10+ years of experience in security and/or information assurance roles, and risk management","Knowledge of information security management frameworks, such as NIST cybersecurity framework","Experience and/or ability to learn and apply hands-on skills in a cloud native production environment","Experience implementing cloud security technologies, including encryption, network security, intrusion detection, and could monitoring"],"x-skills-preferred":["Key industry certifications in information security, such as CISSP, CISM and CISA","Experience in a startup of 100 - 500 people","Experience with securing a production SaaS product hosted in AWS","Experience conducting or managing technical audit engagements, or directly responding to auditor inquiries"],"datePosted":"2026-04-17T13:07:42.117Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"US - Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Healthcare","skills":"BSCS or equivalent experience in an operational security role, 10+ years of experience in security and/or information assurance roles, and risk management, Knowledge of information security management frameworks, such as NIST cybersecurity framework, Experience and/or ability to learn and apply hands-on skills in a cloud native production environment, Experience implementing cloud security technologies, including encryption, network security, intrusion detection, and could monitoring, Key industry certifications in information security, such as CISSP, CISM and CISA, Experience in a startup of 100 - 500 people, Experience with securing a production SaaS product hosted in AWS, Experience conducting or managing technical audit engagements, or directly responding to auditor inquiries","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":140000,"maxValue":185000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3e81b0c9-340"},"title":"Principal IT Security Architect","description":"<p>We are seeking a visionary and experienced security leader to join our team as a Principal IT Security Architect. In this role, you will be responsible for architecting and implementing enterprise-scale Identity and Access Management (IAM) solutions. You will have a deep understanding of regulatory frameworks and be able to translate compliance mandates into actionable security controls. You will also be responsible for designing secure, scalable, and user-centric IAM architectures that enable business agility while protecting digital assets.</p>\n<p>As a Principal IT Security Architect, you will develop and maintain the organization&#39;s enterprise IAM architecture, encompassing identity lifecycle management, access control models, and integrations with both cloud and on-premises applications. You will also lead the design and implementation of Synopsys&#39; governance and enforcement layer for AI agents.</p>\n<p>You will collaborate closely with IT, security, and business stakeholders to integrate IAM solutions with enterprise systems and support access needs. You will also support incident response activities related to identity and access, including investigation and remediation of security incidents.</p>\n<p>The ideal candidate will have a strong analytical, communication, and leadership skills. You will be a strategic thinker with the ability to see the big picture while paying close attention to detail. You will also be an innovative problem solver who thrives on tackling complex security challenges.</p>\n<p>In return, you will have the opportunity to work with a high-impact, collaborative IAM and security engineering team at the forefront of Synopsys&#39; digital transformation. You will also have access to a comprehensive range of health, wellness, and financial benefits to cater to your needs.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3e81b0c9-340","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/austin/principal-it-security-architect/44408/93437232912","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$163000-$245000","x-skills-required":["Identity and Access Management (IAM)","Cloud platforms (Azure, AWS, GCP)","Hybrid enterprise environments","DevOps","Automation","Identity-as-code practices"],"x-skills-preferred":["Zero Trust security frameworks","Modern authentication paradigms","CISSP","CISM","CIAM","Microsoft Certified: Identity and Access Administrator","AWS/Azure Security certifications"],"datePosted":"2026-04-05T13:17:50.179Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Technology","skills":"Identity and Access Management (IAM), Cloud platforms (Azure, AWS, GCP), Hybrid enterprise environments, DevOps, Automation, Identity-as-code practices, Zero Trust security frameworks, Modern authentication paradigms, CISSP, CISM, CIAM, Microsoft Certified: Identity and Access Administrator, AWS/Azure Security certifications","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":163000,"maxValue":245000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1bdc3caf-792"},"title":"Governance, Risk, and Compliance (GRC) SME - Senior Consultant","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>\n<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>\n<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>\n<p>Direct and lead NIST CSF risk assessments</p>\n<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>\n<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>\n<p><strong>Requirements</strong></p>\n<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>\n<p>Your security experience must include:</p>\n<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>\n<p>1-5 years+ in the field of cyber security/infosec.</p>\n<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Your diverse Security experience should include one or some of below:</p>\n<p>A good understanding of NIST CSF</p>\n<p>A post graduate degree in cyber /information security</p>\n<p>Cyber Due Diligence Assessments</p>\n<p>Third- Party &amp; Supply chain Cyber Risk Management</p>\n<p>Incident Response Plan review</p>\n<p>Supporting bids, RFP responses and proposals</p>\n<p>Crisis Management Exercises (CMX)</p>\n<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>\n<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>\n<p>Helping the design of Cyber Security Roadmaps</p>\n<p>Supporting Post Incident Reviews</p>\n<p>Reading and summarising Cyber Threat Intelligence reports</p>\n<p>Cyber Security Risk Assessments or Maturity Assessments</p>\n<p>Design and/deliver awareness training.</p>\n<p>Worked on Identity and Access Management projects.</p>\n<p>Worked on Privileged access management projects</p>\n<p><strong>Our ideal candidate may have some of the following skills:</strong></p>\n<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Enjoy working with different clients from different industries.</p>\n<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>\n<p>Be able to build strong and effective business relationships at all levels</p>\n<p>Be able to support and oversee staff with less experience in their tasks</p>\n<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>\n<p><strong>About your team</strong></p>\n<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1bdc3caf-792","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity frameworks","risk management","regulatory compliance","security governance","NIST CSF","cyber due diligence assessments","third-party and supply chain cyber risk management","incident response plan review","crisis management exercises","accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM","target operating models","RACI matrices","cybersecurity roadmaps","post-incident reviews","cyber threat intelligence reports","cybersecurity risk assessments","identity and access management","privileged access management"],"x-skills-preferred":["stakeholder management","problem-solving","resilience","data and information gathering","data and information validation","data and information synthesis","data and information documentation","data and information communication","interpersonal skills","written communication skills","verbal communication skills"],"datePosted":"2026-03-09T16:53:00.785Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_55a53b72-4cc"},"title":"Privileged Access Management (PAM) Business Analyst","description":"<p>You want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>As an IAM / PAM Subject Matter Expert, you will lead and deliver enterprise-wide IAM and PAM initiatives within large, complex organisations. You will own PAM BAU operations, ensuring SLAs, KPIs, and service quality standards are consistently met. You will design privileged access controls such as session management, password vaulting, access monitoring, and self-service.</p>\n<p>You will analyse enterprise and custom applications with PAM platforms, including required client-specific customisations. You will partner with business, IT, and security teams to gather requirements and deliver effective solutions. You will identify security gaps, recommend process improvements, and drive continuous enhancement. You will stay current with emerging cybersecurity threats, IAM/PAM trends, and technologies.</p>\n<p>You will have experience in use of Jira and Confluence to manage delivery, documentation, and governance. You will be a clear, confident communicator with experience presenting to senior stakeholders. You will be comfortable working in fast-paced, security-critical environments.</p>\n<p>You will have proven experience delivering enterprise-scale IAM and/or PAM solutions. You will have hands-on experience across one or more cybersecurity domains, with strong PAM expertise. You will have proven experience integrating applications with PAM platforms. You will have knowledge of security and compliance frameworks including SOX, ISAE 3402 / SOC 1 &amp; 2, ISO, NIST, and PCI-DSS. Security certifications such as CISSP, CISM, CRISC, CCSP, SSCP, or Security+ are desirable.</p>\n<p>Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_55a53b72-4cc","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/dCfXrxKMLKj4ZBd7J31LiC/privileged-access-management-(pam)-business-analyst-in-london-at-infosys-consulting---europe","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Project Management","Agile delivery","Jira","Confluence","IAM/PAM concepts","SOX","ISAE 3402 / SOC 1 & 2","ISO","NIST","PCI-DSS"],"x-skills-preferred":["CISSP","CISM","CRISC","CCSP","SSCP","Security+"],"datePosted":"2026-03-09T16:51:56.131Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"Project Management, Agile delivery, Jira, Confluence, IAM/PAM concepts, SOX, ISAE 3402 / SOC 1 & 2, ISO, NIST, PCI-DSS, CISSP, CISM, CRISC, CCSP, SSCP, Security+"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f56e4b3a-ca5"},"title":"Third Party Risk Management (TPRM) Consultant - Principal","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are seeking an experienced Principal Third Party Risk Management (TPRM) Consultant to lead and shape our Third Party Risk and GRC services within the cyber security consultancy. This is a senior leadership role responsible for driving strategy, managing complex client engagements, and delivering enterprise-scale TPRM and GRC programmes across multiple industries. As a subject matter expert in Third Party Risk Management, Governance, Risk &amp; Compliance (GRC) and vendor risk frameworks, you will design, implement, and operate robust third-party risk management frameworks that align with regulatory, security, and business requirements. You will act as a trusted advisor to clients, lead large transformation initiatives, manage teams, and ensure high-quality delivery of risk, compliance, and assurance services.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>·       <strong>TPRM Proposals &amp; Strategy</strong>: Lead the development of TPRM and GRC proposals, defining scope, delivery models, governance structures, and operating models and design enterprise-level Third Party Risk Management strategies aligned with regulatory, operational, and cyber risk requirements.</p>\n<p>·       <strong>Client Engagement Leadership</strong>: Lead and manage complex client engagements in Third Party Risk Management, vendor risk, and GRC and act as engagement lead and trusted advisor for executive stakeholders (CISO, CRO, Risk, Compliance, Procurement, Legal). In addition to that ensure successful delivery of TPRM services including assessments, frameworks, tooling, and operationalisation.</p>\n<p>·       <strong>Security Assessment &amp; Audit Leadership</strong>: Lead third-party security assessments, audits, and assurance activities and define assessment methodologies, risk scoring models, control frameworks, and reporting structures as well as oversee supplier due diligence, onboarding risk processes, and continuous monitoring programmes.</p>\n<p>·       <strong>Technical &amp; Methodological Authority</strong>: Serve as subject matter expert for TPRM, GRC platforms, and vendor risk methodologies and provide leadership in the use of GRC and TPRM tooling (e.g. OneTrust, Archer, ServiceNow GRC, similar platforms).</p>\n<p>·       <strong>Project, Delivery &amp; Programme Leadership</strong>: Act as Project Manager, Delivery Lead, and Programme Lead for large-scale TPRM initiatives and manage multi-stream delivery, dependencies, risks, and stakeholder alignment.</p>\n<p>·       <strong>Team Leadership &amp; Management</strong>: Lead, mentor, and develop a team of consultants (up to 5 direct reports) and build high-performing delivery teams and ensure capability development in TPRM and GRC.</p>\n<p>·       <strong>Risk &amp; Compliance Management:</strong> Identify, assess, and manage third-party risks across cyber, operational, regulatory, and reputational domains and advise clients on risk treatment strategies, remediation plans, and control improvements.</p>\n<p>·       <strong>Continuous Improvement &amp; Innovation</strong>: Drive continuous improvement in TPRM methodologies, delivery models, and service offerings and stay current with regulatory developments, emerging risks, and industry best practices in third-party risk and supply chain security.</p>\n<p><strong><strong>Requirements</strong></strong></p>\n<p><strong>Essential Skills and Experience:</strong></p>\n<p>·       Extensive experience in Third Party Risk Management (TPRM) and Governance, Risk &amp; Compliance (GRC) at enterprise level.</p>\n<p>·       Strong background as Security Assessor, Auditor, and Risk Consultant.</p>\n<p>·       Proven experience leading TPRM, vendor risk, and supplier assurance programmes.</p>\n<p>·       Experience acting as Project Manager, Delivery Lead, and Programme Lead for complex engagements.</p>\n<p>·       Hands-on experience with GRC / TPRM platforms, ideally including OneTrust.</p>\n<p>·       Ability to design and implement third-party risk frameworks, policies, and governance models.</p>\n<p>·       Strong stakeholder management skills at executive and board level.</p>\n<p>·       Proven people management experience, including team leadership and mentoring.</p>\n<p>·       Ability to balance security, risk, compliance, and business enablement.</p>\n<p><strong>Qualifications:</strong></p>\n<p>·       Minimum 10 years of experience in cyber security, risk management, GRC, audit, or related domains.</p>\n<p>·       CISA (Certified Information Systems Auditor) strongly preferred.</p>\n<p>·       Lead Auditor certification (e.g. ISO 27001 Lead Auditor) highly desirable.</p>\n<p>·       Additional certifications such as CISM, CRISC, CISSP are an advantage.</p>\n<p>·       Experience working across multiple industries (e.g. Financial Services, Healthcare, Critical Infrastructure, Government, Technology).</p>\n<p>·       Experience with regulatory-driven environments and compliance-led transformation programmes.</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please_ _<strong>apply now.</strong>_</p>\n<p><strong><strong>Benefits</strong></strong></p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology.  We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, <strong>Equity</strong> and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal ambitions. Curious to learn more? We’d love to hear from you.... <strong>Apply today!</strong></p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f56e4b3a-ca5","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/3AGuZh2zhvyMa3e9DNdg37/remote-third-party-risk-management-(tprm)-consultant---principal-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Third Party Risk Management","Governance, Risk & Compliance","Vendor Risk Management","Security Assessment","Audit Leadership","Project Management","Delivery Leadership","Programme Leadership","Team Leadership","Risk Management","Compliance Management","Continuous Improvement","Innovation"],"x-skills-preferred":["OneTrust","Archer","ServiceNow GRC","CISA","Lead Auditor certification","CISM","CRISC","CISSP"],"datePosted":"2026-03-09T16:51:45.581Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Consulting","industry":"Technology","skills":"Third Party Risk Management, Governance, Risk & Compliance, Vendor Risk Management, Security Assessment, Audit Leadership, Project Management, Delivery Leadership, Programme Leadership, Team Leadership, Risk Management, Compliance Management, Continuous Improvement, Innovation, OneTrust, Archer, ServiceNow GRC, CISA, Lead Auditor certification, CISM, CRISC, CISSP"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f8535892-a62"},"title":"Vice President, Business & Operational Audit","description":"<p>About this role</p>\n<p>Business Audit Vice President, Digital Assets</p>\n<p>Internal Audit&#39;s primary mission is to provide assurance to the Board of Directors and Executive Management that BlackRock&#39;s businesses are well managed and meeting strategic, operational and risk management objectives. The team engages with senior leaders and all of BlackRock&#39;s individual business units globally to understand and advise on the risks in their business, evaluate the effectiveness of key processes and assist in the design of best practices that can improve their results. Internal Audit reports directly to the Audit Committee of the Board of Directors, and our work builds confidence that BlackRock will meet its obligations to clients, shareholders, employees and other stakeholders.</p>\n<p>With teams in the US, Europe, and Asia, the Business Audit Team performs audits covering all BlackRock business units, including investment management, risk management, operations, finance, legal and compliance, and client businesses.</p>\n<p>The London office, located in the heart of the City of London, serves as BlackRock&#39;s EMEA headquarters and is home to over 3,200 employees. It plays a crucial role in the firm&#39;s global operations, supporting various business units including Investment Management, Sales, Trading, Client Business, Risk Management, Operations, Finance, and Legal and Compliance.</p>\n<p>Responsibilities</p>\n<ul>\n<li>Project managing and leading the execution of audits (global and regional) across all BlackRock business units: investment management, risk management, operations, finance, legal and compliance, and client businesses, including digital assets</li>\n<li>Lead audits of digital asset processes, including custody, trading, settlement, and platform integration and other BlackRock business areas.</li>\n<li>Assess risks, controls, and compliance frameworks for cryptoassets, stablecoins, tokenized securities, and blockchain-based operations.</li>\n<li>Apply advanced data analytics and AI tools to audit digital asset transactions, access management, and operational anomalies. Leverage technology platforms (e.g., Aladdin, Tableau) for continuous improvement and innovation in audit engagements.</li>\n<li>Providing advisory services during the development of new businesses and systems</li>\n<li>Assistance in the formation of the annual audit plan through direct input, insight, and perspective around current business, industry, and regulatory risk factors</li>\n<li>Interact with regulatory examiners upon request</li>\n<li>People management responsibilities of audit staff, including coaching and feedback</li>\n<li>Maintain up-to-date knowledge of evolving regulatory requirements and industry trends in digital assets, blockchain, and fintech. Ensure audit coverage adapts to innovations and changing compliance landscapes.</li>\n<li>Completing annual risk assessments of business areas</li>\n<li>Leading or contributing to global departmental projects</li>\n<li>Travel to regional and international locations may be required</li>\n</ul>\n<p>Qualifications</p>\n<ul>\n<li>Undergraduate or graduate degree and 6+ years of internal audit or similar experience; Preferably in financial services, including an understanding of financial instruments, asset management processes, and risks</li>\n<li>Digital Asset Audit Expertise: Ability to assess risks, controls, and compliance frameworks for digital assets (e.g., crypto assets, stablecoins, tokenized securities) across custody, trading, settlement, and platform integration</li>\n<li>Deep understanding of Blockchain / Digital Ledger Technology (e.g., fundamental operation of blockchain, differences between public and private chains, transaction recording / verification processes)</li>\n<li>Understanding of Cryptography, Private Key Management, and Cybersecurity in general, specifically concerning fraud and threat detection</li>\n<li>Understanding of Logic / Programming supporting smart contracts</li>\n<li>Demonstrated ability to identify emerging risks and opportunities in digital asset ecosystems, and to synthesize market and technology trends into actionable audit strategies</li>\n<li>Relevant professional certifications are a plus (ACCA, CA, CIA, IMC, CFA, CISA); Candidates not currently certified will be expected to obtain relevant credentials as part of their development.</li>\n</ul>\n<p>Our benefits</p>\n<p>To help you stay energized, engaged and inspired, we offer a wide range of employee benefits including: retirement investment and tools designed to help you in building a sound financial future; access to education reimbursement; comprehensive resources to support your physical health and emotional well-being; family support programs; and Flexible Time Off (FTO) so you can relax, recharge and be there for the people you care about.</p>\n<p>Our hybrid work model</p>\n<p>BlackRock’s hybrid work model is designed to enable a culture of collaboration and apprenticeship that enriches the experience of our employees, while supporting flexibility for all. Employees are currently required to work at least 4 days in the office per week, with the flexibility to work from home 1 day a week. Some business groups may require more time in the office due to their roles and responsibilities. We remain focused on increasing the impactful moments that arise when we work together in person – aligned with our commitment to performance and innovation. As a new joiner, you can count on this hybrid model to accelerate your learning and onboarding experience here at BlackRock.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f8535892-a62","directApply":true,"hiringOrganization":{"@type":"Organization","name":"BlackRock","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/pkUacfKQKoJh1z9Ju7HtDC/vice-president%2C-business-%26amp%3B-operational-audit-in-london-at-blackrock","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Audit Issue and Report Writing","Developing Others","Critical thinking and problem-solving abilities","Excellent communication (verbal, written, listening) and interpersonal skills.","Ability to develop and maintain effective working relationships with peers and business partners.","Intellectual curiosity and healthy scepticism","Ability to articulate complex subject matters succinctly.","Strong project management and organizational skills","Data analysis"],"x-skills-preferred":[],"datePosted":"2026-03-09T16:39:31.185Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"London"}},"employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"Audit Issue and Report Writing, Developing Others, Critical thinking and problem-solving abilities, Excellent communication (verbal, written, listening) and interpersonal skills., Ability to develop and maintain effective working relationships with peers and business partners., Intellectual curiosity and healthy scepticism, Ability to articulate complex subject matters succinctly., Strong project management and organizational skills, Data analysis"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_23839818-2ff"},"title":"Client Platform Engineer","description":"<p><strong>Compensation</strong></p>\n<p>The base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If the role is non-exempt, overtime pay will be provided consistent with applicable laws. In addition to the salary range listed above, total compensation also includes generous equity, performance-related bonus(es) for eligible employees, and the following benefits.</p>\n<ul>\n<li>Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts</li>\n</ul>\n<ul>\n<li>Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)</li>\n</ul>\n<ul>\n<li>401(k) retirement plan with employer match</li>\n</ul>\n<ul>\n<li>Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)</li>\n</ul>\n<ul>\n<li>Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees</li>\n</ul>\n<ul>\n<li>13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)</li>\n</ul>\n<ul>\n<li>Mental health and wellness support</li>\n</ul>\n<ul>\n<li>Employer-paid basic life and disability coverage</li>\n</ul>\n<ul>\n<li>Annual learning and development stipend to fuel your professional growth</li>\n</ul>\n<ul>\n<li>Daily meals in our offices, and meal delivery credits as eligible</li>\n</ul>\n<ul>\n<li>Relocation support for eligible employees</li>\n</ul>\n<ul>\n<li>Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided.</li>\n</ul>\n<p><strong>About the Team</strong></p>\n<p>OpenAI’s Platform and Infrastructure Engineering organization advances the mission of deploying artificial general intelligence (AGI) for the benefit of all by delivering secure, scalable, and resilient technology solutions. Our team builds and maintains robust infrastructure that safeguards OpenAI’s data and systems while ensuring employees are well-equipped and seamlessly connected. By prioritizing security, reliability, and user-centric solutions, we empower OpenAI employees to drive impactful AI research, corporate operations, and product innovation.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Client Platform Engineer at OpenAI, you will play a pivotal role in securing, enhancing, and maintaining our endpoint management infrastructure across macOS, Windows, iOS, and Android devices. Your focus will be on building scalable, automated solutions that ensure seamless deployments, advanced security configurations, and efficient operational workflows. You will collaborate closely with IT, Security, and Engineering teams to implement modern endpoint management practices using automation, Infrastructure-as-Code (IaC), and monitoring strategies. This role offers an opportunity to work with cutting-edge tools and contribute to building a security-first, automation-driven endpoint ecosystem.</p>\n<p><strong>In this role, you will:</strong></p>\n<ul>\n<li>Design, build, implement, and maintain scalable and performant endpoint management infrastructure to facilitate best-in-class security of the OpenAI fleet comprised of macOS, Windows, iOS, and Android endpoints.</li>\n</ul>\n<ul>\n<li>Deliver critical endpoint management efficiencies and capabilities through bespoke software development and implementation of both industry-standard open source tooling and first-party software solutions.</li>\n</ul>\n<ul>\n<li>Employ modern Infrastructure-as-Code (IaC) methodologies, develop GitOps-driven solutions to deliver consensus-based fleet management capabilities at scale.</li>\n</ul>\n<ul>\n<li>Build and maintain CI/CD pipelines for fleet management infrastructure, deploying to progressively tested environments across multiple clouds (Azure, AWS, GCP).</li>\n</ul>\n<ul>\n<li>Drive initiatives to adopt emerging CPE technologies, industry best practices, and optimize processes for scalability and operational efficiency.</li>\n</ul>\n<ul>\n<li>Partner with cross-functional teams to ensure seamless endpoint user experiences while maintaining strict security standards and continually increasing the bar.</li>\n</ul>\n<p><strong>You may be a fit for this role if you have:</strong></p>\n<ul>\n<li>Proficiency in a modern programming language (Python, Golang, Ruby, etc.)</li>\n</ul>\n<ul>\n<li>Extensive hands-on experience with Jamf PRO and Microsoft Intune to ensure comprehensive secure fleet management as well as experience with similar cloud identity providers.</li>\n</ul>\n<ul>\n<li>Demonstrated success and experience with open source endpoint management tooling for configuration management, mobile device management, application management, and telemetry such as Salt, Puppet, Munki, Nano/MicroMDM, osquery, Autopkg, WinGet, etc.</li>\n</ul>\n<ul>\n<li>History of developing and delivering secure, reliable, scalable, and technology solutions.</li>\n</ul>\n<ul>\n<li>Deep knowledge and experience managing corporate infrastructure at scale with Infrastructure-as-Code (IaC) practices &amp; GitOps workflows (Terraform, Ansible, Chef, etc.)</li>\n</ul>\n<ul>\n<li>Experience integrating and operating fleet management infrastructure with CI/CD pipelines and DevOps workflows.</li>\n</ul>\n<ul>\n<li>Proven track record of deploying and operating fleet management infrastructure in public cloud environments (Azure, AWS, GCP).</li>\n</ul>\n<ul>\n<li>A self-starter with strong analytical and problem-solving skills.</li>\n</ul>\n<p><strong>You might thrive in this role if you have:</strong></p>\n<ul>\n<li>Deep experience with open-source fleet management tools and frameworks.</li>\n</ul>\n<ul>\n<li>Experience with containerization technologies such as Docker and Kubernetes.</li>\n</ul>\n<ul>\n<li>Familiarity with compliance frameworks such as SOC 2, ISO 27001, FedRAMP, and NIST.</li>\n</ul>\n<ul>\n<li>Strong soft skills, including stakeholder communication and cross-functional collaboration.</li>\n</ul>\n<ul>\n<li>Relevant professional certifications such as CISSP, CISA, CISM, CCSP.</li>\n</ul>\n<ul>\n<li>A security thought leader with contributions to CPE open-source projects or technical communities.</li>\n</ul>\n<p><strong>About OpenAI</strong></p>\n<p>OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.</p>\n<p>We are an equal opportunity employer, and we do not discriminate on the basis of</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_23839818-2ff","directApply":true,"hiringOrganization":{"@type":"Organization","name":"OpenAI","sameAs":"https://jobs.ashbyhq.com","logo":"https://logos.yubhub.co/openai.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/openai/720bd7ae-2d65-4f1c-b01a-86278dedabde","x-work-arrangement":"Remote","x-experience-level":null,"x-job-type":"Full time","x-salary-range":null,"x-skills-required":["Python","Golang","Ruby","Jamf PRO","Microsoft Intune","Salt","Puppet","Munki","Nano/MicroMDM","osquery","Autopkg","WinGet","Terraform","Ansible","Chef","Docker","Kubernetes"],"x-skills-preferred":["Deep experience with open-source fleet management tools and frameworks","Experience with containerization technologies such as Docker and Kubernetes","Familiarity with compliance frameworks such as SOC 2, ISO 27001, FedRAMP, and NIST","Strong soft skills, including stakeholder communication and cross-functional collaboration","Relevant professional certifications such as CISSP, CISA, CISM, CCSP","A security thought leader with contributions to CPE open-source projects or technical communities"],"datePosted":"2026-03-08T22:15:11.680Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - US"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Python, Golang, Ruby, Jamf PRO, Microsoft Intune, Salt, Puppet, Munki, Nano/MicroMDM, osquery, Autopkg, WinGet, Terraform, Ansible, Chef, Docker, Kubernetes, Deep experience with open-source fleet management tools and frameworks, Experience with containerization technologies such as Docker and Kubernetes, Familiarity with compliance frameworks such as SOC 2, ISO 27001, FedRAMP, and NIST, Strong soft skills, including stakeholder communication and cross-functional collaboration, Relevant professional certifications such as CISSP, CISA, CISM, CCSP, A security thought leader with contributions to CPE open-source projects or technical communities"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f243c658-703"},"title":"Senior Cybersecurity Engineer","description":"<p><strong>Why Valvoline Global Operations?</strong></p>\n<p>At Valvoline Global Operations, we&#39;re proud to be The Original Motor Oil, but we&#39;ve never rested on being first. Founded in 1866, we introduced the world&#39;s first branded motor oil, staking our claim as a pioneer in the automotive and industrial solutions industry. Today, as an affiliate of Aramco, one of the world&#39;s largest integrated energy and chemicals companies, we are driven by innovation and committed to creating sustainable solutions for a better future.</p>\n<p>With a global presence, we develop future-ready products and provide best-in-class services for our partners around the world. For us, originality isn&#39;t just about where we began; it&#39;s about where we&#39;re headed and how we&#39;ll lead the way. We are originality in motion.</p>\n<p>Our corporate values—Care, Integrity, Passion, Unity, and Excellence—are at the heart of everything we do. These values define how we operate, how we treat one another, and how we engage with our partners, customers, and the communities we serve. At Valvoline Global, we are united in our commitment to:</p>\n<ul>\n<li>Treating everyone with care.</li>\n<li>Acting with unwavering integrity.</li>\n<li>Striving for excellence in all endeavors.</li>\n<li>Delivering on our commitments with passion.</li>\n<li>Collaborating as one unified team.</li>\n</ul>\n<p><strong>Job Purpose</strong></p>\n<p>The Senior Information Security Engineer leads the design, implementation, and continuous refinement of the organization&#39;s cybersecurity capabilities. This advanced role requires a deep technical expertise in security technologies and a strategic approach to protecting the organization&#39;s information assets. The Senior Engineer is pivotal in conducting complex security assessments, identifying vulnerabilities, and developing robust solutions to enhance the security posture of the organization.</p>\n<p>With a strong focus on technical leadership, this individual collaborates closely with the IT department and cybersecurity team to develop secure systems, networks, and applications. Additionally, the Senior Information Security Engineer works hand-in-hand with the IT Governance, Risk Management, and Compliance (GRC) teams to ensure cybersecurity strategies align with organizational policies and regulatory requirements. This involves a strategic partnership to assess risks, manage cybersecurity compliance across systems, and integrate security best practices into GRC frameworks.</p>\n<p>The Senior Information Security Engineer is also responsible for researching and integrating new security technologies and best practices into the existing infrastructure to address evolving threats. This role involves critical thinking, problem-solving, and a proactive attitude towards cybersecurity challenges.</p>\n<p><strong>How You Make an Impact (Job Accountabilities)</strong></p>\n<ol>\n<li>Work alongside project leads and IT teams to facilitate a smooth integration of new solutions into the organization&#39;s cyber security framework. Provide support during the implementation phase of cyber security tools, ensuring that deployment tasks are completed timely.</li>\n<li>Actively mentor Information Security Engineering team members, sharing insights on best practices and the latest trends in cyber security tool deployment and management. Foster a culture of continuous improvement and innovation within the cyber security team, encouraging the adoption of emerging technologies and methodologies to enhance the organization’s cyber security posture.</li>\n<li>Lead the initial configuration of newly implemented tools, applying in-depth knowledge of security standards and operational procedures to create a robust foundation for tool effectiveness. Collaborate with cyber security and IT teams to adjust settings and configurations based on operational feedback and evolving security threats, enhancing the organization&#39;s cyber security posture.</li>\n<li>Provide strategic oversight for the monitoring and management of cyber security tools and systems, ensuring they operate at peak efficiency and are fully aligned with the organization’s cyber security strategies.</li>\n<li>Act as an escalation point for operational issues in cyber security tools and systems, providing specialized knowledge to resolve more complex problems. Leverage external support resources and serve as the primary point of contact for troubleshooting issues.</li>\n<li>Participate in the assessment of new cyber security tools, focusing on evaluating their potential operational impact and alignment with the organization’s security needs. Aid in the selection process by contributing insights on tool effectiveness and compatibility with existing systems.</li>\n</ol>\n<p><strong>What You Bring to the Role (Job Qualifications / Education / Skills / Requirements / Capabilities)</strong></p>\n<p><strong>Education</strong></p>\n<ul>\n<li>Bachelor&#39;s degree in information systems, engineering, management, or related field, or equivalent work experience.</li>\n</ul>\n<p><strong>Work Experience</strong></p>\n<ul>\n<li>5+ years of experience in information technology or information security</li>\n<li>Industry certifications such as CISSP, CISM, CCSP, GIAC (GSEC, GCED, GCIA, etc.)</li>\n<li>Vendor-specific certifications (Netskope, Palo Alto, Zscaler, Microsoft purview, Code42 etc.)</li>\n</ul>\n<p><strong>Competencies Desired</strong></p>\n<ul>\n<li>Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.</li>\n<li>Technical proficiency with security-related systems and applications.</li>\n<li>Experience in developing, documenting and maintaining security procedures.</li>\n<li>Strong knowledge of TCP/IP and network administration/protocols, zero trust principles.</li>\n<li>Hands-on experience with AWS/Azure/GCP security controls</li>\n<li>Proficient knowledge in scripting (Like Python, PowerShell)</li>\n<li>Experience performing security reviews for new systems</li>\n<li>Strong analytical and problem-solving skills to enable effective security incident and problem resolution.</li>\n<li>Excellent documentation skills.</li>\n<li>Proven ability to work under stress in emergencies, with the flexibility to handle multiple high-pressure situations simultaneously.</li>\n<li>Ability to work well under minimal supervision.</li>\n<li>Strong team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including vendors and IT-business personnel.</li>\n<li>Strong written and verbal communication skills.</li>\n<li>Strong customer/client focus, with the ability to manage expectations appropriately, provide a superior customer/client experience and build long-term relationships.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f243c658-703","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Valvoline Global Operations","sameAs":"https://jobs.valvolineglobal.com","logo":"https://logos.yubhub.co/jobs.valvolineglobal.com.png"},"x-apply-url":"https://jobs.valvolineglobal.com/job/Senior-Cybersecurity-Engineer/1370226000/","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["CISSP","CISM","CCSP","GIAC","Netskope","Palo Alto","Zscaler","Microsoft purview","Code42","TCP/IP","Network administration/protocols","Zero trust principles","AWS/Azure/GCP security controls","Python","PowerShell","Security reviews for new systems","Analytical and problem-solving skills","Documentation skills","Team-oriented interpersonal skills","Written and verbal communication skills","Customer/client focus"],"x-skills-preferred":[],"datePosted":"2026-03-08T22:12:58.875Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Automotive","skills":"CISSP, CISM, CCSP, GIAC, Netskope, Palo Alto, Zscaler, Microsoft purview, Code42, TCP/IP, Network administration/protocols, Zero trust principles, AWS/Azure/GCP security controls, Python, PowerShell, Security reviews for new systems, Analytical and problem-solving skills, Documentation skills, Team-oriented interpersonal skills, Written and verbal communication skills, Customer/client focus"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_ee2db308-a07"},"title":"Senior Manager IT Security & LISO","description":"<p><strong>What you&#39;ll do</strong></p>\n<p>As Senior Manager IT Security &amp; LISO, you will be responsible for the following tasks:</p>\n<ul>\n<li>Strategische Verantwortung für den Aufbau, die Weiterentwicklung und Steuerung des Informationssicherheitsmanagementsystems (ISMS) im Einklang mit Konzernvorgaben (TISAX®)</li>\n<li>Umsetzung und Sicherstellung der Einhaltung der IT-Sicherheitsrichtlinien, Standards und Verfahren, im Rahmen von IT-Projekten (SDE), abgestimmt auf die Business-Prozesse im Retail- und Automotive-Umfeld</li>\n<li>Vorbereitung, Durchführung und Nachbereitung interner sowie externer Audits (z.B. TISAX-Assessments, etc.)</li>\n<li>Analyse von Sicherheitsvorfällen, Leitung von Incident-Response-Prozessen sowie Überwachung von Maßnahmenplänen</li>\n<li>Unterstützung bei IT-Projekten als beratende Funktion sowie übernahme der Verantwortung für die technische Prüfung und die IT-Sicherheitsfreigabe von Lösungen</li>\n<li>Enge Abstimmung und Zusammenarbeit mit Konzern-Informationssicherheit, IT, Datenschutzbeauftragtem, Compliance und Risikomanagement</li>\n<li>Leitung von Schulungs- und Sensibilisierungsprogrammen für alle Ebenen der Organisation</li>\n<li>Monitoring und Reporting von KPIs und KRIs (Key Risk Indicators)</li>\n<li>Ansprechpartner bei IT-Projekten mit Bezug auf IT-Sicherheit inkl. Auswahl und Steuerung von externen Dienstleistern sowie Abstimmung/Synchronisierung mit den relevanten PAG IT-Bereichen</li>\n</ul>\n<p><strong>Anforderungen</strong></p>\n<ul>\n<li>Erfolgreich abgeschlossenes Studium im Bereich IT, Informationssicherheit, Wirtschaftsinformatik oder eine vergleichbare Qualifikation</li>\n<li>Mindestens 5 Jahre Berufserfahrung im Bereich Informationssicherheit, vorzugsweise in einem Unternehmen mit Automotive-Bezug oder komplexer Retail-IT-Struktur</li>\n<li>Erfahrung in der Informationssicherheit und Kenntnisse über gängige Sicherheitsstandards und -praktiken, Zertifizierung in diesem Bereich von Vorteil (z.B. CISM, CISA)</li>\n<li>Fundierte Kenntnisse im Berechtigungs- und Zugriffsmanagement, Risk Management, Incident Handling und Business Continuity Management</li>\n<li>Ausgeprägte Fähigkeit, sowohl operative als auch strategische Themen sicherheitsrelevant zu bewerten und pragmatische Lösungen zu entwickeln</li>\n<li>Erfahrung in der Steuerung interdisziplinärer Teams und externer Partner von Vorteil</li>\n<li>Ausgezeichnete Kommunikations- und Präsentationsfähigkeiten, sowohl in Deutsch als auch in Englisch</li>\n<li>Hohes Maß an Eigeninitiative, Durchsetzungsstärke und ausgeprägtes Verantwortungsbewusstsein</li>\n</ul>\n<p><strong>Unternehmen</strong></p>\n<p>Unsere Philosophie: Die Funktion optimieren. Die Form kompromisslos auf das Wesentliche reduzieren. Das Bekannte überwinden, um immer wieder die neue, beste Lösung zu entdecken. Nur so entstehen einzigartige Designobjekte, die das Vorhersehbare hinter sich lassen, maximale Performance bieten und zu lebenslangen Begleitern werden.</p>\n<p>Erlebe die Faszination Porsche Lifestyle unter: www.porsche-design.de</p>\n<p><strong>Hinweise zur Bewerbung</strong></p>\n<p>Bitte fülle unser Online-Bewerbungsformular aus und füge am Ende Deine vollständigen Bewerbungsdokumente bei, die aus Anschreiben, Lebenslauf, Arbeits- und (Hoch-) Schulzeugnissen sowie ggf. weiteren Bescheinigungen (Aufenthaltsgenehmigung, sofern erforderlich) bestehen.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_ee2db308-a07","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Porsche Lifestyle GmbH & Co. KG","sameAs":"https://jobs.porsche.com","logo":"https://logos.yubhub.co/jobs.porsche.com.png"},"x-apply-url":"https://jobs.porsche.com/index.php?ac=jobad&id=16485","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["IT Security","Informationssicherheit","Wirtschaftsinformatik","Sicherheitsstandards","Sicherheitspraktiken","Berechtigungs- und Zugriffsmanagement","Risk Management","Incident Handling","Business Continuity Management"],"x-skills-preferred":["CISM","CISA"],"datePosted":"2025-12-08T16:24:04.987Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Ludwigsburg"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Automotive","skills":"IT Security, Informationssicherheit, Wirtschaftsinformatik, Sicherheitsstandards, Sicherheitspraktiken, Berechtigungs- und Zugriffsmanagement, Risk Management, Incident Handling, Business Continuity Management, CISM, CISA"}]}