<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>9d30cfce-beb</externalid>
      <Title>Security Engineer - Azure Government</Title>
      <Description><![CDATA[<p>We are seeking a skilled Azure Security Engineer to design, implement, and maintain robust security controls across our Azure Gov Cloud environment. In this hands-on role, you will build, strengthen, and maintain our cloud security posture, protect critical workloads, and collaborate with engineering, DevOps, and compliance teams to embed security throughout the development lifecycle.</p>
<p>Key responsibilities include: Implementing, designing, and managing security architecture for Azure Government and Commercial deployments. Configuring and optimising Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Defender for Endpoint, and related services for threat detection, vulnerability management, and automated response. Designing and enforcing identity &amp; access management using Microsoft Entra ID, Privileged Identity Management (PIM), Conditional Access policies, RBAC, and just-in-time access. Securing network architectures with Azure Firewall, Network Security Groups (NSGs), DDoS Protection, Web Application Firewall (WAF), Network Watcher, and private endpoints. Protecting data at rest and in transit via Azure Key Vault, encryption strategies, data classification, and information protection controls. Developing and maintaining security policies, initiatives, and blueprints using Azure Policy and Microsoft Purview for compliance (NIST, FedRAMP, CMMC, STIGs, etc.). Performing threat hunting, incident response, and forensics using Sentinel playbooks, Log Analytics, and KQL queries. Conducting security reviews of Infrastructure as Code (IaC), containers, Kubernetes (AKS), and serverless workloads. Collaborating with developers and architects to implement DevSecOps practices, including secure CI/CD pipelines, code scanning, and secure defaults. Monitoring and remediating security findings, reducing attack surface, and improving overall security posture per the Microsoft Cloud Security Benchmark (MCSB). Deploying configurations and compliance policies to Azure AVD endpoints using Intune and other Azure native services.</p>
<p>Basic qualifications include: Active U.S. security clearance (e.g., Secret, Top Secret) or eligibility to obtain one. 3+ years of experience in cloud security, cybersecurity engineering, or related roles (with strong Azure focus). Deep hands-on expertise with core Azure security services: Microsoft Defender suite, Sentinel, Intune, Entra ID, Key Vault, Azure Policy, Firewall, Network Watcher, and Purview. Strong understanding of DLP implementation both in cloud and on endpoints utilising Purview and other Microsoft native controls. Experience implementing security in hybrid/multi-cloud environments. Proficiency in scripting/automation (PowerShell, Azure CLI, Bicep/ARM templates, Terraform). Strong understanding of identity federation, zero-trust principles, encryption, network security, and vulnerability management. Familiarity with compliance frameworks (NIST, FedRAMP, CMMC, STIGs, etc.) and regulatory requirements. Excellent problem-solving, analytical, and communication skills. Strong verbal and written communication skills and the ability to stay composed under pressure.</p>
<p>Preferred skills and experience include: Microsoft Certified: Azure Security Engineer Associate (AZ-500), Microsoft Cybersecurity Architect (SC-100). Additional relevant certifications (e.g., CISSP, CCSP, Microsoft Certified: Azure Administrator, AWS Security Specialty, SANS GCPS, SANS GCAD). Deep experience with detection and response engineering and SOC operations. Knowledge of container security (Docker, AKS), secure DevOps, or AI/ML workload protection. Prior experience in government regulations frameworks such as FedRAMP and CMMC.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$180,000 - $440,000 USD</Salaryrange>
      <Skills>Azure Security Engineer, Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Defender for Endpoint, Azure Key Vault, Azure Policy, Microsoft Purview, Identity &amp; Access Management, Network Security, Data Loss Prevention, Compliance Frameworks, Cloud Security Posture Management, Threat Hunting, Incident Response, Forensics, Infrastructure as Code, Containers, Kubernetes, Serverless Workloads, DevSecOps, CI/CD Pipelines, Code Scanning, Secure Defaults, Microsoft Cloud Security Benchmark, Microsoft Certified: Azure Security Engineer Associate (AZ-500), Microsoft Cybersecurity Architect (SC-100), CISSP, CCSP, Microsoft Certified: Azure Administrator, AWS Security Specialty, SANS GCPS, SANS GCAD, Detection and Response Engineering, SOC Operations, Container Security, Secure DevOps, AI/ML Workload Protection, Government Regulations Frameworks</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>xAI</Employername>
      <Employerlogo>https://logos.yubhub.co/xai.com.png</Employerlogo>
      <Employerdescription>xAI creates AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. The organisation is small and highly motivated, with a flat organisational structure.</Employerdescription>
      <Employerwebsite>https://www.xai.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/xai/jobs/5050657007</Applyto>
      <Location>Palo Alto, CA; Washington, D.C.</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>01c32798-a52</externalid>
      <Title>Director of Enterprise Security and Network Architecture</Title>
      <Description><![CDATA[<p>We are seeking a strategic and visionary Director of Enterprise Security and Network Architecture to define and lead the strategic direction for a broad portfolio of critical technology domains.</p>
<p>This executive leadership role is responsible for the design, implementation, and governance of a secure, resilient, and high-performing infrastructure that includes enterprise networking, global security services, identity and access management, telephony and unified communications, and contact center platforms.</p>
<p>Spanning on-premise data centers, multi-cloud environments, and global corporate offices, you will establish comprehensive security frameworks, policies, and standards required to protect our corporate assets and data.</p>
<p>The ideal candidate is a transformational leader who can protect the enterprise from evolving cyber threats while delivering a robust technology foundation that enables business innovation and agility.</p>
<p><strong>Key Responsibilities</strong></p>
<p><strong>Strategic &amp; Architectural Leadership:</strong></p>
<ul>
<li>Develop and own the enterprise architecture vision, strategy, and multi-year roadmap for the network and security portfolio, ensuring tight alignment with business goals and digital transformation initiatives.</li>
</ul>
<ul>
<li>Lead the creation, governance, and promotion of architectural standards, patterns, and best practices for all covered services, including Zero Trust (ZTNA) and Secure Access Service Edge (SASE) frameworks.</li>
</ul>
<ul>
<li>Drive modernization initiatives across the portfolio, guiding the transition from traditional architectures to modern, automated, and cloud-native solutions to enhance security and eliminate legacy technical debt.</li>
</ul>
<ul>
<li>Champion a culture of innovation by evaluating emerging technologies and providing architectural direction for their adoption to solve complex business problems.</li>
</ul>
<ul>
<li>Serve as the primary architectural authority for the enterprise across network, telephony, and security domains, providing expert guidance to executive leadership, business stakeholders, and technology teams.</li>
</ul>
<p><strong>Domain-Specific Architectural Oversight: Lead and mentor a team of architects, ensuring architectural integrity and strategic alignment across the following key domains:</strong></p>
<ul>
<li>Global Network Architecture: Oversee the architecture for all network infrastructure, including SD-WAN, LAN/WAN, Wi-Fi, DNS/DHCP/IPAM, and data center networking.</li>
</ul>
<ul>
<li>Global Security Architecture: Define the strategy for enterprise-wide security services, including next-generation firewalls (NGFW), IDS/IPS, WAF, CASB, and data loss prevention (DLP).</li>
</ul>
<ul>
<li>Identity &amp; Access Management (IAM): Lead the architectural vision for all IAM services, including authentication, authorization, single sign-on (SSO), multi-factor authentication (MFA), and privileged access management (PAM).</li>
</ul>
<ul>
<li>Platform Security: Drive the security architecture for underlying infrastructure platforms, including operating systems, virtualization, and container platforms (Kubernetes).</li>
</ul>
<ul>
<li>Telephony &amp; Contact Center: Direct the architectural strategy for unified communications (UCaaS/VoIP) and contact center (CCaaS) platforms, ensuring they are secure, resilient, and integrated with enterprise systems.</li>
</ul>
<p><strong>Executive Leadership &amp; Stakeholder Engagement:</strong></p>
<ul>
<li>Lead, mentor, and cultivate a high-performing team of principal and senior architects, fostering a collaborative environment of technical excellence and strong business acumen.</li>
</ul>
<ul>
<li>Build and maintain strong, trust-based relationships with C-level executives, business unit leaders, and engineering teams to ensure architectural solutions meet enterprise-wide objectives.</li>
</ul>
<ul>
<li>Act as a key influencer and communicator, articulating complex architectural concepts and their business value to diverse audiences, from technical experts to non-technical executives.</li>
</ul>
<ul>
<li>Partner closely with the CISO organization and IT operations to ensure that architectural designs are effectively implemented, monitored, and compliant with regulatory requirements.</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>Education: Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field required. Master’s degree preferred.</li>
</ul>
<ul>
<li>Experience: Minimum of 15 years of experience in information technology, with at least 10 years in an architecture role spanning network, security, or infrastructure. Minimum of 5 years in a formal leadership capacity, with proven experience managing, mentoring, and developing senior architects and technical staff.</li>
</ul>
<ul>
<li>Technical Skills:</li>
</ul>
<ul>
<li>Security Architecture: Deep expertise in security frameworks and technologies, including Zero Trust, SASE, NGFW, IDS/IPS, SIEM, WAF, CASB, DLP, and endpoint security.</li>
</ul>
<ul>
<li>Identity &amp; Access Management: Expert knowledge of IAM principles and protocols (SAML, OAuth, OIDC), and experience with IGA, MFA, and PAM solutions.</li>
</ul>
<ul>
<li>Network Architecture: Expert knowledge of modern networking principles and technologies, including SD-WAN, BGP, MPLS, VPN, DNS, DHCP, and data center networking.</li>
</ul>
<ul>
<li>Cloud Security: Expert knowledge of cloud networking and security architecture in AWS, Azure, and/or GCP (e.g., VPCs/VNETs, Security Groups, IAM, Cloud WAFs).</li>
</ul>
<ul>
<li>Communications Technology: Strong understanding of Unified Communications (UCaaS) and Contact Center (CCaaS) technologies (e.g., Genesys, NICE, Five9) and underlying protocols (VoIP, SIP).</li>
</ul>
<ul>
<li>Platform Security: Familiarity with securing operating systems, virtualization, and container orchestration platforms like Kubernetes.</li>
</ul>
<ul>
<li>Frameworks &amp; Compliance: Strong understanding of industry standards and frameworks such as NIST, ISO 27001, CIS, and SOC2.</li>
</ul>
<ul>
<li>Automation: Solid understanding of Infrastructure as Code (IaC) principles and tools (e.g., Terraform, Ansible) and their role in a DevSecOps model.</li>
</ul>
<p><strong>Soft Skills &amp; Leadership Qualities:</strong></p>
<ul>
<li>Executive Presence: Confident and articulate communicator with the ability to present to and influence senior executives and board-level stakeholders.</li>
</ul>
<ul>
<li>Strategic Vision: Ability to think long-term and create a compelling, business-aligned vision for the future state of the technology landscape.</li>
</ul>
<ul>
<li>Collaborative Leadership: Proven ability to lead through influence, build consensus across diverse teams, and foster strong cross-functional partnerships.</li>
</ul>
<ul>
<li>Business Acumen: Strong ability to understand business drivers and translate them into technical requirements and architectural solutions that deliver tangible value.</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Professional certifications such as CISSP, CISM, CCIE, TOGAF (at least one required).</li>
</ul>
<ul>
<li>Expert-level cloud architecture or security certifications (e.g., AWS Certified Security - Specialty, Azure Security Engineer Expert) highly preferred.</li>
</ul>
<ul>
<li>Experience managing departmental budgets and participating in financial planning.</li>
</ul>
<ul>
<li>Experience leading a group of at least 5 enterprise architects.</li>
</ul>
<p><strong>Benefits</strong></p>
<p>This position comes with competitive compensation and benefits package:</p>
<ol>
<li>Competitive salary and performance-based bonuses</li>
</ol>
<ol>
<li>Comprehensive benefits package</li>
</ol>
<ol>
<li>Career development and training opportunities</li>
</ol>
<ol>
<li>Flexible work arrangements (remote and/or office-based)</li>
</ol>
<ol>
<li>Dynamic and inclusive work culture within a globally renowned group</li>
</ol>
<ol>
<li>Private Health Insurance</li>
</ol>
<ol>
<li>Pension Plan</li>
</ol>
<ol>
<li>Paid Time Off</li>
</ol>
<ol>
<li>Training &amp; Development</li>
</ol>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>executive</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>Competitive salary and performance-based bonuses</Salaryrange>
      <Skills>Security Architecture, Identity &amp; Access Management, Network Architecture, Cloud Security, Communications Technology, Platform Security, Frameworks &amp; Compliance, Automation, Professional certifications such as CISSP, CISM, CCIE, TOGAF, Expert-level cloud architecture or security certifications, Experience managing departmental budgets and participating in financial planning, Experience leading a group of at least 5 enterprise architects</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Capgemini</Employername>
      <Employerlogo>https://logos.yubhub.co/capgemini.com.png</Employerlogo>
      <Employerdescription>A global leader in partnering with companies to transform and manage their business by harnessing the power of technology.</Employerdescription>
      <Employerwebsite>https://www.capgemini.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.workable.com/view/vBzyZ6DN9P5iGvPt4insX2/remote-director-of-enterprise-security-and-network-architecture-in-state-of-s%C3%A3o-paulo-at-capgemini</Applyto>
      <Location>São Paulo</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>3dd02502-89f</externalid>
      <Title>Embedded Systems Security Engineer</Title>
      <Description><![CDATA[<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>
<p>You are a passionate and skilled engineer with a strong foundation in embedded systems and low-level programming. You thrive in environments where innovation and security intersect, and you bring hands-on experience in hardware design and cybersecurity. Whether analyzing vulnerabilities or designing robust solutions, your technical acumen is matched by your commitment to excellence and integrity.</p>
<p>You are naturally curious, eager to stay ahead of emerging threats and technologies, and enjoy contributing to a forward-thinking team. You value diversity, inclusivity, and continuous learning, adapting quickly to new methodologies and tools. Your attention to detail and analytical mindset empower you to identify and resolve complex security challenges. You are proactive, collaborative, and driven to foster a culture of innovation, making a meaningful impact on both product and process.</p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li>Analyze reported vulnerabilities in software and hardware products, ensuring timely and thorough investigation.</li>
<li>Serve as a key member of the IP Security Incident Response Team, responding to and mitigating security incidents.</li>
<li>Conduct research into new classes of vulnerabilities, attacks, and security threats to maintain a proactive security posture.</li>
<li>Review and assess vulnerabilities within products, recommending actionable improvements and fixes.</li>
<li>Develop and contribute to automation ideas and tools to enhance vulnerability analysis and incident response workflows.</li>
<li>Collaborate with cross-functional teams to implement security best practices and drive improvements across products.</li>
</ul>
<p><strong>Impact:</strong></p>
<ul>
<li>Elevate the security and reliability of Synopsys&#39; IP products, protecting end-users and businesses worldwide.</li>
<li>Strengthen the safety and integrity of global technological infrastructures through robust security measures.</li>
<li>Advance innovative security methodologies and tools that push the boundaries of industry standards.</li>
<li>Safeguard products against emerging threats and vulnerabilities, ensuring resilience and trust.</li>
<li>Promote a culture of security awareness and proactive risk management within the organization.</li>
<li>Collaborate with a diverse team of experts to drive continuous improvement and set new benchmarks in security excellence.</li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li>Bachelor’s degree and a minimum of 5 years of related experience, or Master&#39;s degree accompanied by at least 3 years of relevant experience in Engineering, Computer Science, or a related field.</li>
<li>Solid hands-on experience in low-level software, embedded systems, or hardware security.</li>
<li>Proficiency in English, both spoken and written, for effective cross-team communication.</li>
<li>Familiarity with semiconductor IP products is a distinct advantage.</li>
<li>Relevant security-specific training and certifications (e.g., CISSP, CEH, OSCP) are highly valued.</li>
</ul>
<p><strong>Team:</strong></p>
<p>Our team is at the forefront of ensuring the security and reliability of Synopsys&#39; IP products. We collaborate across different regions, bringing together a diverse group of experts to drive innovation and excellence. By joining us, you will work with state-of-the-art technologies and contribute to the development and protection of products used globally.</p>
<p><strong>Rewards and Benefits:</strong></p>
<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>Competitive salary</Salaryrange>
      <Skills>low-level software, embedded systems, hardware security, semiconductor IP products, security-specific training and certifications, CISSP, CEH, OSCP</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a leading provider of electronic design automation (EDA) software and intellectual property (IP) products used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/moreira/embedded-systems-security-engineer/44408/93979726608</Applyto>
      <Location>Moreira</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>b859119a-2ee</externalid>
      <Title>Operational Risk Supervisor (IT)</Title>
      <Description><![CDATA[<p>We&#39;re seeking an experienced leader to stand up and manage a new IT Second Line of Defense (2LOD) team. As an Operational Risk Supervisor (IT), you&#39;ll be instrumental in enhancing our IT risk management framework, ensuring the effectiveness of our IT controls, and providing independent oversight of IT risk.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Establishing, recruiting, and leading a high-performing team of IT risk professionals</li>
<li>Partnering with First Line of Defense (1LOD) IT teams to identify key IT risks and pinpoint critical controls</li>
<li>Leading comprehensive IT risk assessments using established methodologies</li>
<li>Developing and implementing a robust methodology for 2LOD IT control testing</li>
<li>Analyzing results, identifying control deficiencies, and providing clear feedback to 1LOD teams</li>
<li>Ensuring IT controls are thoroughly documented and accurately reflect operational practices</li>
</ul>
<p>As a seasoned leader, you&#39;ll have a strong background in risk management or audit, combined with IT knowledge. You&#39;ll be able to translate technical details into business risks and communicate effectively with stakeholders.</p>
<p>If you&#39;re passionate about IT risk management and leadership, we encourage you to apply!</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$115,500-$218,100</Salaryrange>
      <Skills>IT risk management, Audit, Leadership, Team management, Communication, Risk assessment, Control testing, Documentation, Process improvement, IT security, GRC, Policy management, Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP)</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>Ford Motor Credit Company</Employername>
      <Employerlogo>https://logos.yubhub.co/fordcredit.com.png</Employerlogo>
      <Employerdescription>Ford Motor Credit Company is a leading provider of automotive financing and leasing services, operating in over 100 countries worldwide.</Employerdescription>
      <Employerwebsite>https://www.fordcredit.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/61992</Applyto>
      <Location>Dearborn</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>f83cbd15-47d</externalid>
      <Title>Senior Cybersecurity Platform Engineer</Title>
      <Description><![CDATA[<p>We are the movers of the world and the makers of the future. At Ford, we&#39;re all a part of something bigger than ourselves. Are you ready to change the way the world moves?</p>
<p>Enterprise Technology plays a critical part in shaping the future of mobility. If you&#39;re looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people&#39;s lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are.</p>
<p>This role is responsible for designing, implementing, automating, and maintaining security platforms that support enterprise cybersecurity operations. The role focuses on integrating security agents/tools, improving detection capabilities, ensuring platform reliability, and enabling security teams through scalable infrastructure and automation.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design, implement, maintain, and improve security platforms and tools that protect the organization&#39;s IT infrastructure.</li>
<li>Optimize security technologies to detect, prevent, and respond to security threats in real time.</li>
<li>Collaborate with engineering, IT, and security operations teams to deploy and support enterprise cybersecurity platforms and solutions.</li>
<li>Secure in-house and public AI and ML/DL systems against cyber threats, adversarial attacks, and data breaches across the solution lifecycle.</li>
<li>Design and implement robust security platforms supporting enterprise security needs (e.g., unified telemetry pipeline like BindPlane, SIEM like QRadar, SecOps, and AI security).</li>
<li>Define and maintain guidelines and controls to secure AI systems, including data protection, model security, and compliance requirements.</li>
<li>Apply established frameworks as references/baselines (e.g., Google Secure AI Framework (SAIF), NIST AI Risk Management Framework, Framework for AI Cybersecurity Practices (FAICP)).</li>
<li>Identify, assess, and mitigate AI-specific security risks (adversarial attacks, data poisoning, model inversion, unauthorized access).</li>
<li>Conduct vulnerability assessments and penetration testing on AI models and data pipelines.</li>
<li>Ensure AI data is encrypted, anonymized, and securely stored.</li>
<li>Implement access controls for sensitive AI data and models (RBAC, ABAC, Zero Trust).</li>
<li>Protect AI models from tampering, theft, and adversarial manipulation during training and deployment.</li>
<li>Monitor and log AI system activity for anomalies and security incidents.</li>
<li>Develop and enforce policies to align AI systems with industry regulations, ethical standards, and organizational governance requirements.</li>
<li>Develop automated workflows and scripts to enhance security platform functionality and scalability, improving operational efficiency.</li>
<li>Manage timely patching and upgrades to security tools and systems to reduce downtime and minimize vulnerabilities.</li>
<li>Configure alerting systems for security threats and enable real-time monitoring for observability.</li>
<li>Partner with incident response teams to identify, contain, and mitigate security incidents.</li>
<li>Support root cause analysis to improve security posture and prevent repeat breaches.</li>
<li>Optimize security tools and platforms for performance and effectiveness while meeting compliance and organizational requirements.</li>
<li>Maintain documentation for platform configurations, AI services and capabilities, troubleshooting guides, and operational procedures.</li>
</ul>
<p><strong>Qualifications</strong></p>
<ul>
<li>Bachelor&#39;s degree in Computer Science, Information Security, or related field OR a combination of education and experience</li>
<li>5+ years of experience in security engineering, platform engineering, and AI/ML, including experience in large, complex environments</li>
<li>Experience in managing security platforms and tools in enterprise environments</li>
<li>Experience in telemetry pipeline platforms (e.g., BindPlane), SIEM (e.g., Splunk, QRadar), and vulnerability management tools</li>
<li>Experience in scripting and automation (Python, PowerShell, and/or Bash)</li>
<li>Experience in infrastructure as Code (Terraform, Ansible)</li>
<li>Experience in cloud security tools and platforms (GCP, AWS, Azure)</li>
<li>Experience in container security (Docker, Kubernetes)</li>
<li>Experience in networking protocols, firewalls, and network security best practices</li>
<li>Experience in AI/ML concepts, architectures, and AI security challenges</li>
<li>Experience in AI threat areas (adversarial attacks, data poisoning, model inversion, unauthorized access)</li>
<li>Experience in vulnerability assessment and penetration testing on AI models and data pipelines</li>
<li>Experience in data protection techniques (encryption, anonymization, secure storage) and secure access management (RBAC, ABAC, Zero Trust)</li>
<li>Experience in incident response, monitoring tools, and threat intelligence platforms</li>
<li>Experience in security frameworks and compliance references (SAIF, NIST, FAICP)</li>
<li>Experience in ITSM processes and tools (ServiceNow) and delivery practices/tools (Agile, JIRA)</li>
<li>Master&#39;s degree in Computer Science, Information Security, or related field</li>
<li>Understanding of cloud AI/ML services and deployment pipelines</li>
<li>CISSP (Certified Information Systems Security Professional)</li>
<li>CCSP (Certified Cloud Security Professional)</li>
<li>Preferred certifications such as CAISF, AICERTs, AI for Cybersecurity Specialization, or equivalent</li>
<li>GCP cloud certification or equivalent in AWS or Azure (preferred)</li>
<li>Additional cybersecurity certificates (preferred)</li>
<li>Excellent communication and documentation skills for policy development and stakeholder engagement</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>This position is a range of salary grades 7-8.</Salaryrange>
      <Skills>Cloud security tools and platforms, Container security, Data protection techniques, Encryption, Anonymization, Secure storage, Secure access management, RBAC, ABAC, Zero Trust, AI/ML concepts, Architectures, AI security challenges, Adversarial attacks, Data poisoning, Model inversion, Unauthorized access, Vulnerability assessment, Penetration testing, AI models, Data pipelines, Incident response, Monitoring tools, Threat intelligence platforms, Security frameworks, Compliance references, ITSM processes, Tools, Delivery practices, Scripting, Automation, Infrastructure as Code, Terraform, Ansible, Networking protocols, Firewalls, Network security best practices, Telemetry pipeline platforms, SIEM, Vulnerability management tools, Python, PowerShell, Bash, GCP, AWS, Azure, Docker, Kubernetes, CISSP, CCSP, CAISF, AICERTs, AI for Cybersecurity Specialization, GCP cloud certification, AWS cloud certification, Azure cloud certification, Additional cybersecurity certificates</Skills>
      <Category>Engineering</Category>
      <Industry>Automotive</Industry>
      <Employername>Ford Motor Company</Employername>
      <Employerlogo>https://logos.yubhub.co/corporate.ford.com.png</Employerlogo>
      <Employerdescription>Ford Motor Company is a multinational automaker headquartered in Dearborn, Michigan. It designs, manufactures, markets, and distributes automobiles and commercial vehicles worldwide.</Employerdescription>
      <Employerwebsite>https://corporate.ford.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://efds.fa.em5.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/60305</Applyto>
      <Location>Dearborn</Location>
      <Country></Country>
      <Postedate>2026-04-24</Postedate>
    </job>
    <job>
      <externalid>b6fdfd50-5de</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>Do you have a passion for hunting malicious activities in the background of business as usual and figuring out how to detect and respond to new threats?</p>
<p>Millennium SOC is looking for an experienced Threat Detection Engineer to drive our best-in-class posture.</p>
<p>This is a highly technical role, and successful candidates will have demonstrable knowledge and experience across a range of business and security technologies within a fast-paced organisation.</p>
<p><strong>Principal Responsibilities</strong></p>
<ul>
<li>Identify modern evolving threats and develop new detection and response approaches</li>
<li>Create and operate high-fidelity detections mechanisms that drive efficient, effective and repeatable response</li>
<li>Own, operate and automate detection and response workflows, that enable the team to focus on strategic objectives</li>
<li>Lead Information Security response activities for the firm</li>
<li>Work across business and technology teams to deliver positive outcomes across the firm</li>
<li>Explain complex technology and information security related concepts to a wide range of stakeholders</li>
<li>Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering stakeholder queries</li>
<li>Monitor new and emerging security and privacy related technologies, trends, issues, and solutions and assess their applicability to Millennium key business initiatives and business strategies</li>
<li>Ensure Millennium Information Security capabilities remain fit for purpose and evolve to meet the changing threat landscape</li>
</ul>
<p><strong>Qualifications/Skills Required</strong></p>
<ul>
<li>Bachelor or master’s degree in computer science or cyber security with strong IT background or equivalent demonstrable experience</li>
<li>3 years’ experience working in a security engineering role, financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possesses security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity and cloud</li>
<li>Experience in standard enterprise technology stack, Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, Threat hunting and analysing malicious emails</li>
<li>Able to prioritise in a fast moving, high pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Bachelor or master’s degree in computer science or cyber security, 3 years’ experience working in a security engineering role, Experience in creating detections in modern query languages (KQL, SQL, SPL), Possesses security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH), Experience with modern security tooling across security domains; network, endpoint, data, identity and cloud</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure is a company that provides infrastructure services.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755954323758</Applyto>
      <Location>Miami, Florida, United States of America</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>f8c5a32f-1c7</externalid>
      <Title>Sr. Cyber Security GRC Specialist</Title>
      <Description><![CDATA[<p>At Bayer, we&#39;re seeking a Sr. Cyber Security GRC Specialist to support the development, implementation, and ongoing operation of Cyber Security Governance, Risk, and Compliance (GRC) activities within the organisation.</p>
<p>As a Sr. Cyber Security GRC Specialist, you will partner with Cyber Security, IT, compliance, and business stakeholders to help measure adherence to Bayer policies and procedures aligned to industry standards; assess the effectiveness of security and compliance processes; track key IT security deliverables; and contribute to audit readiness.</p>
<p>Your tasks and responsibilities will include:</p>
<ul>
<li>Supporting Cyber Security risk management activities to identify, assess, and help mitigate risks, including contributing to the operation and continuous improvement of the Cyber Security framework;</li>
<li>Developing and maintaining key performance indicators (KPIs), dashboards, and metrics to measure the effectiveness of initiatives;</li>
<li>Collaborating with cross-functional teams to help integrate Cyber Security assurance principles into business processes and systems;</li>
<li>Providing guidance and day-to-day support across the organisation on Cyber Security assurance topics, following established standards and practices;</li>
<li>Monitoring regulatory changes and industry trends and summarising impacts to policies, controls, and risk posture;</li>
<li>Coordinating evidence collection and responding to auditor inquiries in partnership with control owners and subject matter experts;</li>
<li>Contributing to strategic initiatives by supporting planning, tracking milestones, and producing high-quality deliverables;</li>
<li>Supporting continuous improvement of the data classification framework that categorises data based on sensitivity and risk;</li>
<li>Partnering with stakeholders at all levels of the organisation to help ensure appropriate classification of data assets across the organisation;</li>
<li>Assisting with periodic reviews and updates to classification policies to align with regulatory changes and business needs;</li>
<li>Supporting identification and management of the organisation&#39;s critical data assets (&#39;crown jewels&#39;);</li>
<li>Helping implement and maintain security requirements and protection measures for high-value data assets in partnership with relevant teams;</li>
<li>Participating in assessments and control reviews related to crown jewel data to support compliance with security standards;</li>
<li>Supporting data discovery and inventory activities to improve visibility of data assets across the organisation;</li>
<li>Utilising data discovery tools and techniques to help identify sensitive data and its locations;</li>
<li>Maintaining an up-to-date inventory of data assets, including classification and documented protection measures;</li>
<li>Working closely with IT, compliance, and legal teams to help ensure alignment on data protection requirements and implementation plans;</li>
<li>Serving as a point of contact for data security inquiries by triaging requests and connecting teams with the right standards, processes, and subject matter experts;</li>
<li>Promoting strong collaboration and alignment with broader GRC capabilities and ways of working.</li>
</ul>
<p>The primary location for this role will be Creve Coeur, MO (St. Louis, MO metro area).</p>
<p>If you&#39;re interested in this opportunity, please submit your application.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$114,400 - $171,600</Salaryrange>
      <Skills>Cyber Security, Risk Management, Compliance, Data Classification, Data Protection, Security Standards, Auditing, Strategic Planning, Team Collaboration, Communication, CISSP, CISM, CRISC, Security+</Skills>
      <Category>IT</Category>
      <Industry>Pharmaceuticals</Industry>
      <Employername>Bayer</Employername>
      <Employerlogo>https://logos.yubhub.co/talent.bayer.com.png</Employerlogo>
      <Employerdescription>Bayer is a multinational pharmaceutical and life sciences company with a global presence.</Employerdescription>
      <Employerwebsite>https://talent.bayer.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://talent.bayer.com/careers/job/562949976820204</Applyto>
      <Location>Creve Coeur</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>740da2af-174</externalid>
      <Title>Security Engineer, Detection &amp; Response</Title>
      <Description><![CDATA[<p>We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering, requiring you to investigate incidents and build the systems that detect, contain, and prevent them.</p>
<p>You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.</p>
<p>Responsibilities:</p>
<ul>
<li>Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance.</li>
</ul>
<ul>
<li>Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity.</li>
</ul>
<ul>
<li>Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity.</li>
</ul>
<ul>
<li>Perform digital incident investigations to identify and contain potential security breaches.</li>
</ul>
<ul>
<li>Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies.</li>
</ul>
<ul>
<li>Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows.</li>
</ul>
<ul>
<li>Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organisation.</li>
</ul>
<ul>
<li>Utilize threat intelligence platforms to improve hunting, detection, and response workflows.</li>
</ul>
<ul>
<li>Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders.</li>
</ul>
<p>Ideal Candidate:</p>
<ul>
<li>5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation.</li>
</ul>
<ul>
<li>Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code , not just scripts.</li>
</ul>
<ul>
<li>Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments.</li>
</ul>
<ul>
<li>Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically.</li>
</ul>
<ul>
<li>Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs.</li>
</ul>
<ul>
<li>Familiarity with digital forensics tools and malware analysis techniques.</li>
</ul>
<ul>
<li>Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate.</li>
</ul>
<ul>
<li>Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows.</li>
</ul>
<ul>
<li>Strong communication skills, with the ability to translate complex security findings into clear business impact.</li>
</ul>
<ul>
<li>Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus.</li>
</ul>
<p>Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$237,600-$297,000 USD</Salaryrange>
      <Skills>Detection Engineering, Incident Response, Security Operations, Cloud Services, Enterprise SaaS, Automation, Telemetry Pipelines, Digital Forensics, Malware Analysis, Threat Intelligence Platforms, SIEM, EDR, SOAR, Cloud-Native Environments, Programming Languages, Python, Go, Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments, Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically, Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs, Familiarity with digital forensics tools and malware analysis techniques, Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate, Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows, Strong communication skills, with the ability to translate complex security findings into clear business impact, Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA)</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Scale</Employername>
      <Employerlogo>https://logos.yubhub.co/scale.com.png</Employerlogo>
      <Employerdescription>Scale develops reliable AI systems for the world&apos;s most important decisions, providing high-quality data and full-stack technologies.</Employerdescription>
      <Employerwebsite>https://scale.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/scaleai/jobs/4684073005</Applyto>
      <Location>New York, NY; San Francisco, CA; Seattle, WA; Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>11b88e19-a73</externalid>
      <Title>Data Centre Security Compliance Public Sector Specialist</Title>
      <Description><![CDATA[<p>About Us</p>
<p>At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>
<p>We protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>
<p>Key Responsibilities</p>
<p><strong>Public Sector &amp; Compliance Governance</strong></p>
<ul>
<li>Serve as the Subject Matter Expert (SME) on NIST 800-53 control families and FedRAMP requirements.</li>
<li>Manage Cloudflare&#39;s continuous monitoring program, inclusive of annual assessments and significant change requests.</li>
<li>Collect, validate, and organize FedRAMP evidence and artifacts to present to auditors, FedRAMP customers, and the FedRAMP PMO.</li>
<li>Help guide our overall security policy and governance architecture to ensure alignment with evolving government regulations.</li>
</ul>
<p><strong>Audit Lifecycle Management</strong></p>
<ul>
<li>Orchestrate end-to-end audit activities for standards such as PCI, SOC2, ISO, NIST, and FedRAMP.</li>
<li>Coordinate with auditors to manage data center access, compliance certificate collection, and evidence defense.</li>
<li>Work cross-functionally with Engineering, Legal, Product, and Operational teams to maintain management and technical controls.</li>
<li>Support compliance and regulatory projects, including implementation of new legislation / regulation.</li>
</ul>
<p><strong>Identity &amp; Access Management (IAM) Operations</strong></p>
<ul>
<li>Execute monthly Periodic Access Reviews (PARs): Compare portal user lists against ACLs to ensure least-privilege access is maintained across all data centers.</li>
<li>Manage the lifecycle of portal access: Auditing access, provisioning/deprovisioning users, and maintaining accurate documentation.</li>
<li>Oversee physical access requests to data centers and ensure strict adherence to security policies.</li>
<li>Drive the resolution of daily DCSC Jira tickets for portal access, physical access, audits, and site decommissioning.</li>
<li>Automate and streamline access review processes where possible, utilizing standard communication templates to site managers.</li>
</ul>
<p><strong>Partner Relations &amp; Reporting</strong></p>
<ul>
<li>Own, influence, and orchestrate relationships within the partner Offering teams that can help drive Cloudflare offerings and strategic positioning.</li>
<li>Monitor and implement changes to individual accountability regime requirements (such as UK, Ireland, Singapore and Australia).</li>
<li>Maintain centralized documentation, databases, dashboards, and reporting mechanisms to track compliance health.</li>
</ul>
<p>Requirements</p>
<ul>
<li>3-6 years working in Security Compliance, Information Security, or Risk Management.</li>
<li>Deep familiarity with all NIST 800-53 control families and FedRAMP requirements.</li>
<li>Ability to work closely with auditors and articulate technical concepts.</li>
<li>Experience in auditing of network, operating system, and application security.</li>
<li>Proven experience managing an audit throughout the full audit lifecycle (from readiness to final report).</li>
<li>Familiarity with additional security standards and frameworks such as ISO 27000, SOC 2, PCI DSS, ISMAP and IRAP.</li>
<li>Ability to work cross-functionally with internal stakeholders and strong communications skills.</li>
<li>High tolerance for ambiguity and ability to work efficiently and independently in a fast-paced, high-volume environment.</li>
<li>Some travel may be required to engage with regulators and auditors.</li>
<li>Certifications: CISSP, CIPP, CIPM, CIPT, CISA, or CRISC.</li>
<li>A relevant professional experience working with technology partners, alliances, or third-party vendors, ideally in the following disciplines: Data center Security Compliance, Access Management, audit administration at a leading high-tech company; offering management.</li>
<li>Technical skills including the ability to understand (1) product roadmaps; (2) market trends and factors; and (3) complex partner requirements.</li>
<li>Strong technical proficiency with spreadsheet software (Excel/Google Sheets) including pivot tables and VLOOKUPs for data reconciliation.</li>
<li>Organized &amp; Disciplined, with a strong focus on driving outcomes.</li>
</ul>
<p>Preferred</p>
<ul>
<li>Prior experience with Data Centre Security Compliance disciplines and audit programs and past history working at a hyperscaler or high-growth tech company.</li>
<li>Superb organizational skills and demonstrated history managing complex processes including audit cycles, Facts gathering and analytical skills.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>mid</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>NIST 800-53 control families, FedRAMP requirements, Identity &amp; Access Management (IAM), Audit Lifecycle Management, Security Compliance, Information Security, Risk Management, CISSP, CIPP, CIPM, CIPT, CISA, CRISC, Data center Security Compliance, Access Management, audit administration, product roadmaps, market trends and factors, complex partner requirements</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare operates one of the world&apos;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7477769</Applyto>
      <Location>Hybrid</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>3ba73370-831</externalid>
      <Title>Internal Audit IT Manager</Title>
      <Description><![CDATA[<p>Ready to be pushed beyond what you think you’re capable of?</p>
<p>At Coinbase, our mission is to increase economic freedom in the world.</p>
<p>We’re seeking a very specific candidate who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system.</p>
<p>As an Internal Audit IT Manager, you will own end-to-end delivery of complex IT and security audits across our cloud infrastructure, security operations, and crypto-native systems.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Owning end-to-end delivery of IT and security audits, from risk assessment and scoping through planning, fieldwork, testing, reporting, and issue validation,covering cloud infrastructure (AWS, GCP), security operations, identity and access management, data protection, IT asset management, vendor/third-party risk, and key in-scope products and services including blockchain infrastructure, centralized and self-hosted wallets, and cold storage.</li>
</ul>
<ul>
<li>Driving AI-enabled audit execution, designing and implementing data analytics, automation, and Generative AI solutions to modernize how we audit (e.g., continuous monitoring, anomaly detection, automated evidence retrieval, AI-assisted workpaper drafting),while maintaining rigorous human-in-the-loop validation to ensure accuracy and audit-quality conclusions.</li>
</ul>
<ul>
<li>Executing audits aligned with the multi-year IT and security audit roadmap, coordinating coverage with co-sourced partners and cross-functional risk initiatives while ensuring alignment with Coinbase&#39;s enterprise risk profile, technology strategy, and regulatory expectations across regions (US, EMEA, APAC).</li>
</ul>
<ul>
<li>Driving high-quality, risk-based findings and executive-level reporting, distilling key themes, emerging risks, and root causes into clear, concise materials for senior management and the Chief Audit Executive,ensuring findings are appropriately documented and supported by evidence.</li>
</ul>
<ul>
<li>Partnering with technology and security leadership across Engineering, Security, Infrastructure, Product, and Operations to build trusted relationships, challenge control design, and advise on pragmatic, risk-based, scalable remediation while maintaining third-line independence.</li>
</ul>
<ul>
<li>Driving disciplined issue management, ensuring timely, risk-based remediation by management, high-quality root cause analysis, and validation of remediation activities,escalating delays or thematic concerns to senior leadership as needed.</li>
</ul>
<ul>
<li>Evaluating and developing talent, assessing candidates and helping build a high-performing, technically credible audit team.</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>7+ years of experience in IT/security internal audit, technology risk, or first-line security/engineering roles with significant controls exposure.</li>
</ul>
<ul>
<li>Experience working in a fast-paced, cloud-native, or engineering-driven environment where technology and security practices evolve rapidly.</li>
</ul>
<ul>
<li>Hands-on audit experience with cloud platforms (AWS, GCP), including IAM policies, security configurations, logging/monitoring, and CI/CD pipelines.</li>
</ul>
<ul>
<li>AI-forward mindset with demonstrated experience applying Python, SQL, or AI tools to audit or security work, building workflows rather than just prompting.</li>
</ul>
<ul>
<li>Relevant professional certifications (e.g., CISA, CISSP, CIA, CISM) required; CPA or CFE a plus.</li>
</ul>
<ul>
<li>Working knowledge of key frameworks such as NIST CSF, COBIT, SOC 2, and ITIL.</li>
</ul>
<ul>
<li>High EQ and collaborative style.</li>
</ul>
<ul>
<li>Proven ability to translate complex technical findings into clear, executive-ready narratives for both technical and non-technical audiences.</li>
</ul>
<ul>
<li>Ability to manage multiple audits and initiatives across time zones (EMEA, APAC) with minimal oversight.</li>
</ul>
<ul>
<li>Demonstrated leadership and team-development experience, including mentoring, coaching, and managing direct reports.</li>
</ul>
<ul>
<li>Demonstrates the ability to responsibly use generative AI tools and copilots (e.g., LibreChat, Gemini, Glean) in daily workflows, continuously learn as tools evolve, and apply human-in-the-loop practices to deliver business-ready outputs and drive measurable improvements in efficiency, cost, and quality.</li>
</ul>
<p>Nice to have:</p>
<ul>
<li>Experience auditing or building blockchain infrastructure, crypto custody, or wallet systems (hot/cold storage).</li>
</ul>
<ul>
<li>Background in a high-growth or rapidly scaling environment with complex, evolving technology stacks.</li>
</ul>
<ul>
<li>Experience with GRC platforms (Workiva, Archer, AuditBoard) or building custom audit automation tooling.</li>
</ul>
<ul>
<li>Familiarity with DORA, MiCA, or crypto-specific regulatory frameworks.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$166,345-$195,700 USD</Salaryrange>
      <Skills>IT security, Cloud infrastructure, Security operations, Identity and access management, Data protection, IT asset management, Vendor/third-party risk, Blockchain infrastructure, Centralized and self-hosted wallets, Cold storage, AI-enabled audit execution, Data analytics, Automation, Generative AI, Continuous monitoring, Anomaly detection, Automated evidence retrieval, AI-assisted workpaper drafting, Cloud platforms, IAM policies, Security configurations, Logging/monitoring, CI/CD pipelines, Python, SQL, AI tools, NIST CSF, COBIT, SOC 2, ITIL, CISA, CISSP, CIA, CISM, CPA, CFE</Skills>
      <Category>Finance</Category>
      <Industry>Finance</Industry>
      <Employername>Coinbase</Employername>
      <Employerlogo>https://logos.yubhub.co/coinbase.com.png</Employerlogo>
      <Employerdescription>Coinbase is a digital currency exchange and wallet service provider.</Employerdescription>
      <Employerwebsite>https://www.coinbase.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coinbase/jobs/7755116</Applyto>
      <Location>Remote - USA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>0c1f85bb-c33</externalid>
      <Title>Senior Product Manager, Compliance</Title>
      <Description><![CDATA[<p>CoreWeave is building the infrastructure that powers the next era of AI. As we scale towards and beyond public company readiness, the CIO organisation is responsible for owning the execution of IT General Controls (ITGCs) and IT application controls across our technology environment.</p>
<p>We are looking for a Senior Product Manager, IT SOX Compliance to join our team. This is not a traditional audit-support role. As the Product Manager, IT SOX Compliance, you will translate SOX compliance requirements into structured programs, drive accountability across IT process owners, and build the systems and workflows that make compliance scalable.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Owning the end-to-end IT SOX compliance program within the CIO organisation, maintaining the IT control inventory spanning ITGCs, IT-dependent controls, and automated application controls</li>
<li>Owning the control design and documentation, including narratives and risk and control matrices (RCMs), ensuring controls are clearly defined and audit-ready</li>
<li>Partnering with IT, Accounting (where needed), and the SOX team to ensure new systems and modules are implemented with appropriate SDLC controls in place prior to go-live; reviewing control designs to identify and mitigate SOX risks</li>
<li>On an ongoing basis, partnering with IT process owners and control operators to ensure controls are executed in a timely manner</li>
<li>Reviewing control evidence for quality and completeness before submission to auditors</li>
<li>Managing the full deficiency lifecycle , from root cause analysis through remediation planning, retesting, and escalation , reporting control health to IT leadership and the SOX team</li>
<li>Leading root cause analysis for control failures and incidents, tracking and resolving systemic gaps, and implementing and validating remediation plans to prevent recurrence</li>
</ul>
<p>You will work closely with the SOX team and IT process owners to ensure controls are designed, reviewed, and evidenced effectively.</p>
<p>The ideal candidate will have 8+ years of experience in IT audit, IT risk, IT compliance, or a related field, with hands-on IT SOX experience in either a practitioner or oversight capacity. You will have deep familiarity with IT General Controls (ITGCs) , access management, change management, SDLC, and computer operations , and how they map to financial reporting risk.</p>
<p>In addition to a competitive salary declaration, we offer a variety of benefits to support your needs, including medical, dental, and vision insurance, company-paid life insurance, voluntary supplemental life insurance, short and long-term disability insurance, flexible spending account, health savings account, tuition reimbursement, ability to participate in employee stock purchase program (ESPP), mental wellness benefits through Spring Health, family-forming support provided by Carrot, paid parental leave, flexible, full-service childcare support with Kinside, 401(k) with a generous employer match, flexible PTO, catered lunch each day in our office and data center locations, a casual work environment, and a work culture focused on innovative disruption.</p>
<p>Why CoreWeave?</p>
<p>At CoreWeave, we work hard, have fun, and move fast! We&#39;re in an exciting stage of hyper-growth that you will not want to miss out on. We&#39;re not afraid of a little chaos, and we&#39;re constantly learning. Our team cares deeply about how we build our product and how we work together, which is represented through our core values: Be Curious at Your Core, Act Like an Owner, Empower Employees, Deliver Best-in-Class Client Experiences, Achieve More Together.</p>
<p>We support and encourage an entrepreneurial outlook and independent thinking. We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems. As we get set for takeoff, the organisation&#39;s growth opportunities are constantly expanding. You will be surrounded by some of the best talent in the industry, who will want to learn from you, too.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$165,000 to $242,000</Salaryrange>
      <Skills>IT General Controls (ITGCs), SOX compliance, IT audit, IT risk, IT compliance, Access management, Change management, SDLC, Computer operations, Workday, Salesforce, NetSuite/SAP, Coupa, GRC platforms, AuditBoard, ServiceNow GRC, Workiva, CISA, CISSP, CISM, CPA, Hyperscaler, Cloud infrastructure, High-growth tech environment</Skills>
      <Category>IT</Category>
      <Industry>Technology</Industry>
      <Employername>CoreWeave</Employername>
      <Employerlogo>https://logos.yubhub.co/coreweave.com.png</Employerlogo>
      <Employerdescription>CoreWeave is a cloud infrastructure company that provides a platform for building and scaling AI applications.</Employerdescription>
      <Employerwebsite>https://www.coreweave.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coreweave/jobs/4673532006</Applyto>
      <Location>Livingston, NJ / New York, NY / Sunnyvale, CA / San Francisco, CA / Bellevue, WA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>8397e11e-7f9</externalid>
      <Title>Sr. Technical Account Manager, Okta Strategic Customers</Title>
      <Description><![CDATA[<p>Secure Every Identity</p>
<p>Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes.</p>
<p>We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>
<p>As a Senior Technical Account Manager, you will focus exclusively on Workforce Identity, serving as a trusted technical advisor and advocate for some of our largest customers. You will focus on strategic account alignment and broad deployment strategies to drive lasting success through elevated technical maturity.</p>
<p>Key Workforce Identity Solutions You Will Support: The Okta Platform secures employees, contractors, and partners across every part of the Identity lifecycle, including governance, access, and privileged controls. Products include:</p>
<ul>
<li>Identity &amp; Access Management (IAM): Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, and Universal Directory.</li>
<li>Identity Governance &amp; Administration (IGA): Lifecycle Management and Identity Governance.</li>
<li>Privileged Access Management (PAM): Privileged Access.</li>
<li>Identity Threat Detection &amp; Response (ITDR): Identity Security Posture Management and Identity Threat Protection.</li>
</ul>
<p>What You&#39;ll Be Doing</p>
<p>Strategic Customer Partnership &amp; Influence:</p>
<ul>
<li>Build deep, long-lasting relationships with customers as their go-to technical advisor.</li>
<li>Earn Okta trusted advisor status with customer identity owners and technical leadership, known as the primary point of contact for technical leaders.</li>
<li>Possess and masterfully apply comprehensive technical expertise to solve complex problems, design sophisticated solutions, and influence customer strategies.</li>
<li>Collaborate with customers to design identity strategies aligned with their business objectives.</li>
<li>Leverage tailored technical plans for success with a portfolio of customers of increasing size and complexity.</li>
<li>Help find ways to build upon and expand customers&#39; adoption of the Okta footprint through additional use cases and increasing security posture.</li>
<li>Use knowledge of how Okta&#39;s product differentiators lead to positive outcomes for customers, securing the Okta footprint against competitive displacement.</li>
</ul>
<p>Complex Problem Resolution &amp; Advocacy:</p>
<ul>
<li>Demonstrate advanced problem-solving skills, capable of dissecting complex, multi-faceted problems and orchestrating effective solutions.</li>
<li>Proactively identify risks and create mitigation plans, establishing actions, ownership, and driving resolutions.</li>
<li>Able to handle most customer technical escalations independently, or collaboratively with the Customer Success Manager (CSM).</li>
<li>Manage competing priorities with little impact on delivery, ensuring follow through on all activity.</li>
<li>Demonstrate a strong ability to represent and advocate for the customer with cross-functional teams (including engineering and support), while supporting policies and decisions that are in the best interests of the company.</li>
<li>Facilitate difficult discussions with senior stakeholders.</li>
</ul>
<p>Thought Leadership &amp; Team Enablement:</p>
<ul>
<li>Serve as a thought leader, providing best practices, workshops, and training.</li>
<li>Generate specific vertical/use case insights and thought leadership, demonstrating an advanced level of Okta platform and identity domain knowledge, with a focus on enhancing customers&#39; security posture.</li>
<li>Generate higher value for customers and deeper TAM engagement through repeatable asset and strategy creation for the team.</li>
<li>Mentor peers and colleagues, upskilling capability with a focus on technical development.</li>
<li>Contribute to the development of adoption and retention strategies, sharing knowledge of customer patterns, and leading execution.</li>
<li>Lead project tasks or initiatives aimed at improvement of TAM processes and knowledge.</li>
</ul>
<p>What You&#39;ll Bring to the Role</p>
<ul>
<li>Requires 8+ years of related experience in a professional role, or equivalent experience (e.g., 6+ years with a Master’s degree).</li>
<li>3+ years of experience as a Technical Account Manager (TAM) or a comparable role such as Technical Consultant, Product Management, or Solution Architect.</li>
<li>3+ years in identity and access management, including SSO, MFA, lifecycle management, or security best practices.</li>
<li>Education: BA/BS/MS in Computer Science, Information Technology or related discipline, or equivalent work experience required.</li>
<li>Certifications: Okta Certified, CISSP, or equivalent.</li>
<li>Technical Mastery (Workforce Identity Focus):</li>
<li>Extensive proficiency utilizing Okta feature sets and platforms to portray a design, or architecture, that satisfies well-known customer use cases to a customer technical persona including architect.</li>
<li>Able to modify existing quickstart or code samples to adapt them to the customer&#39;s requirements.</li>
<li>Confident in assisting TAM peers on technical challenges, or on behalf of other TAMs customers.</li>
<li>Solid understanding of one or more of the following key areas:</li>
<li>Technologies and protocols to support identity federation and robust access control models (e.g., SAML 2.0, WS-Federation, OAuth, OpenID Connect).</li>
<li>Experience dealing with legacy applications in a hybrid IT environment with non-standard applications (i.e., those that do not support modern identity federation protocols).</li>
<li>SaaS deployment such as Salesforce, Box, Office 365, Workday, and HR as master for identities.</li>
<li>Lifecycle management scenarios to 3rd party systems and applications (Workflows, HR-driven provisioning, MSFT integrations, SCIM, etc).</li>
<li>Enterprise applications in the ecosystem to provide identity and attributes to applications or to harness an external application to help drive business processes (ITSM, HR, etc).</li>
<li>Security and performance monitoring and 3rd party signals integrations (SEIM, MDM, WAF, etc).</li>
<li>Awareness of augmentation of identity protocols and flows, capable of identifying augmentation that requires additional review.</li>
<li>Communication and Leadership Skills:</li>
<li>Excellent communication skills, capable of translating complex technical topics into actionable insights.</li>
<li>Convey complex ideas in a compelling and easily understandable manner.</li>
<li>Ability to set expectations and communicate goals and objectives with customers at various levels, up to CxO.</li>
<li>Skilled in setting and enforcing appropriate boundaries with both internal and external stakeholders.</li>
<li>Ability to track and influence customer behavior.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Identity &amp; Access Management (IAM), Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, Universal Directory, Identity Governance &amp; Administration (IGA), Lifecycle Management, Identity Governance, Privileged Access Management (PAM), Privileged Access, Identity Threat Detection &amp; Response (ITDR), Identity Security Posture Management, Identity Threat Protection, Technical Account Management (TAM), Technical Consultant, Product Management, Solution Architect, Identity and Access Management, SSO, MFA, Security Best Practices, Okta Certified, CISSP, SAML 2.0, WS-Federation, OAuth, OpenID Connect, Legacy Applications, Hybrid IT Environment, Non-Standard Applications, SaaS Deployment, Salesforce, Box, Office 365, Workday, HR, Lifecycle Management Scenarios, Third Party Systems, Applications, Workflows, HR-Driven Provisioning, MSFT Integrations, SCIM, Enterprise Applications, Identity and Attributes, Business Processes, ITSM, Security and Performance Monitoring, Third Party Signals Integrations, SEIM, MDM, WAF, Augmentation of Identity Protocols, Communication and Leadership Skills</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta is a company that specialises in identity management and provides a platform that secures all types of identity, including customers, employees, partners, and AI agents.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7776839</Applyto>
      <Location>Toronto, Ontario, Canada</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>e22d9fde-ad7</externalid>
      <Title>Software Engineer (Security)</Title>
      <Description><![CDATA[<p>About Us</p>
<p>At Cloudflare, we&#39;re on a mission to help build a better Internet. We protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code.</p>
<p>As a Senior Security AI Engineer, you will be the technical architect for our Agentic AI roadmap. Your mission is to move beyond simple automation scripts and build a fleet of &#39;AI Team Members&#39;,intelligent helper agents that execute complex security algorithms, process flows, and assessment logic.</p>
<p>Responsibilities</p>
<ul>
<li>Agent Architecture: Design and deploy multi-agent systems that follow complex security algorithms and assessment flows to automate manual SOC and Assurance tasks.</li>
</ul>
<ul>
<li>Skill Engineering: Standardize agent capabilities by creating and maintaining skills.md files and specialized Markdown documentation that define agentic personas and execution boundaries.</li>
</ul>
<ul>
<li>Workflow Training: Train and fine-tune LLMs to function as &#39;helper agents&#39; capable of executing autonomous AI workflows as integral members of the Security Engineering team.</li>
</ul>
<ul>
<li>Infrastructure as Agents: Utilize Cloudflare Workers, Vectorize, and AI Gateway to build serverless, low-latency agentic architectures for real-time traffic analysis and remediation.</li>
</ul>
<ul>
<li>Autonomous Assessment: Build and scale the engine for autonomous vendor security reviews and M&amp;A assessments, transforming qualitative data into quantitative risk insights.</li>
</ul>
<p>Requirements</p>
<ul>
<li>Experience: 4+ years in Information Security or Software Engineering, with at least 1+ years focused on AI Engineering, Agentic AI, or Advanced Automation using Opencode</li>
</ul>
<ul>
<li>AI Expertise: Deep understanding of LLM orchestration, prompt engineering, and building agentic loops (e.g., LangChain, AutoGen, or custom frameworks).</li>
</ul>
<ul>
<li>Agent Development: Proven ability to create agents from structured definitions (skills.md) and automate tasks that follow strict process/algorithmic flows.</li>
</ul>
<ul>
<li>Cloudflare Ecosystem: Expert knowledge of Cloudflare Workers, KV, Durable Objects, and R2. Experience with Cloudflare AI tools is a significant plus.</li>
</ul>
<ul>
<li>Languages: Mastery of Windsurf, Opencode or Rust.</li>
</ul>
<ul>
<li>Security Domain: Strong grasp of Cyber Security fundamentals, including SIEM/SOAR logic, UEBA, and risk assessment frameworks.</li>
</ul>
<p>Preferred Qualifications</p>
<ul>
<li>Experience building custom Agentic AI solutions that have replaced enterprise-grade 3rd party security software.</li>
</ul>
<ul>
<li>Background in M&amp;A Security Due Diligence or Vendor Risk Management automation.</li>
</ul>
<ul>
<li>Prior experience building edge-based security products or AI-driven log-push integrations.</li>
</ul>
<ul>
<li>Certifications: CISSP or specialized AI/Machine Learning certifications.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>LLM orchestration, prompt engineering, agentic loops, Cloudflare Workers, KV, Durable Objects, R2, Windsurf, Opencode, Rust, SIEM/SOAR logic, UEBA, risk assessment frameworks, custom Agentic AI solutions, M&amp;A Security Due Diligence, Vendor Risk Management automation, edge-based security products, AI-driven log-push integrations, CISSP, specialized AI/Machine Learning certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Cloudflare</Employername>
      <Employerlogo>https://logos.yubhub.co/cloudflare.com.png</Employerlogo>
      <Employerdescription>Cloudflare runs one of the world&apos;s largest networks powering millions of websites and other Internet properties.</Employerdescription>
      <Employerwebsite>https://www.cloudflare.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/cloudflare/jobs/7667832</Applyto>
      <Location>In-Office</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>815dc8e7-6b9</externalid>
      <Title>Technical Program Manager II</Title>
      <Description><![CDATA[<p>At Coinbase, we&#39;re on a mission to increase economic freedom in the world. We&#39;re seeking a Technical Program Manager II to join our Security &amp; Privacy department. As a Technical Program Manager II, you will work with the Security organization to build and drive meaningful business and security outcomes through complex programs while empowering our engineering/product teams to act as owners of security risk.</p>
<p>The Security team&#39;s goal is to identify, measure, manage, mitigate, and report risk associated with products to keep our customer&#39;s funds and data safe. You will collaborate with program sponsors and cross-functional Security partners to identify, document, and objectively assess opportunities, challenges, and risks across traditional and novel Security domains using qualitative and quantitative factors, including KRIs and KPIs.</p>
<p>You will serve as the Directly Responsible Individual (DRI) for key security initiatives or workstreams when required, owning outcomes and driving decision-making to keep programs moving forward. You will create program strategies and artifacts, including proposals, prioritization frameworks, roadmaps, dependency maps, and risk registers, to drive initiatives that incrementally increase program maturity over time.</p>
<p>You will partner with Product, Engineering, and Security teams to influence adoption of critical initiatives, navigate technical dependencies, and support the Software Development Lifecycle (SDLC) as part of product and feature launches. You will concurrently manage multiple critical projects end-to-end: establishing milestones and timelines, managing cross-functional workstreams and dependencies, holding teams accountable for deliverable quality, and clearly communicating the impact of delays on project timelines and security risk posture.</p>
<p>You will provide program status to Security leadership while ensuring transparency on key metrics, program effectiveness, strategic direction, and changes. You will conduct regular data analysis on security control performance to identify trends, anomalies, and areas for improvement, leveraging BI tools to drive data-informed decisions.</p>
<p>You will drive process improvement and scaling initiatives within security programs by leveraging AI tools, automation, and retrospectives to optimize workflows, reduce manual toil, and achieve outcomes efficiently. You will author Objectives and Key Results (OKRs) to focus teams on the right short-term and long-term goals, and manage change across complex multi-quarter programs.</p>
<p>You will rapidly identify and escalate risks to enable proactive collaboration and timely resolution.</p>
<p>We&#39;re looking for a Technical Program Manager II with a strong understanding and proven experience of formal program management methodologies, working knowledge of and experience in cyber/security domain, fluency in leveraging AI in daily workflows to enhance efficiency, drive process improvements, and deliver high-quality, business-ready outputs.</p>
<p>You should have exceptional skills in time management, facilitation, communication, and organization, ability to translate complex concepts simply for varied audiences, experience managing cross-functional teams and stakeholders, and comfortable navigating ambiguity and operating in environments where processes and paved roads may not yet exist.</p>
<p>Nice to haves include professional certification such as PMP, CISSP and CISA, working knowledge of and experience in the technology and/or financial technology industry, experience working across all the three lines of defense (3LOD), and advanced understanding of Generative AI, Google Workspace, JIRA, Linear, Superset, Looker and SQL.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$167,280-$196,800 USD</Salaryrange>
      <Skills>Formal program management methodologies, Cyber/security domain, AI tools, Automation, Retrospectives, Objectives and Key Results (OKRs), Time management, Facilitation, Communication, Organization, Cross-functional teams, Stakeholders, Ambiguity, Process improvements, Data analysis, BI tools, Security control performance, Risk management, Program management, Project management, Software Development Lifecycle (SDLC), Generative AI, Google Workspace, JIRA, Linear, Superset, Looker, SQL, PMP, CISSP, CISA, Financial technology industry, Three lines of defense (3LOD)</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Coinbase</Employername>
      <Employerlogo>https://logos.yubhub.co/coinbase.com.png</Employerlogo>
      <Employerdescription>Coinbase is a cryptocurrency exchange and wallet service provider. It is one of the largest cryptocurrency exchanges in the world.</Employerdescription>
      <Employerwebsite>https://www.coinbase.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/coinbase/jobs/7595357</Applyto>
      <Location>Remote - USA</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>d33e3000-9c7</externalid>
      <Title>Senior, Tech Risk and AI Automation</Title>
      <Description><![CDATA[<p>We&#39;re seeking a highly motivated and analytical Senior, Tech Risk and AI Automation, to play a pivotal role in building an AI-first internal audit and risk function. This role is the first of its kind and an opportunity for an audit individual with a passion for technology and innovation to drive the future of assurance and risk through AI and automation.</p>
<p>You will be at the forefront of our efforts to build and scale an industry-leading AI assurance program. While your initial focus will be on leveraging agentic AI to transform SOX testing, you&#39;ll have opportunities to impact cross-functional areas including security, platform regulatory risks and non-financial metrics.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Architect and scale our SOX compliance program by designing, developing, and maintaining AI-driven testing that enhances accuracy, provides real-time insights, and reduces manual overhead.</li>
<li>Spearhead the testing of internal controls using agentic AI systems to identify and mitigate potential threats.</li>
<li>Partner closely with Engineering, IT, and business teams to integrate our AI automation with internal systems, enabling end-to-end automated assurance workflows.</li>
<li>Serve as a subject matter expert and champion for the use of AI and automation in risk management.</li>
<li>Contribute to a culture of innovation and excellence within the Risk Advisory and Assurance team.</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>2 to 4 years of experience in a Big 4 accounting firm, internal audit, and/or compliance function with a demonstrated passion for technology and automation.</li>
<li>Subject matter expertise in SOX and/or security compliance testing in the technology industry, preferably platform companies.</li>
<li>Self-motivated, results-oriented technology-first thinker with a proactive and creative approach to problem-solving.</li>
<li>Collaborator with a strong work ethic and enthusiasm for learning, who thrives in a fast-paced, dynamic environment.</li>
</ul>
<p>Preferred qualifications include:</p>
<ul>
<li>Professional certifications such as CISA, CPA, CIA, and/or CISSP.</li>
<li>Hands-on experience leveraging AI tools and prompting.</li>
<li>Familiarity with programming languages such as SQL and Python.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SOX compliance, agentic AI, internal controls, risk management, AI-driven testing, automated assurance workflows, CISA, CPA, CIA, CISSP, AI tools, prompting, SQL, Python</Skills>
      <Category>Finance</Category>
      <Industry>Technology</Industry>
      <Employername>Reddit</Employername>
      <Employerlogo>https://logos.yubhub.co/redditinc.com.png</Employerlogo>
      <Employerdescription>Reddit is a community-driven platform with over 100,000 active communities and 121 million daily active unique visitors.</Employerdescription>
      <Employerwebsite>https://www.redditinc.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/reddit/jobs/7758354</Applyto>
      <Location>Remote - British Columbia, Canada</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>87f95105-71a</externalid>
      <Title>Senior Technical Account Manager, Okta Strategic Customers</Title>
      <Description><![CDATA[<p>Secure Every Identity</p>
<p>As a Senior Technical Account Manager, you will play a critical role in securing every identity, from AI to human identity. You will focus on strategic account alignment and broad deployment strategies to drive lasting success through elevated technical maturity.</p>
<p>Key Workforce Identity Solutions You Will Support: The Okta Platform secures employees, contractors, and partners across every part of the Identity lifecycle, including governance, access, and privileged controls. Products include:</p>
<ul>
<li>Identity &amp; Access Management (IAM): Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, and Universal Directory.</li>
<li>Identity Governance &amp; Administration (IGA): Lifecycle Management and Identity Governance.</li>
<li>Privileged Access Management (PAM): Privileged Access.</li>
<li>Identity Threat Detection &amp; Response (ITDR): Identity Security Posture Management and Identity Threat Protection.</li>
</ul>
<p>Strategic Customer Partnership &amp; Influence:</p>
<ul>
<li>Build deep, long-lasting relationships with customers as their go-to technical advisor.</li>
<li>Earn Okta trusted advisor status with customer identity owners and technical leadership, known as the primary point of contact for technical leaders.</li>
<li>Possess and masterfully apply comprehensive technical expertise to solve complex problems, design sophisticated solutions, and influence customer strategies.</li>
<li>Collaborate with customers to design identity strategies aligned with their business objectives.</li>
<li>Leverage tailored technical plans for success with a portfolio of customers of increasing size and complexity.</li>
<li>Help find ways to build upon and expand customers&#39; adoption of the Okta footprint through additional use cases and increasing security posture.</li>
<li>Use knowledge of how Okta&#39;s product differentiators lead to positive outcomes for customers, securing the Okta footprint against competitive displacement.</li>
</ul>
<p>Complex Problem Resolution &amp; Advocacy:</p>
<ul>
<li>Demonstrate advanced problem-solving skills, capable of dissecting complex, multi-faceted problems and orchestrating effective solutions.</li>
<li>Proactively identify risks and create mitigation plans, establishing actions, ownership, and driving resolutions.</li>
<li>Able to handle most customer technical escalations independently, or collaboratively with the Customer Success Manager (CSM).</li>
<li>Manage competing priorities with little impact on delivery, ensuring follow through on all activity.</li>
<li>Demonstrate a strong ability to represent and advocate for the customer with cross-functional teams (including engineering and support), while supporting policies and decisions that are in the best interests of the company.</li>
<li>Facilitate difficult discussions with senior stakeholders.</li>
</ul>
<p>Thought Leadership &amp; Team Enablement:</p>
<ul>
<li>Serve as a thought leader, providing best practices, workshops, and training.</li>
<li>Generate specific vertical/use case insights and thought leadership, demonstrating an advanced level of Okta platform and identity domain knowledge, with a focus on enhancing customers&#39; security posture.</li>
<li>Generate higher value for customers and deeper TAM engagement through repeatable asset and strategy creation for the team.</li>
<li>Mentor peers and colleagues, upskilling capability with a focus on technical development.</li>
<li>Contribute to the development of adoption and retention strategies, sharing knowledge of customer patterns, and leading execution.</li>
<li>Lead project tasks or initiatives aimed at improvement of TAM processes and knowledge.</li>
</ul>
<p>What You&#39;ll Bring to the Role</p>
<ul>
<li>Requires 8+ years of related experience in a professional role, or equivalent experience (e.g., 6+ years with a Master’s degree).</li>
<li>3+ years of experience as a Technical Account Manager (TAM) or a comparable role such as Technical Consultant, Product Management, or Solution Architect.</li>
<li>3+ years in identity and access management, including SSO, MFA, lifecycle management, or security best practices.</li>
<li>Education: BA/BS/MS in Computer Science, Information Technology or related discipline, or equivalent work experience required.</li>
<li>Certifications: Okta Certified, CISSP, or equivalent</li>
</ul>
<p>Technical Mastery (Workforce Identity Focus):</p>
<ul>
<li>Extensive proficiency utilizing Okta feature sets and platforms to portray a design, or architecture, that satisfies well-known customer use cases to a customer technical persona including architect.</li>
<li>Able to modify existing quickstart or code samples to adapt them to the customer&#39;s requirements.</li>
<li>Confident in assisting TAM peers on technical challenges, or on behalf of other TAMs customers.</li>
<li>Solid understanding of one or more of the following key areas:</li>
<li>Technologies and protocols to support identity federation and robust access control models (e.g., SAML 2.0, WS-Federation, OAuth, OpenID Connect).</li>
<li>Experience dealing with legacy applications in a hybrid IT environment with non-standard applications (i.e., those that do not support modern identity federation protocols).</li>
<li>SaaS deployment such as Salesforce, Box, Office 365, Workday, and HR as master for identities.</li>
<li>Lifecycle management scenarios to 3rd party systems and applications (Workflows, HR-driven provisioning, MSFT integrations, SCIM, etc).</li>
<li>Enterprise applications in the ecosystem to provide identity and attributes to applications or to harness an external application to help drive business processes (ITSM, HR, etc).</li>
<li>Security and performance monitoring and 3rd party signals integrations (SEIM, MDM, WAF, etc).</li>
<li>Awareness of augmentation of identity protocols and flows, capable of identifying augmentation that requires additional review.</li>
</ul>
<p>Communication and Leadership Skills:</p>
<ul>
<li>Excellent communication skills, capable of translating complex technical to</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Identity &amp; Access Management (IAM), Single Sign-On (SSO), Adaptive MFA, Device Access, API Access Management, Secure Partner Access, Access Gateway, Universal Directory, Identity Governance &amp; Administration (IGA), Lifecycle Management, Identity Governance, Privileged Access Management (PAM), Privileged Access, Identity Threat Detection &amp; Response (ITDR), Identity Security Posture Management, Identity Threat Protection, Technical Account Management (TAM), Technical Consultant, Product Management, Solution Architect, Identity and Access Management, SSO, MFA, Security Best Practices, Okta Certified, CISSP, SAML 2.0, WS-Federation, OAuth, OpenID Connect, Legacy Applications, Hybrid IT Environment, Non-Standard Applications, SaaS Deployment, Salesforce, Box, Office 365, Workday, HR, Lifecycle Management Scenarios, Third Party Systems, Applications, Workflows, HR-Driven Provisioning, MSFT Integrations, SCIM, Enterprise Applications, Identity and Attributes, Business Processes, ITSM, Security and Performance Monitoring, Third Party Signals Integrations, SEIM, MDM, WAF, Augmentation of Identity Protocols, Flows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta is a leading provider of identity management and security solutions, serving two-thirds of the Fortune 100 and over 40% of the Forbes Global 2000.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7331319</Applyto>
      <Location>Arizona; Bellevue, Washington; Colorado; Los Angeles, California; Nevada; Oregon; San Francisco, California; Seattle, Washington</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>64f52bdf-ba7</externalid>
      <Title>Services Presales Senior Consultant</Title>
      <Description><![CDATA[<p>We are looking for a Services Presales Senior Consultant to join our team. As a Services Presales Senior Consultant, you will be responsible for leading the pre-sales discovery of functional and technical requirements required to establish an Identity platform for our customers. You will work with Partners, Customers and Engagement Managers to document and mitigate technical risk identified during discovery.</p>
<p>Support creation of services estimates to implement the proposed solution. Review services estimates to ensure project scope can be successfully delivered as outlined - technical risk is appropriately mitigated and timelines follow staffing guidelines. Develop co-delivery proposals by identifying and engaging appropriate partners. Drive New Product Introduction (NPI) across PS by training Engagement Managers and developing associated assets such as scope modules, SKUs, success stories and enablement toolkits.</p>
<p>Minimum REQUIRED Knowledge, Skills, and Abilities:</p>
<ul>
<li>5+ years of overall IT / software development experience, solution design and technical architecture experience</li>
<li>2+ years of Okta implementation experience</li>
<li>3+ years of consulting experience</li>
<li>3+ years driving application architecture design</li>
<li>3+ years of experience with (IAM) architectures</li>
<li>Experience with employee and customer identity use cases: HR driven identity, Active Directory, SSO, SaaS application integrations.</li>
<li>Experience with Identity Governance and Privileged Access Management use cases.</li>
<li>Demonstrated ability to work and interact with high-level customer executives and technical resources.</li>
<li>Experience in supporting discovery workshops to derive customer requirements and specifications.</li>
<li>Experience in developing functional specifications and system design specifications for customer engagements.</li>
<li>Strong knowledge of Security Architecture, Design and Operations, LDAP, Active Directory, SSO, SAML, OIDC, RBAC, OAuth, JSON, REST.</li>
<li>Experience integrating with a multitude of On-Prem and SaaS based products.</li>
<li>Exhibits confidence and a deep understanding of emerging industry practices when solving business problems.</li>
<li>Identifies critical issues with ease.</li>
<li>Effectively communicates technical information to non-technical audiences.</li>
<li>Manages customer expectations effectively.</li>
<li>Application design experience.</li>
<li>Clear and Dynamic Communication.</li>
<li>Ability to travel up to 50%</li>
</ul>
<p>Highly Desirable Knowledge, Skills, and Abilities:</p>
<ul>
<li>Knowledge of software development security and cryptography.</li>
<li>Familiarity with IAM solution providers.</li>
<li>Experience with API Gateways, CASB, and Reverse Proxies (NGINX)</li>
<li>Proficiency with various open-source software and development tools</li>
<li>Proficiency in one or more of the following: .Net, Ruby, Java, Python or Perl</li>
</ul>
<p>Education and Certification:</p>
<ul>
<li>A Bachelor’s degree (or equivalent) in Computer Science, Information Technology or related discipline required.</li>
<li>Okta Certified Technical Architect or a combination of Okta Certified Consultant and Okta Certified Developer is a plus.</li>
<li>CISSP certification is a plus.</li>
<li>TOGAF certification is a plus.</li>
</ul>
<p>OTE range for this position for candidates located in the San Francisco Bay area is between $176,000-$242,000 USD. Below is the annual On Target Compensation (OTE) range for candidates located in California (excluding San Francisco Bay Area), Colorado, Illinois, New York and Washington. Your actual OTE, which is inclusive of base salary and incentive compensation, will depend on factors such as your skills, qualifications, experience, and work location. In addition, Okta offers equity (where applicable) and benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange>$157,000-$215,000 USD</Salaryrange>
      <Skills>IT / software development experience, solution design and technical architecture experience, Okta implementation experience, consulting experience, application architecture design, IAM architectures, employee and customer identity use cases, Identity Governance and Privileged Access Management use cases, Security Architecture, Design and Operations, LDAP, Active Directory, SSO, SAML, OIDC, RBAC, OAuth, JSON, REST, API Gateways, CASB, Reverse Proxies, open-source software and development tools, software development security and cryptography, .Net, Ruby, Java, Python, Perl, Okta Certified Technical Architect, Okta Certified Consultant, Okta Certified Developer, CISSP certification, TOGAF certification</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta is a company that provides identity and access management solutions.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7599811</Applyto>
      <Location>Bellevue, Washington; Los Angeles, California; Oregon; San Francisco, California; Seattle, Washington</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>3ad8987a-19b</externalid>
      <Title>Staff Compliance Analyst - Federal</Title>
      <Description><![CDATA[<p>We are looking for a Staff Federal Security Compliance Analyst to join our Federal Security and Compliance team. As a Staff Federal Security Compliance Analyst, you will serve as a lead of our compliance strategy, safeguarding and strengthening our position as a leading IDaaS provider for the public sector. Your mission is to bridge the gap between engineering, product, and federal regulatory bodies, driving the maintenance of our FedRAMP and DoD authorizations, leading complex audits, and mentoring junior analysts to ensure a security-first culture.</p>
<p>The responsibilities listed below represent the core functions of this role:</p>
<ul>
<li>Strategic Audit Leadership: Lead end-to-end FedRAMP and DoD audits, serving as the primary point of contact for external 3PAOs and government agencies.</li>
<li>Continuous Monitoring Strategy: Oversee and evolve the continuous monitoring (ConMon) program. Design sophisticated reporting mechanisms for vulnerability management and risk posture for executive leadership.</li>
<li>Engineering Advisory: Act as a senior consultant to Engineering and Product teams, translating complex NIST 800-53 requirements into actionable technical specifications for cloud-native environments.</li>
<li>Impact Assessment &amp; Risk Management: Lead the assessment of high-impact changes to federal systems. Ensure that system evolutions maintain a rigorous security posture without sacrificing innovation.</li>
<li>Cross-Functional Alignment: Drive synchronization between GRC, Security, Marketing, Sales, Engineering, and Product to ensure federal requirements are integrated into the broader corporate roadmap.</li>
<li>Programmatic Gap Analysis: Proactively identify and lead initiatives to close gaps between current capabilities and future regulatory requirements (e.g., emerging NIST standards, new DoD mandates, or IL6 requirements).</li>
<li>Evidence Automation &amp; FedRAMP 20x Readiness: Drive the build-out and support of automated evidence collection and control validation. Lead the transition toward &quot;FedRAMP 2.0&quot; standards (including OSCAL integration), defining and monitoring Key Security Indicators (KSIs) to provide real-time compliance visibility.</li>
</ul>
<p>Minimum Required Knowledge, Skills, and Abilities:</p>
<ul>
<li>Education: Bachelor’s degree in Computer Science, MIS, Cybersecurity, or a related technical field.</li>
<li>Experience: 7+ years of experience in security compliance, with at least 4-5 years specifically focused on the FedRAMP/NIST 800-53 framework.</li>
<li>Automation &amp; Compliance Engineering: Demonstrated experience with automation tools or scripting (e.g., Python, Go, or SQL) for automated evidence collection. Familiarity with API-based control validation and OSCAL-based tooling (e.g., Trestle, LULA, or similar GRC automation frameworks).</li>
<li>Technical Depth: Deep understanding of cloud-native infrastructure (IaaS, PaaS, SaaS) and how infrastructure components (networking, OS, databases) support a distributed cloud application.</li>
<li>Framework Mastery: Expert-level knowledge of NIST SP 800-53, FedRAMP High/Moderate, and DoD SRG (IL4, IL5, and familiarity with IL6).</li>
<li>Operational Knowledge: Proven experience with access management, CI/CD pipelines, disaster recovery, and encryption/key management in a cloud context.</li>
<li>Analytical Leadership: Ability to analyze complex &quot;edge-case&quot; security scenarios and provide remediation paths that align with both business goals and regulatory requirements.</li>
<li>Communication: Exceptional presentation skills with the ability to explain technical compliance risks to non-technical executive stakeholders.</li>
</ul>
<p>Preferred Certifications &amp; Skills:</p>
<ul>
<li>Advanced Certifications: CISSP (highly preferred), CISA, or CCSK.</li>
<li>Cloud Expertise: AWS Certified Solutions Architect or Cloud Practitioner.</li>
<li>Tooling: Expert-level proficiency with JIRA, ServiceNow, and Okta.</li>
<li>Technical Background: Prior experience in a DevOps, Security Engineering, or Systems Administration role is a significant plus.</li>
</ul>
<p>Additional requirements:</p>
<ul>
<li>This position requires the ability to access federal environments and/or have access to protected federal data. As a condition of employment for this position, the successful candidate must be able to submit documentation establishing U.S. Person status (e.g. a U.S. Citizen, National, Lawful Permanent Resident, Refugee, or Asylee. 22 CFR 120.15) upon hire.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$161,000-$221,000 USD</Salaryrange>
      <Skills>Automation &amp; Compliance Engineering, Cloud-native infrastructure, API-based control validation, OSCAL-based tooling, NIST SP 800-53, FedRAMP High/Moderate, DoD SRG (IL4, IL5), Access management, CI/CD pipelines, Disaster recovery, Encryption/key management, CISSP, CISA, CCSK, AWS Certified Solutions Architect, Cloud Practitioner, JIRA, ServiceNow, Okta</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Okta</Employername>
      <Employerlogo>https://logos.yubhub.co/okta.com.png</Employerlogo>
      <Employerdescription>Okta is a cloud-based identity and access management company that provides solutions for Identity-as-a-Service (IDaaS) providers.</Employerdescription>
      <Employerwebsite>https://www.okta.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/okta/jobs/7571077</Applyto>
      <Location>Washington, DC</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>bdf949b3-c66</externalid>
      <Title>Databricks Enterprise Lead Security Architect -   Principal IT Software Engineer</Title>
      <Description><![CDATA[<p>We are seeking a highly skilled Lead Security Architect to join our team within Databricks IT. As a Lead Security Architect, you will be responsible for designing and implementing a secure and scalable architecture to protect our corporate assets. You will focus on key areas of IT security, including Identity and Access Management, Zero Trust architecture, and endpoint security, while also working to secure critical business applications and sensitive data.</p>
<p>Your expertise will be crucial in building proactive security strategies that align with our business goals and protect the company from an ever-evolving threat landscape. This position demands deep expertise in security principles and a comprehensive understanding of the entire infrastructure stack and IAM systems to design robust, future-ready security solutions.</p>
<p>You will be instrumental in safeguarding our systems&#39; resilience and integrity against ever-evolving cyber threats. You will play a critical role in shaping our security strategy for modern platforms across AWS, Azure, GCP, network infrastructure, storage, and SaaS solutions, help establish a strong least privilege (PoLP) model, providing specialized IAM expertise, and securely supporting SaaS with sensitive information (NHI).</p>
<p>You will also be a key contributor in building our internal strategy for secure AI development. Additionally, you will support the secure integration of SaaS platforms such as Google Workspace, collaboration tools, and GTM systems, maintaining alignment with enterprise security standards.</p>
<p>Close collaboration with cross-functional teams is essential to embed security throughout the technology stack.</p>
<p>The impact you will have:</p>
<ul>
<li>Design and implement secure, scalable reference architectures for the Databricks IT across Cloud Infra (Compute, DBs, Network, Storage), SaaS, Custom Built Applications, Data &amp; AI systems.</li>
<li>Establish and enforce security controls for: Core Security Areas: - Databricks Workspace Management: Workspace isolation, Unity Catalog for data governance.</li>
<li>Secure Networking: VPC configs, PrivateLink, IP Allow Lists.</li>
<li>Identity and Access Management (IAM): SSO, SCIM user provisioning, RBAC via Un, Strong MFA best practices for enterprise identities and customers.</li>
<li>Data Encryption: At rest and in transit, customer-managed keys for critical assets.</li>
<li>Data Exfiltration Prevention: Admin console settings, VPC endpoint controls.</li>
<li>Cluster Security: User isolation, compliance with enhanced security monitoring/Compliance Security Profiles (HIPAA, PCI-DSS, FedRAMP).</li>
<li>Offensive Security: Test and challenge the effectiveness of the organization’s security defenses by mimicking the tactics, techniques, and procedures used by actual attackers.</li>
<li>Specialized Security Functions: - Non-human Identity Management: Design and implement secure authentication and authorization for automated systems (service accounts, API keys, machine identities), focusing on automation and integration with existing identity management systems.</li>
<li>IAM Best Practices: Develop and document comprehensive Identity and Access Management policies, including user provisioning, de-provisioning, access reviews, privileged access management, and multi-factor authentication, ensuring security and compliance.</li>
<li>Data Loss Prevention (DLP): Implement DLP solutions to identify, monitor, and protect sensitive data across endpoints, networks, and cloud environments, preventing unauthorized access, use, or transmission.</li>
<li>SaaS Proxy Design and Implementation: Design and implement cloud-based proxies for SaaS applications (SASE solutions) to provide secure access, enforce security policies, monitor user activity, and protect against threats.</li>
<li>Cloud Infrastructure Best Practices: Establish and document best practices for VPC configurations, cloud networking, and infrastructure as code using Terraform, ensuring secure network segmentation, routing, firewalls, and VPNs for consistent, automated, and secure deployments.</li>
<li>Least Privilege Access for Data Security: Design and implement data security controls based on the principle of least privilege, ensuring users and systems have only the minimum necessary access through fine-grained controls, data classification, and regular access reviews.</li>
<li>Guide internal IT on Databricks’ security and compliance certifications (SOC 2, ISO 27001/27017/27018, HIPAA, PCI-DSS, FedRAMP), and support security reviews/audits.</li>
<li>Support incident response, vulnerability management, threat modeling, and red teaming using audit logs, cluster policies, and enhanced monitoring.</li>
<li>Stay current on industry trends and emerging threats in GenAI, AI Agentic flow, MCPs to enhance security posture.</li>
<li>Advise executive leadership on security architecture, risks, and mitigation.</li>
<li>Mentor security engineers and developers on secure design and best practices.</li>
</ul>
<p>What we look for:</p>
<ul>
<li>Bachelor’s degree in Computer Science, Information Security, Engineering, or a related field</li>
<li>Master’s degree in Computer Science specifically in Information Security or a related discipline is strongly preferred</li>
<li>Minimum 12 years in cybersecurity, with 5+ in security architecture or senior technical roles.</li>
<li>Experience in FedRAMP High systems/ GovCloud preferred.</li>
<li>Must have direct experience designing and securing enterprise platforms in complex multi-cloud environments, deep knowledge of enterprise architecture and security features (control plane/data plane separation, network infra, workspace hardening, network segmentation/ isolation), and hands-on experience automating security controls with Terraform and scripting.</li>
<li>Proven expertise securing data analytics pipelines, SaaS integrations, and workload isolation in enterprise ecosystems.</li>
<li>Experience with Enterprise Security Analysis Tools and monitoring/security policy optimization.</li>
<li>Deep experience in threat modeling, design, PoC, and implementing large-scale enterprise solutions.</li>
<li>Extensive hands-on experience in AWS cloud security, network security, with knowledge of Zero Trust, Data Protection, and Appsec.</li>
<li>Strong understanding of enterprise IAM systems (Okta, SailPoint, VDI, Entra ID) and Data Protection.</li>
<li>Expert experience with SIEM platforms, XDR, and cloud-native threat detection tools.</li>
<li>Expert in web application security, OWASP, API security, and secure design and testing.</li>
<li>Hands-on experience with security automation is required, with proficiency in AI-assisted development, Python, Cursor, Lambda, Terraform, or comparable scripting/IaC tools for operational efficiency.</li>
<li>Industry certifications like CISSP, CCSP, CEH, AWS Certified Security – Specialty, AWS Certified Solutions Architect – Professional, or AWS Certified Advanced Networking – Specialty (or equivalent) are preferred.</li>
<li>Ability to influence stakeholders and drive alignment.</li>
<li>Strategic thinker with a passion for security innovation, continuous improvement, and building scalable defenses.</li>
</ul>
<p>Pay Range Transparency</p>
<p>Databricks is committed to fair and equitable compensation practices. The pay range(s) for this role is listed below and represents the expected salary range for non-commissionable roles or on-target earnings for commissionable roles. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to job-related skills, depth of experience, relevant certifications and training, and specific work location. Based on the factors above, Databricks anticipates utilizing the full width of the range. The total compensation package for this position may also include eligibility for annual performance bonus, equity, and the benefits listed above.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Architecture, Identity and Access Management, Zero Trust, Endpoint Security, Data Encryption, Data Exfiltration Prevention, Cluster Security, Offensive Security, Non-human Identity Management, IAM Best Practices, Data Loss Prevention, SaaS Proxy Design and Implementation, Cloud Infrastructure Best Practices, Least Privilege Access for Data Security, Guide internal IT on Databricks’ security and compliance certifications, Support incident response, vulnerability management, threat modeling, and red teaming, Stay current on industry trends and emerging threats in GenAI, AI Agentic flow, MCPs, Advise executive leadership on security architecture, risks, and mitigation, Mentor security engineers and developers on secure design and best practices, Terraform, Python, Cursor, Lambda, AWS cloud security, Network security, Data Protection, Appsec, SIEM platforms, XDR, cloud-native threat detection tools, Web application security, OWASP, API security, Secure design and testing, AI-assisted development, Security automation, Scripting/IaC tools, CISSP, CCSP, CEH, AWS Certified Security – Specialty, AWS Certified Solutions Architect – Professional, AWS Certified Advanced Networking – Specialty</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Databricks</Employername>
      <Employerlogo>https://logos.yubhub.co/databricks.com.png</Employerlogo>
      <Employerdescription>Databricks is a technology company that provides a cloud-based platform for data analytics and artificial intelligence.</Employerdescription>
      <Employerwebsite>https://databricks.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/databricks/jobs/8207910002</Applyto>
      <Location>Mountain View, California; San Francisco, California</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>22e2b8bb-55b</externalid>
      <Title>Cybersecurity Officer</Title>
      <Description><![CDATA[<p>As the Cybersecurity Officer for Waymark, you will be responsible for advancing our core mission through the development of robust programs encompassing information security. As an organization working with patients and providers to improve health outcomes, it is critical to build and maintain appropriate systems and safeguards designed to protect the integrity and confidentiality of information.</p>
<p>You are technical, a strong operator, and strategic thinker, looking to build, improve, and scale reliable security processes whenever possible. Your leadership of the information security program at Waymark will include all facets of cybersecurity, and the associated user experience of our remote teams, and community-based care workers. You will be responsible for security policy and implementation and operation of technical and administrative safeguards to support those policies. You will use your experience to inform sound judgement to achieve the appropriate management of security risks in a manner consistent with the company’s values. You will use your in-depth knowledge of security in a modern cloud based organization, to identify and address risks to the company, through a combination of hands-on technical contributions and directing and overseeing staff with security responsibilities. You will interact with the broader executive leadership team to communicate evolving needs, matching the security strategy to the size and stage of growth of the company and the information we safeguard.</p>
<p>This is a remote friendly position that can be located anywhere in the United States.</p>
<p><strong>Key Responsibilities &amp; Duties</strong></p>
<ul>
<li>Oversee the internal cybersecurity program, road map, and strategy, which includes developing and implementing procedures and policies designed to protect Waymark communications, systems, and assets from internal and external threats and that safeguards health information.</li>
<li>Oversee and manage Waymark’s MSSP and outsourced IT vendor, including responsibility for security and IT budgets, and IT tools used by Waymark.</li>
<li>Partner with Product, Engineering, Legal, and Compliance leadership to determine risks and deploy risk management processes, supporting Waymark’s secure software development lifecycle and ensuring that our internally developed products and services meet the expectations of our patients, customers and regulators</li>
<li>Own, define and oversee the necessary security operational functions such as Identity Management, Vulnerability Management, Incident Response, Security Awareness, and Vendor Risk Management</li>
<li>Serve as Waymark’s HIPAA Security Officer, ensuring compliance with the HIPAA Security Rule, working closely with the legal team to document, review, maintain, and implement standards, policies, and procedures within security disciplines.</li>
<li>Lead the strategy, implementation, and maintenance of industry-standard security certifications, including SOC2 Type II.</li>
<li>Conduct research, analysis, and correlation across a wide variety of source data to identify and prevent compromise of our networks, host systems, and data.</li>
<li>Track and report on network security to the Waymark executive leadership team</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>$140,000 - $185,000</Salaryrange>
      <Skills>BSCS or equivalent experience in an operational security role, 10+ years of experience in security and/or information assurance roles, and risk management, Knowledge of information security management frameworks, such as NIST cybersecurity framework, Experience and/or ability to learn and apply hands-on skills in a cloud native production environment, Experience implementing cloud security technologies, including encryption, network security, intrusion detection, and could monitoring, Key industry certifications in information security, such as CISSP, CISM and CISA, Experience in a startup of 100 - 500 people, Experience with securing a production SaaS product hosted in AWS, Experience conducting or managing technical audit engagements, or directly responding to auditor inquiries</Skills>
      <Category>IT</Category>
      <Industry>Healthcare</Industry>
      <Employername>Waymark</Employername>
      <Employerlogo>https://logos.yubhub.co/waymark.com.png</Employerlogo>
      <Employerdescription>Waymark is a healthcare provider that works with patients and providers to improve health outcomes. It has a team of healthcare providers, technologists, and builders.</Employerdescription>
      <Employerwebsite>https://www.waymark.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/waymark/jobs/4675847005</Applyto>
      <Location>US - Remote</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>3e81b0c9-340</externalid>
      <Title>Principal IT Security Architect</Title>
      <Description><![CDATA[<p>We are seeking a visionary and experienced security leader to join our team as a Principal IT Security Architect. In this role, you will be responsible for architecting and implementing enterprise-scale Identity and Access Management (IAM) solutions. You will have a deep understanding of regulatory frameworks and be able to translate compliance mandates into actionable security controls. You will also be responsible for designing secure, scalable, and user-centric IAM architectures that enable business agility while protecting digital assets.</p>
<p>As a Principal IT Security Architect, you will develop and maintain the organization&#39;s enterprise IAM architecture, encompassing identity lifecycle management, access control models, and integrations with both cloud and on-premises applications. You will also lead the design and implementation of Synopsys&#39; governance and enforcement layer for AI agents.</p>
<p>You will collaborate closely with IT, security, and business stakeholders to integrate IAM solutions with enterprise systems and support access needs. You will also support incident response activities related to identity and access, including investigation and remediation of security incidents.</p>
<p>The ideal candidate will have a strong analytical, communication, and leadership skills. You will be a strategic thinker with the ability to see the big picture while paying close attention to detail. You will also be an innovative problem solver who thrives on tackling complex security challenges.</p>
<p>In return, you will have the opportunity to work with a high-impact, collaborative IAM and security engineering team at the forefront of Synopsys&#39; digital transformation. You will also have access to a comprehensive range of health, wellness, and financial benefits to cater to your needs.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$163000-$245000</Salaryrange>
      <Skills>Identity and Access Management (IAM), Cloud platforms (Azure, AWS, GCP), Hybrid enterprise environments, DevOps, Automation, Identity-as-code practices, Zero Trust security frameworks, Modern authentication paradigms, CISSP, CISM, CIAM, Microsoft Certified: Identity and Access Administrator, AWS/Azure Security certifications</Skills>
      <Category>IT</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a software company that develops and maintains software used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/austin/principal-it-security-architect/44408/93437232912</Applyto>
      <Location>Austin</Location>
      <Country></Country>
      <Postedate>2026-04-05</Postedate>
    </job>
    <job>
      <externalid>1bdc3caf-792</externalid>
      <Title>Governance, Risk, and Compliance (GRC) SME - Senior Consultant</Title>
      <Description><![CDATA[<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>
<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>
<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>
<p><strong>Key Responsibilities:</strong></p>
<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>
<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>
<p>Direct and lead NIST CSF risk assessments</p>
<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>
<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>
<p><strong>Requirements</strong></p>
<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>
<p>Your security experience must include:</p>
<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>
<p>1-5 years+ in the field of cyber security/infosec.</p>
<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>
<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>
<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>
<p>Your diverse Security experience should include one or some of below:</p>
<p>A good understanding of NIST CSF</p>
<p>A post graduate degree in cyber /information security</p>
<p>Cyber Due Diligence Assessments</p>
<p>Third- Party &amp; Supply chain Cyber Risk Management</p>
<p>Incident Response Plan review</p>
<p>Supporting bids, RFP responses and proposals</p>
<p>Crisis Management Exercises (CMX)</p>
<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>
<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>
<p>Helping the design of Cyber Security Roadmaps</p>
<p>Supporting Post Incident Reviews</p>
<p>Reading and summarising Cyber Threat Intelligence reports</p>
<p>Cyber Security Risk Assessments or Maturity Assessments</p>
<p>Design and/deliver awareness training.</p>
<p>Worked on Identity and Access Management projects.</p>
<p>Worked on Privileged access management projects</p>
<p><strong>Our ideal candidate may have some of the following skills:</strong></p>
<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>
<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>
<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>
<p>Enjoy working with different clients from different industries.</p>
<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>
<p>Be able to build strong and effective business relationships at all levels</p>
<p>Be able to support and oversee staff with less experience in their tasks</p>
<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>
<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>
<p><strong>About your team</strong></p>
<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>
<p><strong>About Infosys Consulting</strong></p>
<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>
<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>
<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>
<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills</Skills>
      <Category>IT</Category>
      <Industry>Consulting</Industry>
      <Employername>Infosys Consulting - Europe</Employername>
      <Employerlogo>https://logos.yubhub.co/view.com.png</Employerlogo>
      <Employerdescription>Infosys Consulting is a globally renowned management consulting firm that works with market leading brands across sectors. Its parent organization, Infosys, is a top-5 powerhouse IT brand.</Employerdescription>
      <Employerwebsite>https://jobs.workable.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe</Applyto>
      <Location></Location>
      <Country></Country>
      <Postedate>2026-03-09</Postedate>
    </job>
    <job>
      <externalid>f56e4b3a-ca5</externalid>
      <Title>Third Party Risk Management (TPRM) Consultant - Principal</Title>
      <Description><![CDATA[<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>
<p>We are seeking an experienced Principal Third Party Risk Management (TPRM) Consultant to lead and shape our Third Party Risk and GRC services within the cyber security consultancy. This is a senior leadership role responsible for driving strategy, managing complex client engagements, and delivering enterprise-scale TPRM and GRC programmes across multiple industries. As a subject matter expert in Third Party Risk Management, Governance, Risk &amp; Compliance (GRC) and vendor risk frameworks, you will design, implement, and operate robust third-party risk management frameworks that align with regulatory, security, and business requirements. You will act as a trusted advisor to clients, lead large transformation initiatives, manage teams, and ensure high-quality delivery of risk, compliance, and assurance services.</p>
<p><strong>Key Responsibilities:</strong></p>
<p>·       <strong>TPRM Proposals &amp; Strategy</strong>: Lead the development of TPRM and GRC proposals, defining scope, delivery models, governance structures, and operating models and design enterprise-level Third Party Risk Management strategies aligned with regulatory, operational, and cyber risk requirements.</p>
<p>·       <strong>Client Engagement Leadership</strong>: Lead and manage complex client engagements in Third Party Risk Management, vendor risk, and GRC and act as engagement lead and trusted advisor for executive stakeholders (CISO, CRO, Risk, Compliance, Procurement, Legal). In addition to that ensure successful delivery of TPRM services including assessments, frameworks, tooling, and operationalisation.</p>
<p>·       <strong>Security Assessment &amp; Audit Leadership</strong>: Lead third-party security assessments, audits, and assurance activities and define assessment methodologies, risk scoring models, control frameworks, and reporting structures as well as oversee supplier due diligence, onboarding risk processes, and continuous monitoring programmes.</p>
<p>·       <strong>Technical &amp; Methodological Authority</strong>: Serve as subject matter expert for TPRM, GRC platforms, and vendor risk methodologies and provide leadership in the use of GRC and TPRM tooling (e.g. OneTrust, Archer, ServiceNow GRC, similar platforms).</p>
<p>·       <strong>Project, Delivery &amp; Programme Leadership</strong>: Act as Project Manager, Delivery Lead, and Programme Lead for large-scale TPRM initiatives and manage multi-stream delivery, dependencies, risks, and stakeholder alignment.</p>
<p>·       <strong>Team Leadership &amp; Management</strong>: Lead, mentor, and develop a team of consultants (up to 5 direct reports) and build high-performing delivery teams and ensure capability development in TPRM and GRC.</p>
<p>·       <strong>Risk &amp; Compliance Management:</strong> Identify, assess, and manage third-party risks across cyber, operational, regulatory, and reputational domains and advise clients on risk treatment strategies, remediation plans, and control improvements.</p>
<p>·       <strong>Continuous Improvement &amp; Innovation</strong>: Drive continuous improvement in TPRM methodologies, delivery models, and service offerings and stay current with regulatory developments, emerging risks, and industry best practices in third-party risk and supply chain security.</p>
<p><strong><strong>Requirements</strong></strong></p>
<p><strong>Essential Skills and Experience:</strong></p>
<p>·       Extensive experience in Third Party Risk Management (TPRM) and Governance, Risk &amp; Compliance (GRC) at enterprise level.</p>
<p>·       Strong background as Security Assessor, Auditor, and Risk Consultant.</p>
<p>·       Proven experience leading TPRM, vendor risk, and supplier assurance programmes.</p>
<p>·       Experience acting as Project Manager, Delivery Lead, and Programme Lead for complex engagements.</p>
<p>·       Hands-on experience with GRC / TPRM platforms, ideally including OneTrust.</p>
<p>·       Ability to design and implement third-party risk frameworks, policies, and governance models.</p>
<p>·       Strong stakeholder management skills at executive and board level.</p>
<p>·       Proven people management experience, including team leadership and mentoring.</p>
<p>·       Ability to balance security, risk, compliance, and business enablement.</p>
<p><strong>Qualifications:</strong></p>
<p>·       Minimum 10 years of experience in cyber security, risk management, GRC, audit, or related domains.</p>
<p>·       CISA (Certified Information Systems Auditor) strongly preferred.</p>
<p>·       Lead Auditor certification (e.g. ISO 27001 Lead Auditor) highly desirable.</p>
<p>·       Additional certifications such as CISM, CRISC, CISSP are an advantage.</p>
<p>·       Experience working across multiple industries (e.g. Financial Services, Healthcare, Critical Infrastructure, Government, Technology).</p>
<p>·       Experience with regulatory-driven environments and compliance-led transformation programmes.</p>
<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please_ _<strong>apply now.</strong>_</p>
<p><strong><strong>Benefits</strong></strong></p>
<p><strong>About Infosys Consulting</strong></p>
<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology.  We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>
<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, <strong>Equity</strong> and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>
<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>
<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal ambitions. Curious to learn more? We’d love to hear from you.... <strong>Apply today!</strong></p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Third Party Risk Management, Governance, Risk &amp; Compliance, Vendor Risk Management, Security Assessment, Audit Leadership, Project Management, Delivery Leadership, Programme Leadership, Team Leadership, Risk Management, Compliance Management, Continuous Improvement, Innovation, OneTrust, Archer, ServiceNow GRC, CISA, Lead Auditor certification, CISM, CRISC, CISSP</Skills>
      <Category>Consulting</Category>
      <Industry>Technology</Industry>
      <Employername>Infosys Consulting - Europe</Employername>
      <Employerlogo>https://logos.yubhub.co/view.com.png</Employerlogo>
      <Employerdescription>Infosys Consulting is a globally renowned management consulting firm that works with market leading brands across sectors. The company is a mid-size player within the scale of Infosys, a top-5 powerhouse IT brand.</Employerdescription>
      <Employerwebsite>https://jobs.workable.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.workable.com/view/3AGuZh2zhvyMa3e9DNdg37/remote-third-party-risk-management-(tprm)-consultant---principal-in-poland-at-infosys-consulting---europe</Applyto>
      <Location></Location>
      <Country></Country>
      <Postedate>2026-03-09</Postedate>
    </job>
    <job>
      <externalid>ce09264c-2d9</externalid>
      <Title>Senior Cybersecurity Engineer</Title>
      <Description><![CDATA[<p>You are a passionate and experienced cybersecurity professional who thrives in fast-paced, global enterprise environments. With over five years of hands-on experience, you bring a deep understanding of enterprise-grade security solutions, including CASB, SSPM, WAF, firewalls, and email security. You have a proven track record in deploying, integrating, and managing network security solutions at scale, with a strong grasp of Zero Trust principles and architectures. Your expertise in CMMC regulations, technical data controls, and export authorization rules enables you to enforce U.S. person–only access restrictions for sensitive systems and datasets.</p>
<p>As a collaborative problem-solver, you are comfortable working across teams—from executives to engineers—to ensure robust security controls and compliance. You excel at conducting security investigations, analyzing complex events and alerts, and developing actionable metrics. Your familiarity with modern security frameworks, such as MITRE ATT&amp;CK and Cyber Kill Chain, empowers you to identify and mitigate threats proactively. You are detail-oriented, organized, and adept at multitasking, thriving in environments that require prioritization and agility.</p>
<p>You are committed to ongoing learning, staying current with emerging security technologies and frameworks. Your experience spans cloud security (AWS, GCP, Azure), offensive security, and incident response. You enjoy participating in audits and assessments, contributing to a culture of continuous improvement. With strong communication skills and an inclusive mindset, you foster trust and collaboration across diverse teams. If you’re ready to make an impact at the forefront of cybersecurity innovation, Synopsys is the place for you.</p>
<p>Design, deploy, and manage enterprise-grade security solutions including CASB, SSPM, WAF, firewalls, and email protection across global environments. Integrate and implement network security solutions, ensuring seamless operation and compliance with Zero Trust security principles. Enforce CMMC regulations, technical data controls, and export authorization rules, including U.S. person-only access restrictions for controlled systems and datasets. Conduct and support external audits, internal reviews, and compliance assessments related to CMMC and other regulatory frameworks. Research, evaluate, pilot, and implement new security solutions at a global enterprise scale, collaborating with vendors and stakeholders. Investigate security events and alerts from multiple log sources, performing end-to-end security investigations, and reporting actionable findings. Develop and manage the collection, reporting, and analysis of security events and metrics to drive continuous improvement. Participate in incident response processes and supporting light on-call pager duty rotations for critical issues.</p>
<p>Strengthen Synopsys’ global security posture by implementing advanced security controls and best practices. Ensure compliance with CMMC and other regulatory frameworks, enabling secure operations for critical projects. Protect sensitive data, intellectual property, and infrastructure against emerging cyber threats. Drive continuous improvement in security operations through data-driven analysis and proactive risk management. Enhance cross-functional collaboration between engineering, compliance, and executive teams to foster a culture of security awareness. Support innovation by enabling secure cloud implementations and supporting offensive security initiatives.</p>
<p>Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field required. 5+ years of hands-on experience with enterprise-grade security solutions (CASB, SSPM, WAF, firewalls, email security). 2+ years of experience installing, integrating, and deploying network security solutions. Solid understanding of Zero Trust security principles and architectures. Deep knowledge of CMMC regulations, technical data controls, and export authorization rules. Experience enforcing U.S. person-only access restrictions for controlled systems and datasets. Experience with external audits, internal reviews, and compliance assessments. Broad experience securing cloud implementations (AWS, GCP, Azure) and offensive security domains. Hands-on experience with Zscaler, Palo Alto Networks, ProofPoint, and other leading security platforms. Relevant certifications (CEH, CISSP, GIAC, OSCP, AWS Certified Advanced Networking, Security+) preferred. US citizenship or Green Card required.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange>$101,000 - $152,000</Salaryrange>
      <Skills>CASB, SSPM, WAF, firewalls, email security, Zero Trust security principles, CMMC regulations, technical data controls, export authorization rules, cloud security, offensive security, incident response, Zscaler, Palo Alto Networks, ProofPoint, AWS, GCP, Azure, CEH, CISSP, GIAC, OSCP, AWS Certified Advanced Networking, Security+</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a leading provider of electronic design automation (EDA) software and intellectual property (IP) used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/austin/senior-cybersecurity-engineer-15063/44408/91625669280</Applyto>
      <Location>Austin, Texas</Location>
      <Country></Country>
      <Postedate>2026-03-09</Postedate>
    </job>
    <job>
      <externalid>f7bc3829-4cd</externalid>
      <Title>IT Auditor, Sr Associate/Staff</Title>
      <Description><![CDATA[<p><strong>Overview</strong></p>
<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>
<p><strong>Job Description</strong></p>
<p>We are seeking a motivated and detail-oriented audit professional with a strong interest in technology, information security, and risk management. You will be responsible for planning and executing IT and/or Information Security audits in accordance with the annual audit plan. You will also perform IT risk assessments to identify key risks and support the development and refinement of the annual IT audit plan.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Planning and executing IT and/or Information Security audits in accordance with the annual audit plan.</li>
<li>Performing IT risk assessments to identify key risks and support the development and refinement of the annual IT audit plan.</li>
<li>Evaluating the design and operating effectiveness of IT General Controls (ITGCs) and, where applicable, IT Application Controls.</li>
<li>Supporting SOX compliance activities, including walkthroughs, control testing, issue identification, and remediation follow-up.</li>
<li>Conducting audits over key systems and platforms, including ERP and cloud-based applications (e.g., SAP and/or Salesforce).</li>
<li>Collaborating with business, IT, and Information Security stakeholders to understand processes, risks, and controls.</li>
<li>Preparing clear, concise audit documentation, reports, and presentations that communicate findings, risks, and recommendations.</li>
<li>Tracking and validating remediation of audit findings and control deficiencies.</li>
<li>Staying current on emerging technology risks, regulatory expectations, and industry best practices related to IT and cybersecurity.</li>
</ul>
<p><strong>Benefits</strong></p>
<p>At Synopsys, innovation is driven by our incredible team around the world. We feel honored to work alongside such talented and passionate individuals who choose to make a difference here every day. We&#39;re proud to provide the comprehensive benefits and rewards that our team truly deserves.</p>
<ul>
<li>Health &amp; Wellness: Comprehensive medical and healthcare plans that work for you and your family.</li>
<li>Time Away: In addition to company holidays, we have ETO and FTO Programs.</li>
<li>Family Support: Maternity and paternity leave, parenting resources, adoption and surrogacy assistance, and more.</li>
<li>ESPP: Purchase Synopsys common stock at a 15% discount, with a 24 month look-back.</li>
<li>Retirement Plans: Save for your future with our retirement plans that vary by region and country.</li>
<li>Compensation: Competitive salaries.</li>
</ul>
<p><strong>Team</strong></p>
<p>You will join a collaborative and forward-thinking Internal Audit team that partners closely with the business and technology functions. The team values quality, integrity, and open communication, and provides opportunities to work across a broad range of systems, processes, and risks. You&#39;ll gain exposure to senior stakeholders, develop your technical and audit expertise, and play a meaningful role in strengthening the organization&#39;s control environment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>IT audit, information security, risk management, SOX compliance, ERP, cloud-based applications, SAP, Salesforce, IT General Controls, IT Application Controls, auditing, risk assessment, control testing, issue identification, remediation follow-up, auditing documentation, reporting, presentation, emerging technology risks, regulatory expectations, industry best practices, CISA, CIA, CISSP, auditing software, risk management software</Skills>
      <Category>Finance</Category>
      <Industry>Technology</Industry>
      <Employername>Synopsys</Employername>
      <Employerlogo>https://logos.yubhub.co/careers.synopsys.com.png</Employerlogo>
      <Employerdescription>Synopsys is a technology company that develops and maintains software used in chip design, verification, and manufacturing.</Employerdescription>
      <Employerwebsite>https://careers.synopsys.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://careers.synopsys.com/job/bengaluru/it-auditor-sr-associate-staff/44408/92463617200</Applyto>
      <Location>Bengaluru</Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
    <job>
      <externalid>f243c658-703</externalid>
      <Title>Senior Cybersecurity Engineer</Title>
      <Description><![CDATA[<p><strong>Why Valvoline Global Operations?</strong></p>
<p>At Valvoline Global Operations, we&#39;re proud to be The Original Motor Oil, but we&#39;ve never rested on being first. Founded in 1866, we introduced the world&#39;s first branded motor oil, staking our claim as a pioneer in the automotive and industrial solutions industry. Today, as an affiliate of Aramco, one of the world&#39;s largest integrated energy and chemicals companies, we are driven by innovation and committed to creating sustainable solutions for a better future.</p>
<p>With a global presence, we develop future-ready products and provide best-in-class services for our partners around the world. For us, originality isn&#39;t just about where we began; it&#39;s about where we&#39;re headed and how we&#39;ll lead the way. We are originality in motion.</p>
<p>Our corporate values—Care, Integrity, Passion, Unity, and Excellence—are at the heart of everything we do. These values define how we operate, how we treat one another, and how we engage with our partners, customers, and the communities we serve. At Valvoline Global, we are united in our commitment to:</p>
<ul>
<li>Treating everyone with care.</li>
<li>Acting with unwavering integrity.</li>
<li>Striving for excellence in all endeavors.</li>
<li>Delivering on our commitments with passion.</li>
<li>Collaborating as one unified team.</li>
</ul>
<p><strong>Job Purpose</strong></p>
<p>The Senior Information Security Engineer leads the design, implementation, and continuous refinement of the organization&#39;s cybersecurity capabilities. This advanced role requires a deep technical expertise in security technologies and a strategic approach to protecting the organization&#39;s information assets. The Senior Engineer is pivotal in conducting complex security assessments, identifying vulnerabilities, and developing robust solutions to enhance the security posture of the organization.</p>
<p>With a strong focus on technical leadership, this individual collaborates closely with the IT department and cybersecurity team to develop secure systems, networks, and applications. Additionally, the Senior Information Security Engineer works hand-in-hand with the IT Governance, Risk Management, and Compliance (GRC) teams to ensure cybersecurity strategies align with organizational policies and regulatory requirements. This involves a strategic partnership to assess risks, manage cybersecurity compliance across systems, and integrate security best practices into GRC frameworks.</p>
<p>The Senior Information Security Engineer is also responsible for researching and integrating new security technologies and best practices into the existing infrastructure to address evolving threats. This role involves critical thinking, problem-solving, and a proactive attitude towards cybersecurity challenges.</p>
<p><strong>How You Make an Impact (Job Accountabilities)</strong></p>
<ol>
<li>Work alongside project leads and IT teams to facilitate a smooth integration of new solutions into the organization&#39;s cyber security framework. Provide support during the implementation phase of cyber security tools, ensuring that deployment tasks are completed timely.</li>
<li>Actively mentor Information Security Engineering team members, sharing insights on best practices and the latest trends in cyber security tool deployment and management. Foster a culture of continuous improvement and innovation within the cyber security team, encouraging the adoption of emerging technologies and methodologies to enhance the organization’s cyber security posture.</li>
<li>Lead the initial configuration of newly implemented tools, applying in-depth knowledge of security standards and operational procedures to create a robust foundation for tool effectiveness. Collaborate with cyber security and IT teams to adjust settings and configurations based on operational feedback and evolving security threats, enhancing the organization&#39;s cyber security posture.</li>
<li>Provide strategic oversight for the monitoring and management of cyber security tools and systems, ensuring they operate at peak efficiency and are fully aligned with the organization’s cyber security strategies.</li>
<li>Act as an escalation point for operational issues in cyber security tools and systems, providing specialized knowledge to resolve more complex problems. Leverage external support resources and serve as the primary point of contact for troubleshooting issues.</li>
<li>Participate in the assessment of new cyber security tools, focusing on evaluating their potential operational impact and alignment with the organization’s security needs. Aid in the selection process by contributing insights on tool effectiveness and compatibility with existing systems.</li>
</ol>
<p><strong>What You Bring to the Role (Job Qualifications / Education / Skills / Requirements / Capabilities)</strong></p>
<p><strong>Education</strong></p>
<ul>
<li>Bachelor&#39;s degree in information systems, engineering, management, or related field, or equivalent work experience.</li>
</ul>
<p><strong>Work Experience</strong></p>
<ul>
<li>5+ years of experience in information technology or information security</li>
<li>Industry certifications such as CISSP, CISM, CCSP, GIAC (GSEC, GCED, GCIA, etc.)</li>
<li>Vendor-specific certifications (Netskope, Palo Alto, Zscaler, Microsoft purview, Code42 etc.)</li>
</ul>
<p><strong>Competencies Desired</strong></p>
<ul>
<li>Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.</li>
<li>Technical proficiency with security-related systems and applications.</li>
<li>Experience in developing, documenting and maintaining security procedures.</li>
<li>Strong knowledge of TCP/IP and network administration/protocols, zero trust principles.</li>
<li>Hands-on experience with AWS/Azure/GCP security controls</li>
<li>Proficient knowledge in scripting (Like Python, PowerShell)</li>
<li>Experience performing security reviews for new systems</li>
<li>Strong analytical and problem-solving skills to enable effective security incident and problem resolution.</li>
<li>Excellent documentation skills.</li>
<li>Proven ability to work under stress in emergencies, with the flexibility to handle multiple high-pressure situations simultaneously.</li>
<li>Ability to work well under minimal supervision.</li>
<li>Strong team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including vendors and IT-business personnel.</li>
<li>Strong written and verbal communication skills.</li>
<li>Strong customer/client focus, with the ability to manage expectations appropriately, provide a superior customer/client experience and build long-term relationships.</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>CISSP, CISM, CCSP, GIAC, Netskope, Palo Alto, Zscaler, Microsoft purview, Code42, TCP/IP, Network administration/protocols, Zero trust principles, AWS/Azure/GCP security controls, Python, PowerShell, Security reviews for new systems, Analytical and problem-solving skills, Documentation skills, Team-oriented interpersonal skills, Written and verbal communication skills, Customer/client focus</Skills>
      <Category>Engineering</Category>
      <Industry>Automotive</Industry>
      <Employername>Valvoline Global Operations</Employername>
      <Employerlogo>https://logos.yubhub.co/jobs.valvolineglobal.com.png</Employerlogo>
      <Employerdescription>Valvoline Global Operations is a global company that develops future-ready products and provides best-in-class services for the automotive and industrial solutions industry.</Employerdescription>
      <Employerwebsite>https://jobs.valvolineglobal.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.valvolineglobal.com/job/Senior-Cybersecurity-Engineer/1370226000/</Applyto>
      <Location></Location>
      <Country></Country>
      <Postedate>2026-03-08</Postedate>
    </job>
  </jobs>
</source>