1010 Analog Devices Inc.
Wilmington, Massachusetts
About Analog Devices Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at and on LinkedIn and Twitter (X) . L3 SOC Analyst - Cyber Threat Intelligence (CTI) Focus P4 Location: MA, USA Department: Cybersecurity - Security Operations Centre (SOC) About Analog Devices (ADI) Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at . Role Overview We're looking for a Senior SOC Analyst with strong Cyber Threat Intelligence (CTI) expertise to elevate our detection and response capabilities. In this role, you'll drive operational excellence through intelligence led threat hunting, advanced investigations, and strategic incident response leadership. As a player coach, you'll lead complex investigations, mentor analysts, and strengthen our SOC through improvements in detection engineering, CTI integration, and automated response. You'll work across teams, communicate clearly with both technical and executive stakeholders, and help protect critical business assets through proactive, intelligence driven defence. Key Responsibilities Lead complex investigations into APTs, ransomware, insider threats, and other advanced adversarial activities affecting the organization. Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs, and internal telemetry to enhance detection and response capabilities. Create and present detailed intelligence assessments and executive briefings for both technical and non-technical audiences. Track and profile threat actor TTPs using frameworks like MITRE ATT&CK to pre-empt emerging risks. Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools to ensure comprehensive coverage. Conduct proactive threat hunting to identify and mitigate undetected or emerging threats. Design and implement automated containment workflows, such as device isolation, email purging, and session revocation. Maintain the incident response plan, ransomware decision framework, and other key operational templates. Publish and help manage SOC KPIs/OKRs, such as MTTD/MTTR, false positive rates, and detection coverage metrics. Oversee MSSP/vSOC partners, ensuring maximum value and alignment with detection and response strategies. Required Qualifications Bachelor's degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience in a global enterprise. Minimum 5+ years of experience in SOC operations, incident response (IR), cyber threat intelligence (CTI), or detection engineering roles. Technical Expertise Advanced knowledge of SIEM (preferably Azure Sentinel), EDR/NDR, and cloud security platforms (e.g., Microsoft Defender suite, O365, Azure). Expertise in CTI analysis, including threat actor profiling, malware analysis, and TTP tracking. Proficiency in scripting and automation using Python, PowerShell, or Bash to streamline SOC workflows. Hands-on experience with MITRE ATT&CK, SOAR, and forensic tools for incident response and threat detection. Preferred Skills Professional certifications such as GCTI, GREM, GCIH, GCIA, CISSP, or CEH. Cloud security certifications (e.g., Azure Security Engineer, AWS Security Specialist). Knowledge of compliance frameworks like PCI-DSS, HIPAA, or GDPR. Experience with vulnerability management platforms (e.g., Tenable, WIZ) and governance frameworks (e.g., SAML, OAuth, CSA). Why Join Us? Cutting-Edge Technology: Work with state-of-the-art threat intelligence tools, cloud security platforms, and detection technologies. Collaborative Culture: Be part of a forward-thinking SOC team that values collaboration, innovation, and continuous improvement. Professional Growth: Access opportunities for advanced training, certifications, and career development. Competitive Benefits: Enjoy a comprehensive compensation package, including healthcare, retirement plans, and flexible work arrangements. Meaningful Impact: Play a vital role in protecting critical business operations and intellectual property from emerging global threats. For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process. Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group. EEO is the Law: Notice of Applicant Rights Under the Law . Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days The expected wage range for a new hire into this position is $127,600 to $175,450. Actual wage offered may vary depending on work location , experience, education, training, external market data, internal pay equity, or other bona fide factors. This position qualifies for a discretionary performance-based bonus which is based on personal and company factors. This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.
03/18/2026
Full time
About Analog Devices Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at and on LinkedIn and Twitter (X) . L3 SOC Analyst - Cyber Threat Intelligence (CTI) Focus P4 Location: MA, USA Department: Cybersecurity - Security Operations Centre (SOC) About Analog Devices (ADI) Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at . Role Overview We're looking for a Senior SOC Analyst with strong Cyber Threat Intelligence (CTI) expertise to elevate our detection and response capabilities. In this role, you'll drive operational excellence through intelligence led threat hunting, advanced investigations, and strategic incident response leadership. As a player coach, you'll lead complex investigations, mentor analysts, and strengthen our SOC through improvements in detection engineering, CTI integration, and automated response. You'll work across teams, communicate clearly with both technical and executive stakeholders, and help protect critical business assets through proactive, intelligence driven defence. Key Responsibilities Lead complex investigations into APTs, ransomware, insider threats, and other advanced adversarial activities affecting the organization. Collect, analyze, and operationalize CTI from OSINT, commercial feeds, ISACs, and internal telemetry to enhance detection and response capabilities. Create and present detailed intelligence assessments and executive briefings for both technical and non-technical audiences. Track and profile threat actor TTPs using frameworks like MITRE ATT&CK to pre-empt emerging risks. Develop and maintain advanced detection logic using SIEM, EDR, and cloud-native tools to ensure comprehensive coverage. Conduct proactive threat hunting to identify and mitigate undetected or emerging threats. Design and implement automated containment workflows, such as device isolation, email purging, and session revocation. Maintain the incident response plan, ransomware decision framework, and other key operational templates. Publish and help manage SOC KPIs/OKRs, such as MTTD/MTTR, false positive rates, and detection coverage metrics. Oversee MSSP/vSOC partners, ensuring maximum value and alignment with detection and response strategies. Required Qualifications Bachelor's degree in computer science, Cybersecurity, or a related technical field or equivalent industry experience in a global enterprise. Minimum 5+ years of experience in SOC operations, incident response (IR), cyber threat intelligence (CTI), or detection engineering roles. Technical Expertise Advanced knowledge of SIEM (preferably Azure Sentinel), EDR/NDR, and cloud security platforms (e.g., Microsoft Defender suite, O365, Azure). Expertise in CTI analysis, including threat actor profiling, malware analysis, and TTP tracking. Proficiency in scripting and automation using Python, PowerShell, or Bash to streamline SOC workflows. Hands-on experience with MITRE ATT&CK, SOAR, and forensic tools for incident response and threat detection. Preferred Skills Professional certifications such as GCTI, GREM, GCIH, GCIA, CISSP, or CEH. Cloud security certifications (e.g., Azure Security Engineer, AWS Security Specialist). Knowledge of compliance frameworks like PCI-DSS, HIPAA, or GDPR. Experience with vulnerability management platforms (e.g., Tenable, WIZ) and governance frameworks (e.g., SAML, OAuth, CSA). Why Join Us? Cutting-Edge Technology: Work with state-of-the-art threat intelligence tools, cloud security platforms, and detection technologies. Collaborative Culture: Be part of a forward-thinking SOC team that values collaboration, innovation, and continuous improvement. Professional Growth: Access opportunities for advanced training, certifications, and career development. Competitive Benefits: Enjoy a comprehensive compensation package, including healthcare, retirement plans, and flexible work arrangements. Meaningful Impact: Play a vital role in protecting critical business operations and intellectual property from emerging global threats. For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process. Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group. EEO is the Law: Notice of Applicant Rights Under the Law . Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days The expected wage range for a new hire into this position is $127,600 to $175,450. Actual wage offered may vary depending on work location , experience, education, training, external market data, internal pay equity, or other bona fide factors. This position qualifies for a discretionary performance-based bonus which is based on personal and company factors. This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.
1010 Analog Devices Inc.
Wilmington, Massachusetts
About Analog Devices Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at and on LinkedIn and Twitter (X) . Vulnerability Analyst (U.S. Government Secure Enclave) Department: Cybersecurity - Cyber Defense & Testing Location: MA, USA About Analog Devices (ADI) Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at . Role Overview We are seeking a Vulnerability Analyst to support the secure U.S. Government enclave. In this role, you will identify, assess, and help remediate vulnerabilities across systems, applications, networks, and cloud workloads operating in a regulated, high assurance environment. This position requires solid technical expertise, strong analytical skills, clear communication, and the ability to work within a controlled enclave that adheres to U.S. Government security, compliance, and data handling requirements. You will help ensure that mission critical systems remain secure, compliant, and resilient, contributing directly to the protection of national level data and infrastructure while working with modern technologies across a complex global enterprise. Key Responsibilities Perform vulnerability assessments, configuration reviews, and penetration testing across enclave systems, networks, and cloud connected components. Use industry-standard VM tools (Tenable, Wiz, Horizon3) to identify and validate vulnerabilities and misconfigurations. Conduct application and API security testing to identify risks such as SQL injection, XSS, buffer overflows, insecure APIs, and emerging exploit classes. Execute all assessment work in accordance with enclave specific security boundaries, data handling procedures, and federal cybersecurity controls (e.g., FedRAMP High, NIST ) Maintain strict compliance with enclave audit logging, privileged access procedures, and secure workstation requirements. Conduct qualitative and quantitative risk assessments for enclave technologies, including mission systems, vendor integrations, and cloud services. Collaborate closely with SOC and IR teams on enclave security events, investigation, containment, and after action reviews. Identify root cause, control gaps, and feasible remediation within enclave constraints. Monitor vulnerability lifecycle progress, ensuring remediation aligns with government SLAs and compliance requirements. Partner with cloud engineering and infrastructure teams to evaluate secure architectures across Azure, M365, AWS, and enclave approved cloud services. Assist with secure cloud onboarding, enclave migration efforts, IAM requirements, and STIG/secure baseline hardening. Produce high quality written reports for technical, executive, and government stakeholders. Support audit readiness, enclave compliance reviews, and documentation of security policies, deviations, and corrective actions. U.S. Government Secure Enclave Requirements Candidates must meet all U.S. Government eligibility requirements for working within a secure enclave, including: Mandatory Eligibility U.S. Citizenship (required) - due to access to controlled government systems and data. Ability to work on site within a controlled U.S. Government enclave environment as required. Experience with handling Controlled Unclassified Information (CUI), ITAR/EAR restricted data, or similar categories is a plus. Required Qualifications 3-5+ years of experience in vulnerability management, penetration testing, cloud security, or defensive cybersecurity roles. Relevant certifications beneficial: CISSP, CISM, CEH, OSCP. Required Technical Skills Hands-on experience with VM platforms (Tenable, Wiz, Horizon3). Strong understanding of security testing techniques and network/application exploitation pathways. Knowledge of cloud security across Azure, M365, and AWS. Familiarity with IAM technologies, SSO/OAuth/SAML, and compliance frameworks (ISO, SOC2, CSA). Strong understanding of Windows/Linux internals and secure network architectures. For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process. Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group. EEO is the Law: Notice of Applicant Rights Under the Law . Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days The expected wage range for a new hire into this position is $102,786 to $141,357. Actual wage offered may vary depending on work location , experience, education, training, external market data, internal pay equity, or other bona fide factors. This position qualifies for a discretionary performance-based bonus which is based on personal and company factors. This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.
03/18/2026
Full time
About Analog Devices Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at and on LinkedIn and Twitter (X) . Vulnerability Analyst (U.S. Government Secure Enclave) Department: Cybersecurity - Cyber Defense & Testing Location: MA, USA About Analog Devices (ADI) Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive technological advancements in industries like healthcare, automotive, industrial automation, and climate sustainability. With $9B+ in annual revenue and a global workforce of 24,000+, ADI ensures today's innovators stay Ahead of What's Possible . Learn more at . Role Overview We are seeking a Vulnerability Analyst to support the secure U.S. Government enclave. In this role, you will identify, assess, and help remediate vulnerabilities across systems, applications, networks, and cloud workloads operating in a regulated, high assurance environment. This position requires solid technical expertise, strong analytical skills, clear communication, and the ability to work within a controlled enclave that adheres to U.S. Government security, compliance, and data handling requirements. You will help ensure that mission critical systems remain secure, compliant, and resilient, contributing directly to the protection of national level data and infrastructure while working with modern technologies across a complex global enterprise. Key Responsibilities Perform vulnerability assessments, configuration reviews, and penetration testing across enclave systems, networks, and cloud connected components. Use industry-standard VM tools (Tenable, Wiz, Horizon3) to identify and validate vulnerabilities and misconfigurations. Conduct application and API security testing to identify risks such as SQL injection, XSS, buffer overflows, insecure APIs, and emerging exploit classes. Execute all assessment work in accordance with enclave specific security boundaries, data handling procedures, and federal cybersecurity controls (e.g., FedRAMP High, NIST ) Maintain strict compliance with enclave audit logging, privileged access procedures, and secure workstation requirements. Conduct qualitative and quantitative risk assessments for enclave technologies, including mission systems, vendor integrations, and cloud services. Collaborate closely with SOC and IR teams on enclave security events, investigation, containment, and after action reviews. Identify root cause, control gaps, and feasible remediation within enclave constraints. Monitor vulnerability lifecycle progress, ensuring remediation aligns with government SLAs and compliance requirements. Partner with cloud engineering and infrastructure teams to evaluate secure architectures across Azure, M365, AWS, and enclave approved cloud services. Assist with secure cloud onboarding, enclave migration efforts, IAM requirements, and STIG/secure baseline hardening. Produce high quality written reports for technical, executive, and government stakeholders. Support audit readiness, enclave compliance reviews, and documentation of security policies, deviations, and corrective actions. U.S. Government Secure Enclave Requirements Candidates must meet all U.S. Government eligibility requirements for working within a secure enclave, including: Mandatory Eligibility U.S. Citizenship (required) - due to access to controlled government systems and data. Ability to work on site within a controlled U.S. Government enclave environment as required. Experience with handling Controlled Unclassified Information (CUI), ITAR/EAR restricted data, or similar categories is a plus. Required Qualifications 3-5+ years of experience in vulnerability management, penetration testing, cloud security, or defensive cybersecurity roles. Relevant certifications beneficial: CISSP, CISM, CEH, OSCP. Required Technical Skills Hands-on experience with VM platforms (Tenable, Wiz, Horizon3). Strong understanding of security testing techniques and network/application exploitation pathways. Knowledge of cloud security across Azure, M365, and AWS. Familiarity with IAM technologies, SSO/OAuth/SAML, and compliance frameworks (ISO, SOC2, CSA). Strong understanding of Windows/Linux internals and secure network architectures. For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process. Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group. EEO is the Law: Notice of Applicant Rights Under the Law . Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days The expected wage range for a new hire into this position is $102,786 to $141,357. Actual wage offered may vary depending on work location , experience, education, training, external market data, internal pay equity, or other bona fide factors. This position qualifies for a discretionary performance-based bonus which is based on personal and company factors. This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.
Staffing Pros, a division of VETS Inc., has an exciting opportunity for an HRIS Workday Systems Analyst. This position sits within our client's Human Resources team and will be a key resource as they harmonize their HCM systems over the next twelve months! This position can be located in Germantown, MD or Englewood, CO. Responsibilities: Serve as the functional consultant for Workday initiatives, demonstrating deep expertise in several Workday modules: Core HCM, Compensation, Advanced Compensation, Benefits, Talent, Security. Design, test, and implement changes to Workday business processes, security roles, and workflows based on evolving HR and business needs. Participate in requirement gathering sessions, fit/gap analysis, functional documentation, proof-of-concept builds, user acceptance testing, and deployments. Recommend and implement configuration enhancements aligned with best practices and compliance standards. Analyze, troubleshoot, and resolve complex configuration and functional issues. Provide guidance and knowledge transfer through training sessions, job aids, and documentation for both HR and technical users. Collaborate with IT and Payroll to identify and resolve technical issues impacting HR transactions and payroll processing. Validate and reconcile data between Workday and SAP during bi-weekly payroll cycles, addressing discrepancies proactively. Ensure compliant and timely processing of employee data, including auditing records for accuracy and legal adherence. Create, edit, and maintain Workday reports, dashboards, and analytics for HR functions (Benefits, Compensation, Training, etc.). Leverage reporting tools and Excel (e.g., pivot tables, lookups) to support audits, analysis, and decision-making. Participate in regular Workday system maintenance, including testing of patches, weekly enhancements, and major bi-annual upgrades. Provide day-to-day system monitoring, support, and resolution of user-reported issues via ticketing/case systems. Support end-users and HR super users by delivering hands-on support, training, and troubleshooting assistance. Stay current with new Workday features/releases and evaluate their applicability to the business. Act as liaison between business stakeholders, HR, IT, and third-party vendors to ensure seamless coordination. Provide timely updates and manage expectations with both internal and external stakeholders. Participate in strategic planning to improve HRIS functionality, user experience, and operational efficiency. Requirements: Bachelors Degree (Information Systems, Information Technology and/or related fields is preferred) 3+ years of HRIS Experience Prior experience with Workday (HCM, Benefits and Compensation, Talent & Performance Management) Ability to independently manage system issues, prioritize requests, and meet deadlines in a dynamic environment. Strong organizational and time management skills, with ability to handle multiple parallel projects. Preferred Qualifications: Experience with Workday implementation(s) Prior experience with SAP HR/Payroll Software Strong analytical skills and thought processes Prior experience with data integrity analytics, reporting, and system control practices Demonstrated knowledge of overall Human Resources, Compensation and/or Benefits Possess an organizational mindset and the ability to provide quick follow-through on project goals Strong understanding of Workdays HCM modules, including Core HR, Compensation, Benefits, Payroll, and more. Experience with system testing, troubleshooting, and data validation to ensure Workday configurations meet business requirements. Excellent analytical skills with the ability to translate complex business requirements into system solutions. Strong communication and interpersonal skills, with the ability to work effectively with clients and cross-functional teams. Knowledge of Workday integrations and experience working with integration teams is a plus. EEO Statement Staffing Pros a division of VETS-inc is an Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information.
01/15/2026
Staffing Pros, a division of VETS Inc., has an exciting opportunity for an HRIS Workday Systems Analyst. This position sits within our client's Human Resources team and will be a key resource as they harmonize their HCM systems over the next twelve months! This position can be located in Germantown, MD or Englewood, CO. Responsibilities: Serve as the functional consultant for Workday initiatives, demonstrating deep expertise in several Workday modules: Core HCM, Compensation, Advanced Compensation, Benefits, Talent, Security. Design, test, and implement changes to Workday business processes, security roles, and workflows based on evolving HR and business needs. Participate in requirement gathering sessions, fit/gap analysis, functional documentation, proof-of-concept builds, user acceptance testing, and deployments. Recommend and implement configuration enhancements aligned with best practices and compliance standards. Analyze, troubleshoot, and resolve complex configuration and functional issues. Provide guidance and knowledge transfer through training sessions, job aids, and documentation for both HR and technical users. Collaborate with IT and Payroll to identify and resolve technical issues impacting HR transactions and payroll processing. Validate and reconcile data between Workday and SAP during bi-weekly payroll cycles, addressing discrepancies proactively. Ensure compliant and timely processing of employee data, including auditing records for accuracy and legal adherence. Create, edit, and maintain Workday reports, dashboards, and analytics for HR functions (Benefits, Compensation, Training, etc.). Leverage reporting tools and Excel (e.g., pivot tables, lookups) to support audits, analysis, and decision-making. Participate in regular Workday system maintenance, including testing of patches, weekly enhancements, and major bi-annual upgrades. Provide day-to-day system monitoring, support, and resolution of user-reported issues via ticketing/case systems. Support end-users and HR super users by delivering hands-on support, training, and troubleshooting assistance. Stay current with new Workday features/releases and evaluate their applicability to the business. Act as liaison between business stakeholders, HR, IT, and third-party vendors to ensure seamless coordination. Provide timely updates and manage expectations with both internal and external stakeholders. Participate in strategic planning to improve HRIS functionality, user experience, and operational efficiency. Requirements: Bachelors Degree (Information Systems, Information Technology and/or related fields is preferred) 3+ years of HRIS Experience Prior experience with Workday (HCM, Benefits and Compensation, Talent & Performance Management) Ability to independently manage system issues, prioritize requests, and meet deadlines in a dynamic environment. Strong organizational and time management skills, with ability to handle multiple parallel projects. Preferred Qualifications: Experience with Workday implementation(s) Prior experience with SAP HR/Payroll Software Strong analytical skills and thought processes Prior experience with data integrity analytics, reporting, and system control practices Demonstrated knowledge of overall Human Resources, Compensation and/or Benefits Possess an organizational mindset and the ability to provide quick follow-through on project goals Strong understanding of Workdays HCM modules, including Core HR, Compensation, Benefits, Payroll, and more. Experience with system testing, troubleshooting, and data validation to ensure Workday configurations meet business requirements. Excellent analytical skills with the ability to translate complex business requirements into system solutions. Strong communication and interpersonal skills, with the ability to work effectively with clients and cross-functional teams. Knowledge of Workday integrations and experience working with integration teams is a plus. EEO Statement Staffing Pros a division of VETS-inc is an Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information.
Job Title: Systems Support Analyst II Location: MGA - Macon Regular/Temporary: Regular Full/Part Time: Full-Time Job ID: 288336 About Us Middle Georgia State University (MGA), a multi-campus, baccalaureate and graduate degree granting public institution, is the most affordable public state university in Georgia. MGA has five campuses-Macon, Cochran, Dublin, Eastman, and Warner Robins, all located in central Georgia-and global outreach through its fully-online campus. Its enrollment of 8,400 students is largely comprised of students from most of Georgia's 159 counties. The University has six academic schools, including Georgia's flagship aviation program, that support its mission to educate and graduate inspired, lifelong learners whose scholarship and careers enhance the state. Job Summary The Student Support Analyst II plays a critical role in supporting institutional applications and platforms used by students and staff. This position involves programming, technical support, and systems management across platforms such as Banner, Salesforce, and web-based applications. The Analyst ensures smooth operation, security, and user satisfaction through proactive development and responsive support. Responsibilities Application Development and Maintenance (40%) - Design, develop, test, and maintain custom programs and scripts to support enterprise applications including Banner, Salesforce, and web operations. Collaborate with stakeholders to gather requirements and translate them into functional technical solutions. Optimize and refactor existing codebases to improve performance, maintainability, and scalability. Integrate third-party APIs and services with institutional platforms to enhance functionality. Maintain documentation for all developed solutions, including version control and change logs. End-User Technical and Functional Support (30%) - Provide Tier II support for Banner, Salesforce, and web applications, resolving technical and functional issues reported by users. Conduct training sessions and create user guides to assist staff and students in using supported applications effectively. Monitor system performance and user feedback to identify areas for improvement. Collaborate with IT and functional teams to troubleshoot and resolve complex application issues. Maintain a knowledge base of common issues and solutions to streamline support processes. Support for Third-Party Platforms and Software (10%) - Serve as a liaison between the institution and third-party vendors to resolve technical issues. Configure and maintain integrations between third-party platforms and internal systems. Test and validate updates or changes to third-party software before deployment. Ensure compatibility and compliance of third-party tools with institutional policies and standards. Administrative Support and Documentation (15%) - Create and maintain technical documentation, including system configurations, support procedures, and change management records in alignment with ITIL 4 practices. Participate in incident, problem, and change management processes, ensuring timely resolution and accurate reporting. Assist in service request fulfillment and contribute to continual service improvement initiatives. Maintain records of service-level agreements (SLAs), performance metrics, and compliance reports. Support administrative tasks such as meeting coordination, reporting, and inventory tracking, and perform other duties as assigned. IT Systems Security and Permissions Management (5%) - Manage user roles, access permissions, and security settings across supported applications. Conduct regular audits to ensure compliance with data security policies and best practices. Implement and monitor security protocols to protect sensitive student and institutional data. Collaborate with cybersecurity teams to respond to potential threats or breaches. Maintain documentation of access controls and security configurations. Required Qualifications Educational Requirements Bachelor s degree in Computer Science, Information Technology, or a related field Required Experience At least two years of relevant programming or technical support experience; or an equivalent combination of education and experience. Preferred Qualifications Preferred Experience Experience working within an ITIL 4 framework, including familiarity with incident, problem, and change management processes. Experience supporting enterprise applications such as Banner, Salesforce, or similar platforms. Experience with version control systems and collaborative development tools. Other Preferred Qualifications Knowledge of web operations and integration of third-party platforms with institutional systems. Ability to manage user permissions and security configurations across multiple systems. Knowledge, Skills, & Abilities Minimum Proficiency in PL/SQL for database programming and query development. Intermediate experience with one or more programming languages, such as C, HTML Script, Java, or JavaScript. Working knowledge of database principles, preferably with Oracle. Familiarity with system security best practices and their practical application in enterprise environments. Strong problem-solving and decision-making skills in technical contexts. Effective interpersonal skills, including the ability to work collaboratively with teams and communicate with the public. Excellent oral and written communication skills, including the ability to document technical processes clearly. Basic understanding of system security best practices and their application in enterprise environments. Preferred Experience working within an ITIL 4 framework, including familiarity with incident, problem, and change management processes. Experience supporting enterprise applications such as Banner, Salesforce, or similar platforms. Knowledge of web operations and integration of third-party platforms with institutional systems. Experience with version control systems and collaborative development tools. Ability to manage user permissions and security configurations across multiple systems. USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at . Institutional Values Middle Georgia State University is committed to four core values in what we do and represent: CORE VALUES: Stewardship - Engagement - Adaptability - Learning Equal Employment Opportunity Middle Georgia State University is an equal employment, equal access, and equal educational opportunity. It is the policy of the Middle Georgia State University to recruit, hire, train, promote and educate persons without regard to race, color, national or ethnic origin, age, disability, gender, religion, sexual orientation, gender identity or veteran status as required by applicable state and federal laws (including Title VI, Title VII, Title IX, Sections 503, and 504, ADEA, ADA, E.O. 11246, and Rev. Proc. 75-50). For questions or more detailed information regarding this policy, please contact the Middle Georgia State University Office of Human Resources at . Individuals requiring disability related accommodations for participation in any event or to obtain print materials in an alternative format, please contact Human Resources. Other Information This is a full-time, 12-month, exempt (salaried) staff position and includes a comprehensive benefits package. Benefits include: Health insurance Dental Vision Flexible Spending Account (FSA) Health Savings Account (HSA) Life Insurance Sick Leave Vacation Leave Parental Leave Retirement Employee discounts Tuition reimbursement Background Check Employment offer is contingent upon completing a background investigation including a criminal background check demonstrating your employment eligibility with MGA, as determined by MGA in its sole discretion, confirmation of the credentials and employment history reflected in your application material and, if applicable, a satisfactory credit check.
01/14/2026
Full time
Job Title: Systems Support Analyst II Location: MGA - Macon Regular/Temporary: Regular Full/Part Time: Full-Time Job ID: 288336 About Us Middle Georgia State University (MGA), a multi-campus, baccalaureate and graduate degree granting public institution, is the most affordable public state university in Georgia. MGA has five campuses-Macon, Cochran, Dublin, Eastman, and Warner Robins, all located in central Georgia-and global outreach through its fully-online campus. Its enrollment of 8,400 students is largely comprised of students from most of Georgia's 159 counties. The University has six academic schools, including Georgia's flagship aviation program, that support its mission to educate and graduate inspired, lifelong learners whose scholarship and careers enhance the state. Job Summary The Student Support Analyst II plays a critical role in supporting institutional applications and platforms used by students and staff. This position involves programming, technical support, and systems management across platforms such as Banner, Salesforce, and web-based applications. The Analyst ensures smooth operation, security, and user satisfaction through proactive development and responsive support. Responsibilities Application Development and Maintenance (40%) - Design, develop, test, and maintain custom programs and scripts to support enterprise applications including Banner, Salesforce, and web operations. Collaborate with stakeholders to gather requirements and translate them into functional technical solutions. Optimize and refactor existing codebases to improve performance, maintainability, and scalability. Integrate third-party APIs and services with institutional platforms to enhance functionality. Maintain documentation for all developed solutions, including version control and change logs. End-User Technical and Functional Support (30%) - Provide Tier II support for Banner, Salesforce, and web applications, resolving technical and functional issues reported by users. Conduct training sessions and create user guides to assist staff and students in using supported applications effectively. Monitor system performance and user feedback to identify areas for improvement. Collaborate with IT and functional teams to troubleshoot and resolve complex application issues. Maintain a knowledge base of common issues and solutions to streamline support processes. Support for Third-Party Platforms and Software (10%) - Serve as a liaison between the institution and third-party vendors to resolve technical issues. Configure and maintain integrations between third-party platforms and internal systems. Test and validate updates or changes to third-party software before deployment. Ensure compatibility and compliance of third-party tools with institutional policies and standards. Administrative Support and Documentation (15%) - Create and maintain technical documentation, including system configurations, support procedures, and change management records in alignment with ITIL 4 practices. Participate in incident, problem, and change management processes, ensuring timely resolution and accurate reporting. Assist in service request fulfillment and contribute to continual service improvement initiatives. Maintain records of service-level agreements (SLAs), performance metrics, and compliance reports. Support administrative tasks such as meeting coordination, reporting, and inventory tracking, and perform other duties as assigned. IT Systems Security and Permissions Management (5%) - Manage user roles, access permissions, and security settings across supported applications. Conduct regular audits to ensure compliance with data security policies and best practices. Implement and monitor security protocols to protect sensitive student and institutional data. Collaborate with cybersecurity teams to respond to potential threats or breaches. Maintain documentation of access controls and security configurations. Required Qualifications Educational Requirements Bachelor s degree in Computer Science, Information Technology, or a related field Required Experience At least two years of relevant programming or technical support experience; or an equivalent combination of education and experience. Preferred Qualifications Preferred Experience Experience working within an ITIL 4 framework, including familiarity with incident, problem, and change management processes. Experience supporting enterprise applications such as Banner, Salesforce, or similar platforms. Experience with version control systems and collaborative development tools. Other Preferred Qualifications Knowledge of web operations and integration of third-party platforms with institutional systems. Ability to manage user permissions and security configurations across multiple systems. Knowledge, Skills, & Abilities Minimum Proficiency in PL/SQL for database programming and query development. Intermediate experience with one or more programming languages, such as C, HTML Script, Java, or JavaScript. Working knowledge of database principles, preferably with Oracle. Familiarity with system security best practices and their practical application in enterprise environments. Strong problem-solving and decision-making skills in technical contexts. Effective interpersonal skills, including the ability to work collaboratively with teams and communicate with the public. Excellent oral and written communication skills, including the ability to document technical processes clearly. Basic understanding of system security best practices and their application in enterprise environments. Preferred Experience working within an ITIL 4 framework, including familiarity with incident, problem, and change management processes. Experience supporting enterprise applications such as Banner, Salesforce, or similar platforms. Knowledge of web operations and integration of third-party platforms with institutional systems. Experience with version control systems and collaborative development tools. Ability to manage user permissions and security configurations across multiple systems. USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at . Institutional Values Middle Georgia State University is committed to four core values in what we do and represent: CORE VALUES: Stewardship - Engagement - Adaptability - Learning Equal Employment Opportunity Middle Georgia State University is an equal employment, equal access, and equal educational opportunity. It is the policy of the Middle Georgia State University to recruit, hire, train, promote and educate persons without regard to race, color, national or ethnic origin, age, disability, gender, religion, sexual orientation, gender identity or veteran status as required by applicable state and federal laws (including Title VI, Title VII, Title IX, Sections 503, and 504, ADEA, ADA, E.O. 11246, and Rev. Proc. 75-50). For questions or more detailed information regarding this policy, please contact the Middle Georgia State University Office of Human Resources at . Individuals requiring disability related accommodations for participation in any event or to obtain print materials in an alternative format, please contact Human Resources. Other Information This is a full-time, 12-month, exempt (salaried) staff position and includes a comprehensive benefits package. Benefits include: Health insurance Dental Vision Flexible Spending Account (FSA) Health Savings Account (HSA) Life Insurance Sick Leave Vacation Leave Parental Leave Retirement Employee discounts Tuition reimbursement Background Check Employment offer is contingent upon completing a background investigation including a criminal background check demonstrating your employment eligibility with MGA, as determined by MGA in its sole discretion, confirmation of the credentials and employment history reflected in your application material and, if applicable, a satisfactory credit check.
Posting Number: S14192P Working Title: Data System Administrator Department: Grad Sch-Technology Office About the University of Georgia: Chartered by the state of Georgia in 1785, the University of Georgia is the birthplace of public higher education in America and is the state's flagship university () . The proof is in our more than 240 years of academic and professional achievements and our continual commitment to higher education. UGA is currently ranked among the top 20 public universities in U.S. News & World Report. The University's main campus is located in Athens, approximately 65 miles northeast of Atlanta, with extended campuses in Atlanta, Griffin, Gwinnett, and Tifton. UGA employs approximately 3,100 faculty and more than 7,700 full-time staff. The University's enrollment exceeds 41,000 students including over 31,000 undergraduates and over 10,000 graduate and professional students. Academic programs reside in 19 schools and colleges, including our newly established School of Medicine. College/Unit/Department website: Posting Type: External Retirement Plan: TRS or ORP Employment Type: Employee Benefits Eligibility: Benefits Eligible Full/Part time: Full Time Additional Schedule Information: 8 am-5 pm, Monday-Friday Advertised Salary: Negotiable Posting Date: 09/26/2025 Open until filled: Yes Proposed Starting Date: 10/15/2025 Location of Vacancy: Athens Area EEO Policy Statement: The University of Georgia is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to age, color, disability, genetic information, national origin, race, religion, sex, or veteran status or other protected status. Persons needing accommodations or assistance with the accessibility of materials related to this search are encouraged to contact Central HR ( ). USG Core Values Statement: The University System of Georgia is comprised of our 26 institutions of higher education and learning, as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Classification Title: Application Analyst II FLSA: Exempt FTE: 1.00 Minimum Qualifications: Bachelor's degree in a related field or equivalent and 2 years of professional experience Preferred Qualifications: Experience working with Banner, APIs, and web services Training in business process analysis and business process management (BPM) Training in user experience (UX) and user interface (UI) design Experience working with enterprise resource planning (ERP) systems Position Summary: The Data System Administrator will play a key role in the operational management of the Slate system for the Graduate School, with responsibility for designing and implementing automated business processes. This position will provide system support to campus users and stakeholders through workshops, training resources, and the development of a comprehensive knowledge base. The role requires expertise in data analytics, data management, and query/report development. The administrator will act as an analyst for the Graduate School, designing, administering, and documenting data fields and flows; collaborating with stakeholders; and troubleshooting data-related issues. Additionally, the position will work with IT professionals on data integration projects involving forms, reports, rules, imports/exports, and related processes. Knowledge, Skills, Abilities and/or Competencies: Minimum Qualifications Bachelor's degree in information systems, computer science, data science, or a related discipline Demonstrated experience working with relational databases and SQL Demonstrated experience with web-based applications and online form design Ability to work independently and manage multiple priorities Excellent written and oral communication skills Strong attention to detail and accuracy Physical Demands: Prolonged periods of sitting Extensive use of keyboard, mouse, and monitor Is driving a responsibility of this position?: No Is this a Position of Trust?: Yes Does this position have operation, access, or control of financial resources?: No Does this position require a P-Card? : No Is having a P-Card an essential function of this position? : No Does this position have direct interaction or care of children under the age of 18 or direct patient care?: No Does this position have Security Access (e.g., public safety, IT security, personnel records, patient records, or access to chemicals and medications): Yes Credit and P-Card policy: Be advised a credit check will be required for all positions with financial responsibilities. For additional information about the credit check criteria, visit the UGA Credit Background Check website . Background Investigation Policy: Offers of employment are contingent upon completion of a background investigation including, a criminal background check demonstrating your eligibility for employment with the University of Georgia; confirmation of the credentials and employment history reflected in your application materials (including reference checks) as they relate to the job-based requirements of the position applied for; and, if applicable, a satisfactory credit check. You may also be subject to a pre-employment drug test for positions with high-risk responsibilities, if applicable. Please visit the UGA Background Check website . Duties/Responsibilities: Data curation : Monitor data imports and exports, validate accuracy, troubleshoot and resolve discrepancies, and ensure data integrity and timeliness across systems. System integration (e.g., SIS) : Oversee scheduled integrations, troubleshoot failed jobs, coordinate with IT on API or file-based connections, and confirm data flows correctly between Slate and the Student Information System. Similar efforts occur with other integrated systems, such as the OIR Data Warehouse, in-house systems, etc. Process improvements : Working with all stakeholders (both Graduate School and departmental staff), conduct process analyses, identify inefficiencies in workflows, document pain points and bottlenecks, design streamlined solutions, and implement configuration updates and automation to reduce manual work. Follow up with continuous improvement strategies. User experience enhancements : Gather user feedback and adjust functionality to support evolving needs by configuring forms, portals, dashboards, reports, and communication templates to improve ease of use. Provide user training through documentation, video tutorials, live sessions, etc. Percentage of time: 50 Duties/Responsibilities: Design, implement, and maintain application data models, schemas, and contexts to support business processes and application logic. Percentage of time: 20 Duties/Responsibilities: Gather user requirements for new features, improvements, and bug fixes; ensure timely implementation. Percentage of time: 15 Duties/Responsibilities: Design, test, and document queries, rules, and reports. Percentage of time: 15 Contact Details: For questions concerning this position or recruitment progression, please refer to the Recruitment Contact listed below. Recruitment Contact Name: Andrey Dub Recruitment Contact Email: Recruitment Contact Phone:
01/14/2026
Full time
Posting Number: S14192P Working Title: Data System Administrator Department: Grad Sch-Technology Office About the University of Georgia: Chartered by the state of Georgia in 1785, the University of Georgia is the birthplace of public higher education in America and is the state's flagship university () . The proof is in our more than 240 years of academic and professional achievements and our continual commitment to higher education. UGA is currently ranked among the top 20 public universities in U.S. News & World Report. The University's main campus is located in Athens, approximately 65 miles northeast of Atlanta, with extended campuses in Atlanta, Griffin, Gwinnett, and Tifton. UGA employs approximately 3,100 faculty and more than 7,700 full-time staff. The University's enrollment exceeds 41,000 students including over 31,000 undergraduates and over 10,000 graduate and professional students. Academic programs reside in 19 schools and colleges, including our newly established School of Medicine. College/Unit/Department website: Posting Type: External Retirement Plan: TRS or ORP Employment Type: Employee Benefits Eligibility: Benefits Eligible Full/Part time: Full Time Additional Schedule Information: 8 am-5 pm, Monday-Friday Advertised Salary: Negotiable Posting Date: 09/26/2025 Open until filled: Yes Proposed Starting Date: 10/15/2025 Location of Vacancy: Athens Area EEO Policy Statement: The University of Georgia is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to age, color, disability, genetic information, national origin, race, religion, sex, or veteran status or other protected status. Persons needing accommodations or assistance with the accessibility of materials related to this search are encouraged to contact Central HR ( ). USG Core Values Statement: The University System of Georgia is comprised of our 26 institutions of higher education and learning, as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Classification Title: Application Analyst II FLSA: Exempt FTE: 1.00 Minimum Qualifications: Bachelor's degree in a related field or equivalent and 2 years of professional experience Preferred Qualifications: Experience working with Banner, APIs, and web services Training in business process analysis and business process management (BPM) Training in user experience (UX) and user interface (UI) design Experience working with enterprise resource planning (ERP) systems Position Summary: The Data System Administrator will play a key role in the operational management of the Slate system for the Graduate School, with responsibility for designing and implementing automated business processes. This position will provide system support to campus users and stakeholders through workshops, training resources, and the development of a comprehensive knowledge base. The role requires expertise in data analytics, data management, and query/report development. The administrator will act as an analyst for the Graduate School, designing, administering, and documenting data fields and flows; collaborating with stakeholders; and troubleshooting data-related issues. Additionally, the position will work with IT professionals on data integration projects involving forms, reports, rules, imports/exports, and related processes. Knowledge, Skills, Abilities and/or Competencies: Minimum Qualifications Bachelor's degree in information systems, computer science, data science, or a related discipline Demonstrated experience working with relational databases and SQL Demonstrated experience with web-based applications and online form design Ability to work independently and manage multiple priorities Excellent written and oral communication skills Strong attention to detail and accuracy Physical Demands: Prolonged periods of sitting Extensive use of keyboard, mouse, and monitor Is driving a responsibility of this position?: No Is this a Position of Trust?: Yes Does this position have operation, access, or control of financial resources?: No Does this position require a P-Card? : No Is having a P-Card an essential function of this position? : No Does this position have direct interaction or care of children under the age of 18 or direct patient care?: No Does this position have Security Access (e.g., public safety, IT security, personnel records, patient records, or access to chemicals and medications): Yes Credit and P-Card policy: Be advised a credit check will be required for all positions with financial responsibilities. For additional information about the credit check criteria, visit the UGA Credit Background Check website . Background Investigation Policy: Offers of employment are contingent upon completion of a background investigation including, a criminal background check demonstrating your eligibility for employment with the University of Georgia; confirmation of the credentials and employment history reflected in your application materials (including reference checks) as they relate to the job-based requirements of the position applied for; and, if applicable, a satisfactory credit check. You may also be subject to a pre-employment drug test for positions with high-risk responsibilities, if applicable. Please visit the UGA Background Check website . Duties/Responsibilities: Data curation : Monitor data imports and exports, validate accuracy, troubleshoot and resolve discrepancies, and ensure data integrity and timeliness across systems. System integration (e.g., SIS) : Oversee scheduled integrations, troubleshoot failed jobs, coordinate with IT on API or file-based connections, and confirm data flows correctly between Slate and the Student Information System. Similar efforts occur with other integrated systems, such as the OIR Data Warehouse, in-house systems, etc. Process improvements : Working with all stakeholders (both Graduate School and departmental staff), conduct process analyses, identify inefficiencies in workflows, document pain points and bottlenecks, design streamlined solutions, and implement configuration updates and automation to reduce manual work. Follow up with continuous improvement strategies. User experience enhancements : Gather user feedback and adjust functionality to support evolving needs by configuring forms, portals, dashboards, reports, and communication templates to improve ease of use. Provide user training through documentation, video tutorials, live sessions, etc. Percentage of time: 50 Duties/Responsibilities: Design, implement, and maintain application data models, schemas, and contexts to support business processes and application logic. Percentage of time: 20 Duties/Responsibilities: Gather user requirements for new features, improvements, and bug fixes; ensure timely implementation. Percentage of time: 15 Duties/Responsibilities: Design, test, and document queries, rules, and reports. Percentage of time: 15 Contact Details: For questions concerning this position or recruitment progression, please refer to the Recruitment Contact listed below. Recruitment Contact Name: Andrey Dub Recruitment Contact Email: Recruitment Contact Phone:
Department Summary The UCLA Information Security team enables UCLA's mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university's digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality.The Identity & Access Management team protects UCLA's resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards. Position Summary The UCLA Information Security team enables UCLA's mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university's digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality. The Identity & Access Management team protects UCLA's resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards. The Supervisor, Identity and Access Management (IAM) oversees, maintains, and actively participates in daily operations, service delivery and continuous improvement of UCLA's enterprise IAM services and technologies. This includes supervising a team of analysts, managing digital identities and ensuring that the appropriate access controls are enforced across UCLA's information systems. The supervisor oversees the account provisioning and user identity life cycle management, authentication systems, Single Sign On (SSO), directory services, and access governance. They are responsible to actively implement, configure, troubleshoot, and resolve technical issues daily, ensuring that IAM systems operate effectively and securely. They may support resolution of highly complex escalated issues or inquiries. The role also involves supervising project timelines, allocating resources, leading product lifecycle activities, and ensuring alignment with security standards, best practices and institutional goals. The Supervisor collaborates with DTS leadership, cross-functional teams, and campus stakeholders to prioritize delivery plans, define acceptance criteria, and refine IAM services based on user feedback and performance metrics. This position requires balancing operational leadership with people supervision, fostering a productive, inclusive, and responsive service environment. The Supervisor, Identity & Access Management will positively impact UCLA's operations and culture by protecting University stakeholders' information and data in service of the institution's academic mission. This team member will advance the University's mission by delivering exceptional security service comprehensively and consistently across faculty, staff, and students. This role will execute UCLA's vision while modeling UCLA's culture and values. Salary & Compensation UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit UC Benefit package to discover benefits that start on day one, and UC Total Compensation Estimator to calculate the total compensation value with benefits. QualificationsFive years Experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Required) Two years Experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Required) Experienced in managing and optimizing IAM operations to support organizational goals. (Required) Demonstrated experience presenting complex technical information to audiences of technical and non-technical stakeholders. (Required) Extensive experience solving technical and non-technical problems; able to delegate solutioning s. Able to lead data gathering efforts seeking information from diverse sources. (Required) Experience as a point of escalation. understanding of how decisions affect teams. ability to make decisions with integrity. (Required) Demonstrated experience providing inclusive leadership of others, cultivating an inclusive environment that values equity, diversity, inclusion and belonging. (Required) Has demonstrated experience leading in an ever-changing, fast-paced environment. (Required) Seven or more years Experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Preferred) Five or more years Experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Preferred) Experience in complex higher education environments, serving academic and administrative functions of a large public university. (Preferred) Thorough operational understanding of directory services (e.g., Active Directory, LDAP), Single Sign-On (SSO) technologies, multi-factor authentication (MFA) solutions, role-based access control (RBAC), identity governance and administration (IGA), and privileged access management (PAM). (Required)Demonstrated understanding of privacy and security regulations and best practices, including federal and state laws, policies and standards, as well as knowledge about security regulations relevant to higher education. (Required)Demonstrated interpersonal skills in order to communicate with both technical and non-technical personnel at various levels in organization. (Required)Has practical, operational knowledge in the field of IAM sufficient to contribute to tactical planning and the assessment and direction of current technologies. (Required)Advanced written and verbal communication skills and is able to communicate work assignments to medium-sized teams. (Required)Demonstrated leadership / management skills, including abilities in persuasion, negotiation, change management, and mentorship. (Required)Advanced project management skills with demonstrated experience delegating responsibility, tracking project progress, supervising others, and advising teams on competing priorities. (Required)Inspires creativity in others and advises teams on industry-leading practices, such as the incorporation of new technologies or processes. (Required)Education, Licenses, Certifications & Personal AffiliationsBachelor's Degree in one or more of the following fields: information technology, cybersecurity, computer science, public administration, business administration, communications, or a related field. (Required) Bachelor's Degree in one or more of the following fields: information technology, cybersecurity, computer science, public administration, business administration, communications. (Preferred) Special Conditions for Employment The anticipated pay range for this position is $105,700.00 - $160,000.00, annually; salary is dependent upon the skills and experience of the selected finalist. NOTE: This position REQUIRES that a RESUME and COVER LETTER be submitted in addition to the application. Please have these two files ready to upload when applying. Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation. . click apply for full job details
01/14/2026
Full time
Department Summary The UCLA Information Security team enables UCLA's mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university's digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality.The Identity & Access Management team protects UCLA's resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards. Position Summary The UCLA Information Security team enables UCLA's mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university's digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality. The Identity & Access Management team protects UCLA's resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards. The Supervisor, Identity and Access Management (IAM) oversees, maintains, and actively participates in daily operations, service delivery and continuous improvement of UCLA's enterprise IAM services and technologies. This includes supervising a team of analysts, managing digital identities and ensuring that the appropriate access controls are enforced across UCLA's information systems. The supervisor oversees the account provisioning and user identity life cycle management, authentication systems, Single Sign On (SSO), directory services, and access governance. They are responsible to actively implement, configure, troubleshoot, and resolve technical issues daily, ensuring that IAM systems operate effectively and securely. They may support resolution of highly complex escalated issues or inquiries. The role also involves supervising project timelines, allocating resources, leading product lifecycle activities, and ensuring alignment with security standards, best practices and institutional goals. The Supervisor collaborates with DTS leadership, cross-functional teams, and campus stakeholders to prioritize delivery plans, define acceptance criteria, and refine IAM services based on user feedback and performance metrics. This position requires balancing operational leadership with people supervision, fostering a productive, inclusive, and responsive service environment. The Supervisor, Identity & Access Management will positively impact UCLA's operations and culture by protecting University stakeholders' information and data in service of the institution's academic mission. This team member will advance the University's mission by delivering exceptional security service comprehensively and consistently across faculty, staff, and students. This role will execute UCLA's vision while modeling UCLA's culture and values. Salary & Compensation UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit UC Benefit package to discover benefits that start on day one, and UC Total Compensation Estimator to calculate the total compensation value with benefits. QualificationsFive years Experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Required) Two years Experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Required) Experienced in managing and optimizing IAM operations to support organizational goals. (Required) Demonstrated experience presenting complex technical information to audiences of technical and non-technical stakeholders. (Required) Extensive experience solving technical and non-technical problems; able to delegate solutioning s. Able to lead data gathering efforts seeking information from diverse sources. (Required) Experience as a point of escalation. understanding of how decisions affect teams. ability to make decisions with integrity. (Required) Demonstrated experience providing inclusive leadership of others, cultivating an inclusive environment that values equity, diversity, inclusion and belonging. (Required) Has demonstrated experience leading in an ever-changing, fast-paced environment. (Required) Seven or more years Experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Preferred) Five or more years Experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Preferred) Experience in complex higher education environments, serving academic and administrative functions of a large public university. (Preferred) Thorough operational understanding of directory services (e.g., Active Directory, LDAP), Single Sign-On (SSO) technologies, multi-factor authentication (MFA) solutions, role-based access control (RBAC), identity governance and administration (IGA), and privileged access management (PAM). (Required)Demonstrated understanding of privacy and security regulations and best practices, including federal and state laws, policies and standards, as well as knowledge about security regulations relevant to higher education. (Required)Demonstrated interpersonal skills in order to communicate with both technical and non-technical personnel at various levels in organization. (Required)Has practical, operational knowledge in the field of IAM sufficient to contribute to tactical planning and the assessment and direction of current technologies. (Required)Advanced written and verbal communication skills and is able to communicate work assignments to medium-sized teams. (Required)Demonstrated leadership / management skills, including abilities in persuasion, negotiation, change management, and mentorship. (Required)Advanced project management skills with demonstrated experience delegating responsibility, tracking project progress, supervising others, and advising teams on competing priorities. (Required)Inspires creativity in others and advises teams on industry-leading practices, such as the incorporation of new technologies or processes. (Required)Education, Licenses, Certifications & Personal AffiliationsBachelor's Degree in one or more of the following fields: information technology, cybersecurity, computer science, public administration, business administration, communications, or a related field. (Required) Bachelor's Degree in one or more of the following fields: information technology, cybersecurity, computer science, public administration, business administration, communications. (Preferred) Special Conditions for Employment The anticipated pay range for this position is $105,700.00 - $160,000.00, annually; salary is dependent upon the skills and experience of the selected finalist. NOTE: This position REQUIRES that a RESUME and COVER LETTER be submitted in addition to the application. Please have these two files ready to upload when applying. Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation. . click apply for full job details
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The CX Compliance team is essential in ensuring that our global CX Compliance Operations function efficiently, comply with regulatory requirements, and consistently deliver high-quality resolutions. As an Analyst, Compliance TMS Operations within the CX Compliance team, you will be responsible for conducting end-to-end Transaction Monitoring investigations for customers (individuals/entities) that may lead to drafting and filing a SAR. You will work extensively with functional leaders in the Financial Crime Risk Service line and support functions to maintain production and quality of the highest standard. You will work independently, prioritizing multiple tasks with minimal guidance, and remain open to feedback from all levels to drive continuous improvement in compliance handling. What you'll be doing: Minimum of 2 years of relevant experience in financial services, crypto, investigations, legal, or the tech industry, with a focus on TMS, compliance, or regulatory matters. Relevant experience in SAR narrative drafting and filing Conduct investigative review and analysis in support of company's BSA/AML regulatory compliance policies and programs including investigating automated alerts from our transaction monitoring systems, and referrals sourced from law enforcement requests and other company lines of business Analyze transaction activity and KYC information and conduct due diligence research in support of investigations as well as interpret evidence from external tools and systems to determine the legitimacy of customer behavior across multiple products Document investigations in written narratives Decide whether activity warrants escalation for additional review and subsequently recommend whether activity appears suspicious and warrants filing of a suspicious activity report Incorporate feedback from Quality Assurance Team Maintain detailed documentation to demonstrate compliance with regulations and internal policies and procedures Remain current with industry standards and developments in the areas of KYC, BSA/AML, and OFAC, and apply regulatory requirements and internal policies and procedures to case investigation Review data from systems and following Coinbase procedures to investigate, decide, and document transaction monitoring alerts What we look for in you: Strong interpersonal, analytical, and communication (verbal and written) skills Experience working with Google Sheet, Google Doc, Excel, Word Flexible and adaptable to the evolving needs of a high-growth and fast paced organization environment Ready to support in 24 7 environment Organized with a High level of attention to detail Nice to haves: Professional certification in AML or Fraud (e.g. CAMS, CFCS, CFE) Experience in project management, analytics, or vendor management Advanced degree in business, finance, or customer experience (CX) Proficiency with tools such as Google apps, JIRA, Hummingbird, and Salesforce Service Cloud. Experience collaborating with external outsource business partners Note: This role requires full-time, in-office presence at our Charlotte location. In order to support the 24/7 nature of cryptocurrency, shifts may include weekend and night. Job #: G2709 Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k . Pay Range: $41.27 $41.27 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Employee Rights and the Know Your Rights notices by clicking on their corresponding links. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations at to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here) . Global Data Privacy Notice for Job Candidates and Applicants Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here . By submitting your application, you are agreeing to our use and processing of your data as required. AI Disclosure For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment . To request a reasonable accommodation due to disability, please contact accommodations at
12/19/2025
Full time
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The CX Compliance team is essential in ensuring that our global CX Compliance Operations function efficiently, comply with regulatory requirements, and consistently deliver high-quality resolutions. As an Analyst, Compliance TMS Operations within the CX Compliance team, you will be responsible for conducting end-to-end Transaction Monitoring investigations for customers (individuals/entities) that may lead to drafting and filing a SAR. You will work extensively with functional leaders in the Financial Crime Risk Service line and support functions to maintain production and quality of the highest standard. You will work independently, prioritizing multiple tasks with minimal guidance, and remain open to feedback from all levels to drive continuous improvement in compliance handling. What you'll be doing: Minimum of 2 years of relevant experience in financial services, crypto, investigations, legal, or the tech industry, with a focus on TMS, compliance, or regulatory matters. Relevant experience in SAR narrative drafting and filing Conduct investigative review and analysis in support of company's BSA/AML regulatory compliance policies and programs including investigating automated alerts from our transaction monitoring systems, and referrals sourced from law enforcement requests and other company lines of business Analyze transaction activity and KYC information and conduct due diligence research in support of investigations as well as interpret evidence from external tools and systems to determine the legitimacy of customer behavior across multiple products Document investigations in written narratives Decide whether activity warrants escalation for additional review and subsequently recommend whether activity appears suspicious and warrants filing of a suspicious activity report Incorporate feedback from Quality Assurance Team Maintain detailed documentation to demonstrate compliance with regulations and internal policies and procedures Remain current with industry standards and developments in the areas of KYC, BSA/AML, and OFAC, and apply regulatory requirements and internal policies and procedures to case investigation Review data from systems and following Coinbase procedures to investigate, decide, and document transaction monitoring alerts What we look for in you: Strong interpersonal, analytical, and communication (verbal and written) skills Experience working with Google Sheet, Google Doc, Excel, Word Flexible and adaptable to the evolving needs of a high-growth and fast paced organization environment Ready to support in 24 7 environment Organized with a High level of attention to detail Nice to haves: Professional certification in AML or Fraud (e.g. CAMS, CFCS, CFE) Experience in project management, analytics, or vendor management Advanced degree in business, finance, or customer experience (CX) Proficiency with tools such as Google apps, JIRA, Hummingbird, and Salesforce Service Cloud. Experience collaborating with external outsource business partners Note: This role requires full-time, in-office presence at our Charlotte location. In order to support the 24/7 nature of cryptocurrency, shifts may include weekend and night. Job #: G2709 Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k . Pay Range: $41.27 $41.27 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Employee Rights and the Know Your Rights notices by clicking on their corresponding links. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations at to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here) . Global Data Privacy Notice for Job Candidates and Applicants Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here . By submitting your application, you are agreeing to our use and processing of your data as required. AI Disclosure For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment . To request a reasonable accommodation due to disability, please contact accommodations at
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Compliance team within Customer Experience (CX) is responsible for developing and delivering best in class support across multiple customer segments. The Global Compliance Operations Team is responsible for executing Compliance controls with adherence to Coinbase's BSA/AML program, transaction monitoring, KYC, CDD, and EDD policies, procedures and standards appropriate for each jurisdiction in which Coinbase operates. As a Compliance Support Supervisor, you will lead a team of 10-15 Compliance Analysts responsible for enhanced due diligence (EDD), transaction monitoring, to include preparation and filing of Suspicious Activity Reports (SAR). The supervisor sets a culture of ownership and customer focus on their teams by supporting individual and team goals and ensuring best in class customer service experiences through the team. Supervisors also identify broader customer impacting issues and work with technical and nontechnical teams to implement solutions to drive quality and productivity of operations. What you'll be doing: Lead a team of 10-15 Compliance (Transaction Monitoring / AML and Fraud Investigations/EDD) Analysts; Ensure adherence to operational KPIs from directs and vendor partners or overall performance and the quality. Coordinate with senior management and provide insights for process improvement. Communicate effectively with your team to drive individual and group performance. Champion change management with your team. Ask the question "How does this create value for customers" when making decision Lead a "culture of compliance" Subject matter expert in AML compliance Partner with Financial Crimes and second line compliance partners to execute against Coinbase's AML program What we look for in you: Bachelor's degree or 3+ years of experience within the Compliance field. 2-3+ year of supervisory experience Working knowledge of financial laws, regulations, and guidelines (e.g., BSA, OFAC, FinCEN guidance) Positive energy on the future of crypto and Web3 Excellent communication skills (written and verbal), ability to simplify complex topics for broad audiences Experience working computers and multiple software and database systems Ability to thrive in ambiguous environments Nice to haves: Compliance Industry certification (e.g. ACAMS) Advanced understanding of Google apps Project Management, Scrum, Agile, or Lean 6S certification/experience. Familiarity with the Coinbase suite of products Note: This role requires full-time, in-office presence at our Charlotte location. Job #: G2707 Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k . Pay Range: $117,385 $117,385 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Employee Rights and the Know Your Rights notices by clicking on their corresponding links. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations at to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here) . Global Data Privacy Notice for Job Candidates and Applicants Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here . By submitting your application, you are agreeing to our use and processing of your data as required. AI Disclosure For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment . To request a reasonable accommodation due to disability, please contact accommodations at
12/19/2025
Full time
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Compliance team within Customer Experience (CX) is responsible for developing and delivering best in class support across multiple customer segments. The Global Compliance Operations Team is responsible for executing Compliance controls with adherence to Coinbase's BSA/AML program, transaction monitoring, KYC, CDD, and EDD policies, procedures and standards appropriate for each jurisdiction in which Coinbase operates. As a Compliance Support Supervisor, you will lead a team of 10-15 Compliance Analysts responsible for enhanced due diligence (EDD), transaction monitoring, to include preparation and filing of Suspicious Activity Reports (SAR). The supervisor sets a culture of ownership and customer focus on their teams by supporting individual and team goals and ensuring best in class customer service experiences through the team. Supervisors also identify broader customer impacting issues and work with technical and nontechnical teams to implement solutions to drive quality and productivity of operations. What you'll be doing: Lead a team of 10-15 Compliance (Transaction Monitoring / AML and Fraud Investigations/EDD) Analysts; Ensure adherence to operational KPIs from directs and vendor partners or overall performance and the quality. Coordinate with senior management and provide insights for process improvement. Communicate effectively with your team to drive individual and group performance. Champion change management with your team. Ask the question "How does this create value for customers" when making decision Lead a "culture of compliance" Subject matter expert in AML compliance Partner with Financial Crimes and second line compliance partners to execute against Coinbase's AML program What we look for in you: Bachelor's degree or 3+ years of experience within the Compliance field. 2-3+ year of supervisory experience Working knowledge of financial laws, regulations, and guidelines (e.g., BSA, OFAC, FinCEN guidance) Positive energy on the future of crypto and Web3 Excellent communication skills (written and verbal), ability to simplify complex topics for broad audiences Experience working computers and multiple software and database systems Ability to thrive in ambiguous environments Nice to haves: Compliance Industry certification (e.g. ACAMS) Advanced understanding of Google apps Project Management, Scrum, Agile, or Lean 6S certification/experience. Familiarity with the Coinbase suite of products Note: This role requires full-time, in-office presence at our Charlotte location. Job #: G2707 Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k . Pay Range: $117,385 $117,385 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Employee Rights and the Know Your Rights notices by clicking on their corresponding links. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations at to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here) . Global Data Privacy Notice for Job Candidates and Applicants Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here . By submitting your application, you are agreeing to our use and processing of your data as required. AI Disclosure For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment . To request a reasonable accommodation due to disability, please contact accommodations at