{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/nist-csf"},"x-facet":{"type":"skill","slug":"nist-csf","display":"Nist Csf","count":7},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_6964b8e4-caf"},"title":"Cybersecurity Engineer","description":"<p>Job Title: Cybersecurity Engineer</p>\n<p>Introduction to role</p>\n<p>Cybersecurity sits at the heart of our IT strategy. As we move towards ambitious objectives, we are looking for individuals who focus on innovation to maintain a sustainable risk position against an evolving threat landscape, who recognise that adversaries may include organised crime syndicates or state-sponsored attackers, and who understand attackers&#39; motivations and ways of working.</p>\n<p>In this role, you will operate within AstraZeneca&#39;s global cybersecurity organisation, collaborating with and influencing multiple functions across China, India, Mexico, Sweden, the US and the UK. Ready to help defend a global enterprise where technology directly supports life-changing medicines?</p>\n<p>Accountabilities</p>\n<p>In this role, you will engineer cybersecurity solutions across cloud, on-premises and third-party collaboration environments, with a predominant focus on cloud and data. You will collaborate with other teams to perform, assess and evolve IT processes that intersect our cybersecurity priorities, ensuring security is embedded into how work gets done. You will map governance and compliance frameworks and their controls to technical implementation, shifting hardening processes as far left as possible in the lifecycle. You will leverage deep understanding of threats, weaknesses and vulnerabilities around cloud and data to help other areas respond promptly and effectively to contain breaches or address areas of concern. You will also contribute to continuous improvement by analysing incidents, refining standards and influencing architectural decisions that balance risk, performance and usability.</p>\n<p>How will you use your expertise to raise the bar?</p>\n<p>Essential Skills/Experience</p>\n<ul>\n<li>Minimum 10 years of experience</li>\n<li>Bachelor&#39;s Degree</li>\n<li>Must have broad enterprise IT experience with significant cloud and data exposure.</li>\n<li>Must have in-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols.</li>\n<li>Must have experience designing, deploying, and operating secure networks, systems, application and security architectures at scale.</li>\n<li>Must have experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale.</li>\n<li>Must have experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&amp;CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures.</li>\n<li>Should have experience working in a software development and systems administration organisation, implementing DevSecOps and process automation.</li>\n<li>Should have the ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards.</li>\n<li>Familiarity with CSPM, CNAPP, and Cloud EDR platforms</li>\n<li>Expertise with Microsoft Defender, Sentinel and Splunk</li>\n</ul>\n<p>Desirable Skills/Experience</p>\n<ul>\n<li>Identify and articulate architectural trade-offs.</li>\n<li>Embed process, governance and security into workflow and technology.</li>\n<li>Design and implement software tools and services using modern programming languages.</li>\n<li>Manage and lead projects delivering prioritised initiatives at challenging deadlines.</li>\n<li>Exert positive influence in a matrixed organisation to drive technology evolution.</li>\n<li>Drive efforts to achieve process and technology improvement at scale.</li>\n</ul>\n<p>The annual base pay for this position ranges from 136,044.00 - 204,066.00 USD Annual (80% - 120%). Hourly and salaried non-exempt employees will also be paid overtime pay when working qualifying overtime hours. Base pay offered may vary depending on multiple individualised factors, including market location, job-related knowledge, skills, and experience. In addition, our positions offer a short-term incentive bonus opportunity; eligibility to participate in our equity-based long-term incentive programme (salaried roles), to receive a retirement contribution (hourly roles), and commission payment eligibility (sales roles).</p>\n<p>Benefits offered included a qualified retirement programme [401(k) plan]; paid vacation and holidays; paid leaves; and, health benefits including medical, prescription drug, dental, and vision coverage in accordance with the terms and conditions of the applicable plans. Additional details of participation in these benefit plans will be provided if an employee receives an offer of employment. If hired, employee will be in an &#39;at-will position&#39; and the Company reserves the right to modify base pay (as well as any other discretionary payment or compensation programme) at any time, including for reasons related to individual performance, Company or individual department/team performance, and market factors.</p>\n<p>When we put unexpected teams in the same room, we unleash bold thinking with the power to inspire life-changing medicines. In-person working gives us the platform we need to connect, work at pace and challenge perceptions. That&#39;s why we work, on average, a minimum of three days per week from the office. But that doesn&#39;t mean we&#39;re not flexible. We balance the expectation of being in the office while respecting individual flexibility. Join us in our unique and ambitious world.</p>\n<p>AstraZeneca offers an environment where cybersecurity work has real-world impact on patients&#39; lives, not just systems and data. Here, technology experts collaborate with scientists and business teams to unlock the potential of data, analytics, AI and machine learning, constantly experimenting with new approaches while keeping critical platforms secure. There is strong investment in digital capabilities, room to explore modern tools through initiatives like hackathons, and a culture that values curiosity, coaching and continuous learning so that every day brings opportunities to grow skills and shape both personal development and the future of healthcare technology.</p>\n<p>If this role matches your skills and ambitions, apply now and help protect the digital foundations that enable life-changing medicines!</p>\n<p>Date Posted 17-Apr-2026 Closing Date 03-May-2026</p>\n<p>Our mission is to build an inclusive environment where equal employment opportunities are available to all applicants and employees. In furtherance of that mission, we welcome and consider applications from all qualified candidates, regardless of their protected characteristics. If you have a disability or special need that requires accommodation, please complete the corresponding section in the application form.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_6964b8e4-caf","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cyber Security Engineering Cloud/Data","sameAs":"https://astrazeneca.eightfold.ai","logo":"https://logos.yubhub.co/astrazeneca.eightfold.ai.png"},"x-apply-url":"https://astrazeneca.eightfold.ai/careers/job/563877689899183","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Minimum 10 years of experience","Bachelor's Degree","Broad enterprise IT experience with significant cloud and data exposure","In-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols","Experience designing, deploying, and operating secure networks, systems, application and security architectures at scale","Experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale","Experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures","Experience working in a software development and systems administration organisation, implementing DevSecOps and process automation","Ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards","Familiarity with CSPM, CNAPP, and Cloud EDR platforms","Expertise with Microsoft Defender, Sentinel and Splunk"],"x-skills-preferred":[],"datePosted":"2026-04-18T22:13:02.185Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Gaithersburg, Maryland, United States of America"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Healthcare","skills":"Minimum 10 years of experience, Bachelor's Degree, Broad enterprise IT experience with significant cloud and data exposure, In-depth understanding of security and networking protocols, cryptography, and modern authentication and authorization protocols, Experience designing, deploying, and operating secure networks, systems, application and security architectures at scale, Experience configuring and managing cloud security services in an AWS, Azure and GCP at organisation at scale, Experience researching, designing, and implementing security policies, standards, and procedures, including those in cybersecurity frameworks such as MITRE ATT&CK, NIST CSF, NIST SP.800- 53, and NIST SP.800-61, as well as implementing cloud security reference architectures, Experience working in a software development and systems administration organisation, implementing DevSecOps and process automation, Ability to conduct post-mortem on security incidents and take post-mortem data to drive uplift in policies, procedures, standards, Familiarity with CSPM, CNAPP, and Cloud EDR platforms, Expertise with Microsoft Defender, Sentinel and Splunk"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3ba73370-831"},"title":"Internal Audit IT Manager","description":"<p>Ready to be pushed beyond what you think you’re capable of?</p>\n<p>At Coinbase, our mission is to increase economic freedom in the world.</p>\n<p>We’re seeking a very specific candidate who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system.</p>\n<p>As an Internal Audit IT Manager, you will own end-to-end delivery of complex IT and security audits across our cloud infrastructure, security operations, and crypto-native systems.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Owning end-to-end delivery of IT and security audits, from risk assessment and scoping through planning, fieldwork, testing, reporting, and issue validation,covering cloud infrastructure (AWS, GCP), security operations, identity and access management, data protection, IT asset management, vendor/third-party risk, and key in-scope products and services including blockchain infrastructure, centralized and self-hosted wallets, and cold storage.</li>\n</ul>\n<ul>\n<li>Driving AI-enabled audit execution, designing and implementing data analytics, automation, and Generative AI solutions to modernize how we audit (e.g., continuous monitoring, anomaly detection, automated evidence retrieval, AI-assisted workpaper drafting),while maintaining rigorous human-in-the-loop validation to ensure accuracy and audit-quality conclusions.</li>\n</ul>\n<ul>\n<li>Executing audits aligned with the multi-year IT and security audit roadmap, coordinating coverage with co-sourced partners and cross-functional risk initiatives while ensuring alignment with Coinbase&#39;s enterprise risk profile, technology strategy, and regulatory expectations across regions (US, EMEA, APAC).</li>\n</ul>\n<ul>\n<li>Driving high-quality, risk-based findings and executive-level reporting, distilling key themes, emerging risks, and root causes into clear, concise materials for senior management and the Chief Audit Executive,ensuring findings are appropriately documented and supported by evidence.</li>\n</ul>\n<ul>\n<li>Partnering with technology and security leadership across Engineering, Security, Infrastructure, Product, and Operations to build trusted relationships, challenge control design, and advise on pragmatic, risk-based, scalable remediation while maintaining third-line independence.</li>\n</ul>\n<ul>\n<li>Driving disciplined issue management, ensuring timely, risk-based remediation by management, high-quality root cause analysis, and validation of remediation activities,escalating delays or thematic concerns to senior leadership as needed.</li>\n</ul>\n<ul>\n<li>Evaluating and developing talent, assessing candidates and helping build a high-performing, technically credible audit team.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>7+ years of experience in IT/security internal audit, technology risk, or first-line security/engineering roles with significant controls exposure.</li>\n</ul>\n<ul>\n<li>Experience working in a fast-paced, cloud-native, or engineering-driven environment where technology and security practices evolve rapidly.</li>\n</ul>\n<ul>\n<li>Hands-on audit experience with cloud platforms (AWS, GCP), including IAM policies, security configurations, logging/monitoring, and CI/CD pipelines.</li>\n</ul>\n<ul>\n<li>AI-forward mindset with demonstrated experience applying Python, SQL, or AI tools to audit or security work, building workflows rather than just prompting.</li>\n</ul>\n<ul>\n<li>Relevant professional certifications (e.g., CISA, CISSP, CIA, CISM) required; CPA or CFE a plus.</li>\n</ul>\n<ul>\n<li>Working knowledge of key frameworks such as NIST CSF, COBIT, SOC 2, and ITIL.</li>\n</ul>\n<ul>\n<li>High EQ and collaborative style.</li>\n</ul>\n<ul>\n<li>Proven ability to translate complex technical findings into clear, executive-ready narratives for both technical and non-technical audiences.</li>\n</ul>\n<ul>\n<li>Ability to manage multiple audits and initiatives across time zones (EMEA, APAC) with minimal oversight.</li>\n</ul>\n<ul>\n<li>Demonstrated leadership and team-development experience, including mentoring, coaching, and managing direct reports.</li>\n</ul>\n<ul>\n<li>Demonstrates the ability to responsibly use generative AI tools and copilots (e.g., LibreChat, Gemini, Glean) in daily workflows, continuously learn as tools evolve, and apply human-in-the-loop practices to deliver business-ready outputs and drive measurable improvements in efficiency, cost, and quality.</li>\n</ul>\n<p>Nice to have:</p>\n<ul>\n<li>Experience auditing or building blockchain infrastructure, crypto custody, or wallet systems (hot/cold storage).</li>\n</ul>\n<ul>\n<li>Background in a high-growth or rapidly scaling environment with complex, evolving technology stacks.</li>\n</ul>\n<ul>\n<li>Experience with GRC platforms (Workiva, Archer, AuditBoard) or building custom audit automation tooling.</li>\n</ul>\n<ul>\n<li>Familiarity with DORA, MiCA, or crypto-specific regulatory frameworks.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3ba73370-831","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Coinbase","sameAs":"https://www.coinbase.com/","logo":"https://logos.yubhub.co/coinbase.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/coinbase/jobs/7755116","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$166,345-$195,700 USD","x-skills-required":["IT security","Cloud infrastructure","Security operations","Identity and access management","Data protection","IT asset management","Vendor/third-party risk","Blockchain infrastructure","Centralized and self-hosted wallets","Cold storage","AI-enabled audit execution","Data analytics","Automation","Generative AI","Continuous monitoring","Anomaly detection","Automated evidence retrieval","AI-assisted workpaper drafting","Cloud platforms","IAM policies","Security configurations","Logging/monitoring","CI/CD pipelines","Python","SQL","AI tools","NIST CSF","COBIT","SOC 2","ITIL","CISA","CISSP","CIA","CISM","CPA","CFE"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:58:31.708Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - USA"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Finance","skills":"IT security, Cloud infrastructure, Security operations, Identity and access management, Data protection, IT asset management, Vendor/third-party risk, Blockchain infrastructure, Centralized and self-hosted wallets, Cold storage, AI-enabled audit execution, Data analytics, Automation, Generative AI, Continuous monitoring, Anomaly detection, Automated evidence retrieval, AI-assisted workpaper drafting, Cloud platforms, IAM policies, Security configurations, Logging/monitoring, CI/CD pipelines, Python, SQL, AI tools, NIST CSF, COBIT, SOC 2, ITIL, CISA, CISSP, CIA, CISM, CPA, CFE","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":166345,"maxValue":195700,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_4f6e3d04-c70"},"title":"Information Security Analyst - GRC","description":"<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p>Join us to transform the future through continuous technological innovation.</p>\n<p>As an Information Security Analyst, you will be an integral part of the Synopsys Corporate Information Security group, working within a mature Governance, Risk, and Compliance (GRC) Team. This team collaborates closely with the Director of Information Security, Manager of GRC, and stakeholders across the organization to raise the overall security and compliance posture for Synopsys.</p>\n<p>Your responsibilities will include:</p>\n<ul>\n<li>Identifying, documenting, monitoring, and reporting on risk register items, KPIs/KRIs, including the monitoring of security control efficacy.</li>\n<li>Demonstrating experience with governance, risk, and compliance tools.</li>\n<li>Working with security control frameworks such as ISO 27001, SOC 2 Type II, NIST 800-53, NIST CSF, and similar.</li>\n<li>Presenting security risks to a wide audience, including risk owners and other stakeholders.</li>\n<li>Interacting with Synopsys IT and business stakeholders to understand risks to critical infrastructure by defining potential business impact with the responsibility to apply effective mitigation strategies.</li>\n<li>Providing guidance on control implementations related to governance frameworks, regulations, and corporate security policies.</li>\n<li>Understanding of security functions including Incident Management, Change Management, Identity and Access Management, and Vendor Security Risk Management.</li>\n<li>Conducting third-party (vendor) risk assessments in collaboration with stakeholders.</li>\n<li>Providing security requirements to both internal partners and external third-party providers.</li>\n<li>Effectively communicating and working with a global team.</li>\n<li>Maintaining, enforcing, and tracking the Synopsys Information Security Exception process.</li>\n<li>Staying current with industry, regulatory, and legal requirements relevant to security, compliance, and privacy.</li>\n</ul>\n<p>You will be responsible for enhancing Synopsys&#39; overall security and compliance posture by building and improving the GRC portfolio. You will also enable and transform the risk management program to address the evolving cybersecurity threat landscape. Ensure regulatory compliance as the company continues to grow. Strengthen risk assessments of suppliers and partners, contributing to a robust security framework.</p>\n<p>To be successful in this role, you will need:</p>\n<ul>\n<li>A bachelor&#39;s degree in Computer Science, Information Systems, or a related field.</li>\n<li>Typically, 5-7 years of experience in a related field.</li>\n<li>Knowledge of common certification and attestation programs such as ISO 27001 and SOC 2 Type II, ISO 31000.</li>\n<li>Practical working experience with control frameworks like ISO 27001, NIST 800-53, SOC 2 Type II and NIST CSF.</li>\n<li>Excellent organizational skills with attention to detail and the ability to multitask for project prioritization.</li>\n<li>Effective communication skills with internal and external customers, executive managers, and team members.</li>\n<li>Ability to understand the intent of compliance requirements to provide effective and meaningful examination.</li>\n</ul>\n<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>\n<p>At Synopsys, we want talented people of every background to feel valued and supported to do their best work. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, age, military veteran status, or disability.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_4f6e3d04-c70","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/bengaluru/information-security-analyst-grc/44408/93409691360","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["governance, risk, and compliance","security control frameworks","ISO 27001","SOC 2 Type II","NIST 800-53","NIST CSF","incident management","change management","identity and access management","vendor security risk management"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:16:53.710Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Bengaluru"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"governance, risk, and compliance, security control frameworks, ISO 27001, SOC 2 Type II, NIST 800-53, NIST CSF, incident management, change management, identity and access management, vendor security risk management"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_cf2b8762-b60"},"title":"Cybersecurity Assurance Manager","description":"<p>Southern Company&#39;s Cybersecurity organization is committed to reducing risk using a threat-informed approach. We are seeking a leader to provide leadership and direction for the Company&#39;s governance, cybersecurity risk management, and Department of Defense cyber compliance while driving continuous improvement in security controls.</p>\n<p>The role is responsible for multiple individual program leaders, overseeing the Manager of Vulnerability Management and Validation, and collaborating closely with the Security Leadership Team. This Manager combines broad cybersecurity and business knowledge to reduce the company&#39;s cyber risk posture over time. This leader serves as a trusted advisor to executive leadership by translating technical assurance outcomes into clear, business-relevant risk insights.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Hire, develop, inspire, reward, and retain a highly qualified and diverse team</li>\n<li>Apply strong leadership and strategic thinking to a diverse set of opportunities and challenges</li>\n<li>Create an environment that fosters accountability and engagement at all levels</li>\n<li>Establish and maintain excellent working relationships and partnerships across the Technology Organization functions, business partners, and external vendors and suppliers</li>\n</ul>\n<p>The ideal candidate will have 7+ years of cybersecurity experience in architecture, engineering, operations, or compliance, and 5+ years of experience in leading teams. They should also have demonstrated ability to be an inclusive leader, strong leadership abilities, and outstanding credibility and ability to build strong relationships within the company and industry.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_cf2b8762-b60","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Southern Company","sameAs":"https://www.southerncompany.com/","logo":"https://logos.yubhub.co/southerncompany.com.png"},"x-apply-url":"https://emje.fa.us6.oraclecloud.com/hcmUI/CandidateExperience/en/sites/SouthernCompanyJobs/job/17765","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity","risk management","leadership","team management","communication","problem-solving","adversary techniques","NIST CSF","NIST 800-53","ISO 27001/27002","CIS","Cloud Security Alliance (CSA)"],"x-skills-preferred":[],"datePosted":"2026-04-03T08:17:56.189Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Atlanta"}},"employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Energy","skills":"cybersecurity, risk management, leadership, team management, communication, problem-solving, adversary techniques, NIST CSF, NIST 800-53, ISO 27001/27002, CIS, Cloud Security Alliance (CSA)"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_0d6b0b5c-92a"},"title":"Governance, Risk, and Compliance (GRC) SME- (m/w/d) DACH-Region","description":"<p><strong>Job Description</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. As a Cyber GRC Senior Consultant, you will work with security, IT, and compliance teams to strengthen cybersecurity, manage cyber risks, and ensure regulatory compliance.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Participate in global projects in an international team, supported by over 330,000 technical professionals from our parent company</li>\n<li>Contribute to the development of consulting offerings and innovative go-to-market solutions for the C-Suite to make cyber risks understandable and reducible</li>\n<li>Lead and conduct risk analyses according to the NIST CSF</li>\n<li>Be responsible for conceiving innovative new services using AI and ML where they offer real added value</li>\n<li>Support pre-sales, sales, and account management activities from the perspective of a subject matter expert</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>You have a clear career progression and experience working with renowned consulting firms and large commercial sector customers</li>\n<li>You bring a strong passion for cybersecurity and actively follow current industry trends and developments</li>\n<li>Your cybersecurity expertise includes:</li>\n</ul>\n<p>+ A relevant university degree (Bachelor or Master) in Information Security, Cybersecurity, or IT Security \t+ At least 1-5+ years of experience in the field of Cyber Security/Information Security \t+ A broad business competence profile, including stakeholder management, problem-solving ability, and resilience \t+ Experience in collecting, validating, analyzing, documenting, and communicating information to stakeholders</p>\n<p><strong>Desired Skills</strong></p>\n<ul>\n<li>Good knowledge of the NIST Cybersecurity Framework (CSF)</li>\n<li>A further university degree in Cyber or Information Security</li>\n<li>Cyber Due Diligence Assessments</li>\n<li>Cyber Risk Management for third parties and supply chains</li>\n<li>Review of Incident Response Plans</li>\n<li>Support in tenders, RFP responses, and offers</li>\n<li>Conducting Crisis Management Exercises (CMX)</li>\n<li>Certifications such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM</li>\n<li>Participation in the development of Target Operating Models (TOMs) and RACI matrices</li>\n<li>Creation of Cyber Security Roadmaps</li>\n<li>Support in Post-Incident Reviews</li>\n<li>Analysis and summarization of Cyber Threat Intelligence Reports</li>\n<li>Implementation of Cyber Compliance Programs (DSGVO, DORA, ISO 27001, NIS2, SOX)</li>\n<li>Cyber Risk or Maturity Assessments</li>\n<li>Conception and/or implementation of Awareness Trainings</li>\n<li>Participation in Identity &amp; Access Management Projects</li>\n<li>Participation in Privileged Access Management Projects</li>\n</ul>\n<p><strong>Ideal Candidate Profile</strong></p>\n<ul>\n<li>Our ideal candidates have the following skills:</li>\n</ul>\n<p>+ Strong business competence, particularly in stakeholder management and problem-solving \t+ Experience in preparing and communicating complex information to stakeholders \t+ Very good communication skills in German (C2) and English (C2) and project-related travel readiness \t+ Enjoy working with customers from different industries \t+ Experience in balancing technical and commercial requirements to develop practical solutions \t+ Ability to build lasting business relationships at all levels \t+ Ability to provide expert support and guidance to less experienced colleagues \t+ Ability to explain complex cyber methods in a non-technical and understandable way (written and oral)</p>\n<p><strong>Benefits</strong></p>\n<p>You will be part of a team that supports CIOs in managing central challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget restrictions. Our team of business analysts, enterprise architects, and cyber security specialists combines operational, strategic, analytical, and innovative competencies to drive business-IT alignment, IT governance transformation, IT cost optimization, efficiency improvement, innovation promotion, and cyber risk, governance, and compliance topics.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>You will be part of a globally renowned management consulting firm that is on the front-line of industry disruption. We are a mid-size player with a supportive, entrepreneurial spirit that works with a market-leading brand in every sector, while our parent organization Infosys is a top-5 powerhouse IT brand that is outperforming the market and experiencing rapid growth.</p>\n<p>Our consulting business is annually recognized as one of the UK&#39;s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity, and dedicated training and career paths we offer to our consultants. We are committed to fostering an inclusive work culture that inspires everyone to deliver their best.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_0d6b0b5c-92a","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/oexxh4mvWPKhUMdVS3q5pd/hybrid-governance%2C-risk%2C-and-compliance-(grc)-sme--(m%2Fw%2Fd)-dach-region-in-munich-at-infosys-consulting---europe","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Cybersecurity","Risk Management","Regulatory Compliance","NIST CSF","Cyber Due Diligence Assessments","Cyber Risk Management","Incident Response Plans","Crisis Management Exercises","Certifications","Target Operating Models","RACI matrices","Cyber Security Roadmaps","Post-Incident Reviews","Cyber Threat Intelligence Reports","Cyber Compliance Programs","Cyber Risk Assessments","Awareness Trainings","Identity & Access Management","Privileged Access Management"],"x-skills-preferred":["German","English","Stakeholder Management","Problem-Solving","Resilience","Communication","Project Management","Business Analysis","Enterprise Architecture","Cyber Security","IT Governance","IT Cost Optimization","Efficiency Improvement","Innovation Promotion"],"datePosted":"2026-03-09T16:54:02.938Z","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"Cybersecurity, Risk Management, Regulatory Compliance, NIST CSF, Cyber Due Diligence Assessments, Cyber Risk Management, Incident Response Plans, Crisis Management Exercises, Certifications, Target Operating Models, RACI matrices, Cyber Security Roadmaps, Post-Incident Reviews, Cyber Threat Intelligence Reports, Cyber Compliance Programs, Cyber Risk Assessments, Awareness Trainings, Identity & Access Management, Privileged Access Management, German, English, Stakeholder Management, Problem-Solving, Resilience, Communication, Project Management, Business Analysis, Enterprise Architecture, Cyber Security, IT Governance, IT Cost Optimization, Efficiency Improvement, Innovation Promotion"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1bdc3caf-792"},"title":"Governance, Risk, and Compliance (GRC) SME - Senior Consultant","description":"<p>Do you want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients&#39; most important challenges? We are growing and are looking for people to join our team. You&#39;ll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?</p>\n<p>We are looking for a highly skilled Cyber GRC (Governance, Risk, and Compliance) Senior Consultant to help organizations strengthen their cybersecurity posture, manage cyber risks, and ensure regulatory compliance. The ideal candidate will have deep expertise in cybersecurity frameworks, risk management, regulatory compliance, and security governance.</p>\n<p>As a Cyber GRC Senior Consultant, you will collaborate with client security, IT, and compliance teams to direct and oversee the development and implementation of cybersecurity policies, conduct risk assessments, and ensure adherence to global security standards and regulations.</p>\n<p><strong>Key Responsibilities:</strong></p>\n<p>Work on global projects with a truly global team, with the support of over 330,000 technical staff from our parent organization.</p>\n<p>Contribute to the development of consulting go to market offerings and innovative solutions targeted at the C-Suite executive community that help them to understand and mitigate their cyber risks.</p>\n<p>Direct and lead NIST CSF risk assessments</p>\n<p>Oversee the design of innovative new services to lead the market incorporating AI and ML where it brings value.</p>\n<p>Support presales, sales, and account management pursuits from a subject matter expert perspective.</p>\n<p><strong>Requirements</strong></p>\n<p>You will have already achieved strong career progression to date, and experience working with recognized consulting brands and large commercial sector clients. You will have a passion for cyber security and a genuine interest in staying updated with the latest industry trends and developments.</p>\n<p>Your security experience must include:</p>\n<p>A relevant undergrad or post grad degree (Infosec, Cyber Security, IT Security)</p>\n<p>1-5 years+ in the field of cyber security/infosec.</p>\n<p>A broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Your diverse Security experience should include one or some of below:</p>\n<p>A good understanding of NIST CSF</p>\n<p>A post graduate degree in cyber /information security</p>\n<p>Cyber Due Diligence Assessments</p>\n<p>Third- Party &amp; Supply chain Cyber Risk Management</p>\n<p>Incident Response Plan review</p>\n<p>Supporting bids, RFP responses and proposals</p>\n<p>Crisis Management Exercises (CMX)</p>\n<p>Accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM,</p>\n<p>Helped design Target Operating Models (TOMs) and RACI Matrices</p>\n<p>Helping the design of Cyber Security Roadmaps</p>\n<p>Supporting Post Incident Reviews</p>\n<p>Reading and summarising Cyber Threat Intelligence reports</p>\n<p>Cyber Security Risk Assessments or Maturity Assessments</p>\n<p>Design and/deliver awareness training.</p>\n<p>Worked on Identity and Access Management projects.</p>\n<p>Worked on Privileged access management projects</p>\n<p><strong>Our ideal candidate may have some of the following skills:</strong></p>\n<p>Have a broad business skill set including stakeholder management, problem-solving, and resilience</p>\n<p>Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences</p>\n<p>Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel</p>\n<p>Enjoy working with different clients from different industries.</p>\n<p>Have some experience in balancing technical and commercial considerations to develop practical advice or solutions for clients.</p>\n<p>Be able to build strong and effective business relationships at all levels</p>\n<p>Be able to support and oversee staff with less experience in their tasks</p>\n<p>Be able to explain complex cyber methodologies using accessible non-technical language (both written and verbal)</p>\n<p>_Given that this is just a short snapshot of the role we encourage you to apply even if you don&#39;t meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now._</p>\n<p><strong>About your team</strong></p>\n<p>At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.</p>\n<p><strong>About Infosys Consulting</strong></p>\n<p>Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology. We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.</p>\n<p>Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.</p>\n<p>Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.</p>\n<p>We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1bdc3caf-792","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Infosys Consulting - Europe","sameAs":"https://jobs.workable.com","logo":"https://logos.yubhub.co/view.com.png"},"x-apply-url":"https://jobs.workable.com/view/kpLfuJ6MMnQF6UP1PbZm31/remote-governance%2C-risk%2C-and-compliance-(grc)-sme---senior-consultant-in-poland-at-infosys-consulting---europe","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["cybersecurity frameworks","risk management","regulatory compliance","security governance","NIST CSF","cyber due diligence assessments","third-party and supply chain cyber risk management","incident response plan review","crisis management exercises","accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM","target operating models","RACI matrices","cybersecurity roadmaps","post-incident reviews","cyber threat intelligence reports","cybersecurity risk assessments","identity and access management","privileged access management"],"x-skills-preferred":["stakeholder management","problem-solving","resilience","data and information gathering","data and information validation","data and information synthesis","data and information documentation","data and information communication","interpersonal skills","written communication skills","verbal communication skills"],"datePosted":"2026-03-09T16:53:00.785Z","jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"IT","industry":"Consulting","skills":"cybersecurity frameworks, risk management, regulatory compliance, security governance, NIST CSF, cyber due diligence assessments, third-party and supply chain cyber risk management, incident response plan review, crisis management exercises, accreditation such as CISSP, CISM, CISA, GSLC, GSTRT, GCPM, target operating models, RACI matrices, cybersecurity roadmaps, post-incident reviews, cyber threat intelligence reports, cybersecurity risk assessments, identity and access management, privileged access management, stakeholder management, problem-solving, resilience, data and information gathering, data and information validation, data and information synthesis, data and information documentation, data and information communication, interpersonal skills, written communication skills, verbal communication skills"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7a509ba6-7ad"},"title":"Senior Manager Cyber and Technology Internal Audit","description":"<p>The Senior Manager, Cyber and Technology Internal Audit will report to the Director, Internal Audit and will be responsible for the management of the Cyber and Technology audit plan, including leading and implementing Cyber and Technology-related audits across the organisation to ensure operational integrity, regulatory compliance, and technology resilience.</p>\n<p><strong>What you&#39;ll do</strong></p>\n<p>Internal Audit</p>\n<ul>\n<li>Partner with management to shape and implement the annual Internal Audit Plan, with a strong focus on cyber and technology, ensuring alignment with the Enterprise Risk Profile, strategic objectives, and key business priorities.</li>\n<li>Lead cyber and technology audits delivered by co-sourced partners, ensuring high-quality outcomes, strong business engagement, and seamless collaboration on hybrid audits.</li>\n</ul>\n<p><strong>What you need</strong></p>\n<ul>\n<li>8+ years’ experience in internal audit, including 3+ years in a leadership role, ideally within a global, multi-regional organization.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7a509ba6-7ad","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Aristocrat Leisure Limited","sameAs":"https://aristocrat.wd3.myworkdayjobs.com","logo":"https://logos.yubhub.co/aristocrat.com.png"},"x-apply-url":"https://aristocrat.wd3.myworkdayjobs.com/en-US/AristocratExternalCareersSite/job/Las-Vegas-NV-US/Senior-Manager-Cyber-and-Technology-Internal-Audit_R0019045","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$131,996 - $245,137 per year","x-skills-required":["8+ years’ experience in internal audit","3+ years in a leadership role","Relevant certifications (e.g., cybersecurity, cloud, IT project management, or data privacy)"],"x-skills-preferred":["Deep knowledge of technology and cybersecurity governance, controls, and frameworks (e.g., NIST CSF, SOC 2, ISO 27001)","Awareness of emerging technologies such as AI and the ability to assess associated risks"],"datePosted":"2026-01-01T16:16:20.579Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Las Vegas, NV, US"}},"employmentType":"FULL_TIME","occupationalCategory":"Finance","industry":"Technology","skills":"8+ years’ experience in internal audit, 3+ years in a leadership role, Relevant certifications (e.g., cybersecurity, cloud, IT project management, or data privacy), Deep knowledge of technology and cybersecurity governance, controls, and frameworks (e.g., NIST CSF, SOC 2, ISO 27001), Awareness of emerging technologies such as AI and the ability to assess associated risks","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":131996,"maxValue":245137,"unitText":"YEAR"}}}]}