Title: Senior IT manager Location: Jackson, MS Position type: Contract 1. -Strong Governance and Accountability - Confirms IT practices align with internal policies, governance and regulatory expectations - Provides objective, third party validation for senior managers, executives and board members - Reduces conflicts of interest by producing fact- based assessments and where possible win/win outcomes 2. Legal and Regulatory Risk Reduction - Identifies gaps in compliance with laws and regulations (e.g., data protection, cybersecurity, State and Federal rules) - Helps prevent fines, sanctions, litigation and federal enforcement action from Department of Labor - Ensure IT controls support legal obligations such as data retention, and breach notifications 3. Improves Policy Effectiveness Evaluates whether IT policies are: a) Legally sound b) Up to date with current state and federal laws and standards c) Properly implemented and enforced Also highlights inconsistencies between written policies and actual IT practices 4. Better Decision Making for Leadership - Provides clear, unbiased insight to support strategic decisions - Translates technical findings into legal and policy implications executives can understand - Prioritizes remediation based on business, legal and compliance risk - not just technical severity - Identifies opportunities for organizational improvement through IT best practices adoption 5. Cost Savings, Avoidance and Mid to Long-Terms Efficiency - Prevents costly remediation after incidents or regulatory findings - Identifies redundant outdated or non-compliant systems - Aligns IT Investments with Legal and Policy Priorities 6. Clear, Actionable Roadmap Delivers prioritized recommendation spanning: a) technical controls b) Policy updates c) Legal compliance d) Help coordinate IT, Legal, compliance and risk teams effectively Qualifications: 1. Technical and Domain expertise - Deep knowledge in IT, Finance, HR management - Ability to Analyze complex problems and design practical yet simple solution - Industry best practices and regulatory awareness - Knowledge of Mississippi public sector IT practices and landscape 2. Analytical and Problem-Solving Skills - Strong data analysis and critical thinking abilities - Ability to diagnose business, application, and legal challenges and identify root causes - Experience in developing actionable recommendations 3. Communication Skills - Excellent written and verbal communication - Ability to explain complex concepts to non-technical stakeholders - Strong presentation and reporting skills 4. Client and Stakeholder Management - Relationship-building and trust management - Ability to manage client expectations and scope - Professional negotiation and conflict resolution 5. Project Management - Planning, executing and delivery of consulting engagements - Time management and prioritization across multiple stakeholders/clients - Risk identification and mitigation 6. Business and Commercial Skills - Proposal writing and contract negotiation - Budgeting, pricing, financial analysis, and forecasting 7. Self- Management and Independence - Ability to work autonomously and with minimal supervision - Strong organizational and decision-making skills - Accountability for deliverables and outcomes Additional Qualifications: Bachelor's or Master's degree 10 +years working for large consulting company 10 + years delivering consulting or advisory services 5+ years working for any Mississippi state agency 10 + years working in an Oversight capacity Experience working with the Department of Labor Prior experience as a contractor, freelancer of consultant
04/05/2026
Title: Senior IT manager Location: Jackson, MS Position type: Contract 1. -Strong Governance and Accountability - Confirms IT practices align with internal policies, governance and regulatory expectations - Provides objective, third party validation for senior managers, executives and board members - Reduces conflicts of interest by producing fact- based assessments and where possible win/win outcomes 2. Legal and Regulatory Risk Reduction - Identifies gaps in compliance with laws and regulations (e.g., data protection, cybersecurity, State and Federal rules) - Helps prevent fines, sanctions, litigation and federal enforcement action from Department of Labor - Ensure IT controls support legal obligations such as data retention, and breach notifications 3. Improves Policy Effectiveness Evaluates whether IT policies are: a) Legally sound b) Up to date with current state and federal laws and standards c) Properly implemented and enforced Also highlights inconsistencies between written policies and actual IT practices 4. Better Decision Making for Leadership - Provides clear, unbiased insight to support strategic decisions - Translates technical findings into legal and policy implications executives can understand - Prioritizes remediation based on business, legal and compliance risk - not just technical severity - Identifies opportunities for organizational improvement through IT best practices adoption 5. Cost Savings, Avoidance and Mid to Long-Terms Efficiency - Prevents costly remediation after incidents or regulatory findings - Identifies redundant outdated or non-compliant systems - Aligns IT Investments with Legal and Policy Priorities 6. Clear, Actionable Roadmap Delivers prioritized recommendation spanning: a) technical controls b) Policy updates c) Legal compliance d) Help coordinate IT, Legal, compliance and risk teams effectively Qualifications: 1. Technical and Domain expertise - Deep knowledge in IT, Finance, HR management - Ability to Analyze complex problems and design practical yet simple solution - Industry best practices and regulatory awareness - Knowledge of Mississippi public sector IT practices and landscape 2. Analytical and Problem-Solving Skills - Strong data analysis and critical thinking abilities - Ability to diagnose business, application, and legal challenges and identify root causes - Experience in developing actionable recommendations 3. Communication Skills - Excellent written and verbal communication - Ability to explain complex concepts to non-technical stakeholders - Strong presentation and reporting skills 4. Client and Stakeholder Management - Relationship-building and trust management - Ability to manage client expectations and scope - Professional negotiation and conflict resolution 5. Project Management - Planning, executing and delivery of consulting engagements - Time management and prioritization across multiple stakeholders/clients - Risk identification and mitigation 6. Business and Commercial Skills - Proposal writing and contract negotiation - Budgeting, pricing, financial analysis, and forecasting 7. Self- Management and Independence - Ability to work autonomously and with minimal supervision - Strong organizational and decision-making skills - Accountability for deliverables and outcomes Additional Qualifications: Bachelor's or Master's degree 10 +years working for large consulting company 10 + years delivering consulting or advisory services 5+ years working for any Mississippi state agency 10 + years working in an Oversight capacity Experience working with the Department of Labor Prior experience as a contractor, freelancer of consultant
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post-secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills and Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem-solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point of market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Job Range Target Minimum: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Regions offers a benefits package that is flexible, comprehensive and recognizes that "one size does not fit all" for benefits eligible associates. Listed below is a synopsis of the benefits offered by Regions for informational purposes, which is not intended to be a complete summary of plan terms and conditions. Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please copy the link below to your browser. Location Details Riverchase Operations Center Location: Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/05/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post-secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills and Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem-solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point of market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Job Range Target Minimum: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Regions offers a benefits package that is flexible, comprehensive and recognizes that "one size does not fit all" for benefits eligible associates. Listed below is a synopsis of the benefits offered by Regions for informational purposes, which is not intended to be a complete summary of plan terms and conditions. Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please copy the link below to your browser. Location Details Riverchase Operations Center Location: Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City Fort Meade State MD Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in Ft Meade, MD, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in Ft Meade, MD up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City Fort Meade State MD Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in Ft Meade, MD, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in Ft Meade, MD up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
04/04/2026
Full time
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/02/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
Join to apply for the Sr. Manager, Security Product Research role at Corelight. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can't avoid leaving digital footprints on the networks they traverse. Built on open-source innovations from Zeek, Suricata and YARA and refined through years of real-world use, Corelight transforms network footprints from physical, virtual and cloud networks into actionable insights. Our customers use these insights to speed incident response and proactively hunt for threats. We are building a world class and uniquely targeted team to drive security product research through rapid prototyping and testing. The ideal candidate will use their strong analytical skills and awareness of network and cloud security data to drive novel, fast, and effective security product prototypes using the latest technology. Corelight is uniquely positioned to forge the path for network detection and response, you will have the opportunity to contribute to this future through the expansive bounds of this position. You will be able to look back a year from now and say two things with pride: first, "I helped to build that." and second, "We are generating insights that no one else in the world has achieved." As the leader of Corelight's Security Product Prototype team, you will work closely with product leaders, engineering, and network security experts to explore, design, test, and build prototype solutions for challenging network security problems. You will play a crucial role in defining the art of the possible for future products at Corelight and defining the standard for network detection in cyber security. Responsibilities Drive innovation across Corelight through thought leadership. Act as a leader and technical SME within the Product organization. Lead early prototype development of the next generation of products at Corelight through the use of rapid prototyping, testing and proof of concepts. Work closely with product leaders, security researchers, and engineering leaders on the next generation of network security products. Leveraging existing capabilities, find ways to improve customer usability, deployment and consumption of Corelight products. Using a sense of curiosity and drive for innovation, develop new product ideas and features within existing products. Drive proof of concept ideas from inception through customer fielding and testing. Act as an advocate for innovation within Corelight and its customer base. Utilize AI LLM for rapid development and feature execution. Minimum Qualifications Strong appreciation for our core values: low ego results, tireless service, and applied curiosity. 7+ years experience in rapid development across a full stack environment, to include cloud, containers, orchestration, and modern programming languages (golang preferred). Strong understanding of virtualization environments and orchestration solutions such as Kubernetes. Experience in computer networking, understanding layer 2-7 of the OSI model and how each layer contributes to the operational network. Understanding of network security concepts such as encryption, protocol abuses, and patterns of attack. Participate in highly technical discussions across multiple teams within Corelight. Utilize customer centric communication skills to interact both internally and externally. Preferred Qualifications Experience with SIEMs such as Splunk or Elastic. Experience adopting and using Agile development tools and methodologies, and working in a distributed team. Understanding of security operations, threat hunting, and incident response. Excellent communication skills with experience collaborating across UX, engineering, and product teams. Familiarity with data analytics, AI-assisted security decision-making, and automation. Education: Degrees in Computer Science, Cybersecurity, or related technical disciplines (or equivalent experience). Fueled by investments from top-tier venture capital organizations such as Crowdstrike, Accel and Insight, Corelight is the fastest growing network detection and response platform in the industry. Our customers trust us to protect mission-critical assets in leading enterprises, government, and research institutions worldwide. We are leading the way with AI-assisted workflows, machine learning models, cloud security and SaaS-based solutions to arm defenders with the tools and knowledge they need to disrupt cyber attacks. Our team of passionate innovators are dedicated to solving some of the toughest challenges in cybersecurity, while fostering a collaborative, inclusive, and growth-oriented culture. Corelight is committed to a geographically distributed yet connected employee base with employees working from home and office locations around the world. At Corelight, we take pride in the diversity of our backgrounds and perspectives, and we are committed to fostering an inclusive environment that strengthens our company. We are looking forward to meeting you. Check us out at . Notice of Pay Transparency The compensation for this position may vary depending on factors such as your location, skills and experience. Depending on the nature and seniority of the role, a percentage of compensation may come in the form of a commission-based or discretionary bonus. Equity and additional benefits will also be awarded. Compensation Range $221,000 - $268,000 USD Seniority level: Mid-Senior level. Employment type: Full-time. Job function: Product Management and Marketing. Industries: Technology, Information and Internet.
04/02/2026
Full time
Join to apply for the Sr. Manager, Security Product Research role at Corelight. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can't avoid leaving digital footprints on the networks they traverse. Built on open-source innovations from Zeek, Suricata and YARA and refined through years of real-world use, Corelight transforms network footprints from physical, virtual and cloud networks into actionable insights. Our customers use these insights to speed incident response and proactively hunt for threats. We are building a world class and uniquely targeted team to drive security product research through rapid prototyping and testing. The ideal candidate will use their strong analytical skills and awareness of network and cloud security data to drive novel, fast, and effective security product prototypes using the latest technology. Corelight is uniquely positioned to forge the path for network detection and response, you will have the opportunity to contribute to this future through the expansive bounds of this position. You will be able to look back a year from now and say two things with pride: first, "I helped to build that." and second, "We are generating insights that no one else in the world has achieved." As the leader of Corelight's Security Product Prototype team, you will work closely with product leaders, engineering, and network security experts to explore, design, test, and build prototype solutions for challenging network security problems. You will play a crucial role in defining the art of the possible for future products at Corelight and defining the standard for network detection in cyber security. Responsibilities Drive innovation across Corelight through thought leadership. Act as a leader and technical SME within the Product organization. Lead early prototype development of the next generation of products at Corelight through the use of rapid prototyping, testing and proof of concepts. Work closely with product leaders, security researchers, and engineering leaders on the next generation of network security products. Leveraging existing capabilities, find ways to improve customer usability, deployment and consumption of Corelight products. Using a sense of curiosity and drive for innovation, develop new product ideas and features within existing products. Drive proof of concept ideas from inception through customer fielding and testing. Act as an advocate for innovation within Corelight and its customer base. Utilize AI LLM for rapid development and feature execution. Minimum Qualifications Strong appreciation for our core values: low ego results, tireless service, and applied curiosity. 7+ years experience in rapid development across a full stack environment, to include cloud, containers, orchestration, and modern programming languages (golang preferred). Strong understanding of virtualization environments and orchestration solutions such as Kubernetes. Experience in computer networking, understanding layer 2-7 of the OSI model and how each layer contributes to the operational network. Understanding of network security concepts such as encryption, protocol abuses, and patterns of attack. Participate in highly technical discussions across multiple teams within Corelight. Utilize customer centric communication skills to interact both internally and externally. Preferred Qualifications Experience with SIEMs such as Splunk or Elastic. Experience adopting and using Agile development tools and methodologies, and working in a distributed team. Understanding of security operations, threat hunting, and incident response. Excellent communication skills with experience collaborating across UX, engineering, and product teams. Familiarity with data analytics, AI-assisted security decision-making, and automation. Education: Degrees in Computer Science, Cybersecurity, or related technical disciplines (or equivalent experience). Fueled by investments from top-tier venture capital organizations such as Crowdstrike, Accel and Insight, Corelight is the fastest growing network detection and response platform in the industry. Our customers trust us to protect mission-critical assets in leading enterprises, government, and research institutions worldwide. We are leading the way with AI-assisted workflows, machine learning models, cloud security and SaaS-based solutions to arm defenders with the tools and knowledge they need to disrupt cyber attacks. Our team of passionate innovators are dedicated to solving some of the toughest challenges in cybersecurity, while fostering a collaborative, inclusive, and growth-oriented culture. Corelight is committed to a geographically distributed yet connected employee base with employees working from home and office locations around the world. At Corelight, we take pride in the diversity of our backgrounds and perspectives, and we are committed to fostering an inclusive environment that strengthens our company. We are looking forward to meeting you. Check us out at . Notice of Pay Transparency The compensation for this position may vary depending on factors such as your location, skills and experience. Depending on the nature and seniority of the role, a percentage of compensation may come in the form of a commission-based or discretionary bonus. Equity and additional benefits will also be awarded. Compensation Range $221,000 - $268,000 USD Seniority level: Mid-Senior level. Employment type: Full-time. Job function: Product Management and Marketing. Industries: Technology, Information and Internet.
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
04/02/2026
Full time
About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realise people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyse these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organisation, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analysing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1 2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible for correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis on associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customised tactical and strategic remediation plans for compromised organisations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyse complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; passport required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organisations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it does not store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! Export Control Notice This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorisation to receive software or technology controlled under these U.S. export laws without sponsorship for an export licence. Equal Opportunity Statement Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and value diversity and inclusiveness . click apply for full job details
Boston Consulting Group (BCG)
Boston, Massachusetts
Who We Are Boston Consulting Group (BCG) is a global consulting firm that partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. Our success depends on a spirit of deep collaboration and a global community of diverse individuals determined to make the world and each other better every day. BCG's Tech and Digital Advantage (TDA) practice focuses on helping clients deliver competitive advantage and superior business performance through the use of data, technology and digital. Platinion is the fastest growing practice at BCG and at the heart of the strategic impact we have with our clients. Our consultants and experts globally work across all industries and provide deep experience and expertise across a number of topics including Digital Transformation, Data & Digital Platforms, AI at Scale, Agile, Cybersecurity and Digitizing the Tech Function. At BCG, we bring together the right people to conquer complexity, drive material change, and initiate positive, long-term impact. Explore our BCG Culture and Values for more information. About BCG Platinion BCG Platinion's presence spans across the globe, with offices in Asia, Europe, and South and North America. We achieve digital excellence for clients with sustained solutions to the most complex and time sensitive challenge. We guide clients into the future to push the status quo, overcome tech limitations, and enable our clients to go further in their digital journeys than what has ever been possible in the past. At BCG Platinion, we deliver business value through the innovative use of technology at a rapid pace. We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions. We balance vision with a pragmatic path to change transforming strategies into leading edge tech platforms, at scale. What You'll Do As a Cybersecurity Senior Consultant, you'll be given end to end responsibility for an individual 'module' within a BCG client engagement and begin to develop specialized knowledge to help you solve our clients' problems. You'll work on a variety of cybersecurity and digital risk topics, applying generalist consulting skills to strategic cybersecurity & digital risk questions. We are looking for someone who can address our clients' strategic, organizational, managerial, and operational issues using the most advanced cybersecurity methodologies, tools, and techniques. Cybersecurity Senior Consultants At BCG Platinion Are Technical experts. They are critical thinkers and have extensive cybersecurity expertise that drives innovative solutions. Business minded story tellers. They leverage their deep technical understanding of cybersecurity challenges and translate that into implications across the business value chain. Innovators. They understand and leverage cutting edge cybersecurity approaches and tactics to create customized solutions for clients. Change agents. They know how to make change happen across an organization. They can align and onboard teams to implement new cybersecurity process and toolsets. They embrace complex challenges and guide an organization to optimize their cybersecurity practices. Collaborative. They are interdisciplinary team players who seek alignment and establish relationships ranging from cross functional stakeholder groups to existing security teams. You're Good At Understanding the role technology plays in enabling businesses to execute their strategies and decomposing the cybersecurity implications of this relationship. Analyzing cybersecurity, requirements, and best practices into meaningful set of recommendations tailored to a client's unique environment and circumstances. Communicating complex and technical concepts in a concise and business value centric written form. Implementing cybersecurity transformation and culture change initiatives. Conducting cybersecurity assessments including gap analysis and roadmap development in multiple contexts, including organizations, product development, and cloud security. Developing cybersecurity strategies, policies, processes, and procedures to protect clients' internal infrastructure and their customers. Understanding data protection, data security, and privacy drivers that influence organizations today. Developing cybersecurity business strategies for technology product vendors that are integrated in the organizations overall business strategy and increase revenue and profits. Working with leadership teams, including facilitating board and senior management cybersecurity awareness workshops. Embedding product security and DevSecOps practices into the software development lifecycles, system designs, and IT architectures. Utilizing cyber risk quantification to reduce uncertainty around cyber risk and improve executive decision making. Creating and facilitating table top exercises. Delivering operational resilience through incident response, business continuity, and disaster recovery planning. What You'll Bring 4+ years of practical experience in cybersecurity consulting or cybersecurity management (with teams of five persons or more) in a variety of sectors and contexts. BS in cybersecurity, information systems, mathematics, natural sciences, business management, or similar degree. Hands on experience with, or extensive knowledge of some of the following: Developing cybersecurity strategies or policies. Quantifying and managing cybersecurity risk. Designing, transforming, implementing, and running cybersecurity programs. Assessing cybersecurity risks in AI platforms. Integrating security into applications and systems. Implementing cloud security. Managing cybersecurity risk arising from third parties and the supply chain. Designing / implementing identity and access management. Developing and upskilling a cybersecurity workforce. Delivering cybersecurity culture change, awareness, and training. Designing continuous monitoring programs incorporating SIEM tools, APT hunting, implementing UBA, etc. Designing / implementing vulnerability management, including conducting vulnerability assessments. Performing penetration testing, incident management, BCP, and/or DRP. Broad knowledge of cybersecurity technologies throughout organizational and acquisition lifecycle. Working knowledge of at least two different cybersecurity frameworks: NIST Cybersecurity Framework. C2M2 NIST SP 800-53 and companion publications. ISO/IEC 27000 family of standards, etc. Cloud Security Alliance CCM. Team oriented attitude. Strong communication and presentation skills. Outstanding analytical and conceptual skills. Results orientated mindset. Confidence and persuasiveness. Business fluent written and spoken English language skills. Willingness to travel around the globe to work with clients and BCG teams. At times, this role involves significant travel to client sites. The amount of travel will depend on client needs and nature of projects. Gen AI tool fluency (e.g., proven usage of GenAI such as ChatGPT, Claude) and validation of response. What We Offer An opportunity to work organically across disciplines and across BCG, we offer a unified and unrivaled opportunity that combines strategic thinking with hands on applications. A unique experience to work alongside a team of passionate and driven problem solvers with a mission to deliver innovative and valuable digital solutions in a supportive environment. BCG pioneered strategy consulting more than 50 years ago, and we continue to innovate and redefine the industry. We offer multiple career paths for the world's best talent to have a real impact on business and society. As part of our team, you will benefit from the breadth and diversity of what we are doing today and where we are headed next. We count on your authenticity, exceptional work, and strong integrity. In return we are committed to supporting you in discovering the most fulfilling career journey possible- and unlocking your potential to advance the world. Total compensation for this role includes base salary, annual discretionary performance bonus, contributions to BCG's retirement program, and a market leading benefits package. To learn more about our employee benefit please check our BCG Benefits page. Boston Consulting Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity / expression, national origin, disability, protected veteran status, or any other characteristic protected under national, provincial, or local law, where applicable, and those with criminal histories will be considered in a manner consistent with applicable state and local laws. BCG is an E Verify Employer. Click here for more information on E Verify.
04/02/2026
Full time
Who We Are Boston Consulting Group (BCG) is a global consulting firm that partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. Our success depends on a spirit of deep collaboration and a global community of diverse individuals determined to make the world and each other better every day. BCG's Tech and Digital Advantage (TDA) practice focuses on helping clients deliver competitive advantage and superior business performance through the use of data, technology and digital. Platinion is the fastest growing practice at BCG and at the heart of the strategic impact we have with our clients. Our consultants and experts globally work across all industries and provide deep experience and expertise across a number of topics including Digital Transformation, Data & Digital Platforms, AI at Scale, Agile, Cybersecurity and Digitizing the Tech Function. At BCG, we bring together the right people to conquer complexity, drive material change, and initiate positive, long-term impact. Explore our BCG Culture and Values for more information. About BCG Platinion BCG Platinion's presence spans across the globe, with offices in Asia, Europe, and South and North America. We achieve digital excellence for clients with sustained solutions to the most complex and time sensitive challenge. We guide clients into the future to push the status quo, overcome tech limitations, and enable our clients to go further in their digital journeys than what has ever been possible in the past. At BCG Platinion, we deliver business value through the innovative use of technology at a rapid pace. We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions. We balance vision with a pragmatic path to change transforming strategies into leading edge tech platforms, at scale. What You'll Do As a Cybersecurity Senior Consultant, you'll be given end to end responsibility for an individual 'module' within a BCG client engagement and begin to develop specialized knowledge to help you solve our clients' problems. You'll work on a variety of cybersecurity and digital risk topics, applying generalist consulting skills to strategic cybersecurity & digital risk questions. We are looking for someone who can address our clients' strategic, organizational, managerial, and operational issues using the most advanced cybersecurity methodologies, tools, and techniques. Cybersecurity Senior Consultants At BCG Platinion Are Technical experts. They are critical thinkers and have extensive cybersecurity expertise that drives innovative solutions. Business minded story tellers. They leverage their deep technical understanding of cybersecurity challenges and translate that into implications across the business value chain. Innovators. They understand and leverage cutting edge cybersecurity approaches and tactics to create customized solutions for clients. Change agents. They know how to make change happen across an organization. They can align and onboard teams to implement new cybersecurity process and toolsets. They embrace complex challenges and guide an organization to optimize their cybersecurity practices. Collaborative. They are interdisciplinary team players who seek alignment and establish relationships ranging from cross functional stakeholder groups to existing security teams. You're Good At Understanding the role technology plays in enabling businesses to execute their strategies and decomposing the cybersecurity implications of this relationship. Analyzing cybersecurity, requirements, and best practices into meaningful set of recommendations tailored to a client's unique environment and circumstances. Communicating complex and technical concepts in a concise and business value centric written form. Implementing cybersecurity transformation and culture change initiatives. Conducting cybersecurity assessments including gap analysis and roadmap development in multiple contexts, including organizations, product development, and cloud security. Developing cybersecurity strategies, policies, processes, and procedures to protect clients' internal infrastructure and their customers. Understanding data protection, data security, and privacy drivers that influence organizations today. Developing cybersecurity business strategies for technology product vendors that are integrated in the organizations overall business strategy and increase revenue and profits. Working with leadership teams, including facilitating board and senior management cybersecurity awareness workshops. Embedding product security and DevSecOps practices into the software development lifecycles, system designs, and IT architectures. Utilizing cyber risk quantification to reduce uncertainty around cyber risk and improve executive decision making. Creating and facilitating table top exercises. Delivering operational resilience through incident response, business continuity, and disaster recovery planning. What You'll Bring 4+ years of practical experience in cybersecurity consulting or cybersecurity management (with teams of five persons or more) in a variety of sectors and contexts. BS in cybersecurity, information systems, mathematics, natural sciences, business management, or similar degree. Hands on experience with, or extensive knowledge of some of the following: Developing cybersecurity strategies or policies. Quantifying and managing cybersecurity risk. Designing, transforming, implementing, and running cybersecurity programs. Assessing cybersecurity risks in AI platforms. Integrating security into applications and systems. Implementing cloud security. Managing cybersecurity risk arising from third parties and the supply chain. Designing / implementing identity and access management. Developing and upskilling a cybersecurity workforce. Delivering cybersecurity culture change, awareness, and training. Designing continuous monitoring programs incorporating SIEM tools, APT hunting, implementing UBA, etc. Designing / implementing vulnerability management, including conducting vulnerability assessments. Performing penetration testing, incident management, BCP, and/or DRP. Broad knowledge of cybersecurity technologies throughout organizational and acquisition lifecycle. Working knowledge of at least two different cybersecurity frameworks: NIST Cybersecurity Framework. C2M2 NIST SP 800-53 and companion publications. ISO/IEC 27000 family of standards, etc. Cloud Security Alliance CCM. Team oriented attitude. Strong communication and presentation skills. Outstanding analytical and conceptual skills. Results orientated mindset. Confidence and persuasiveness. Business fluent written and spoken English language skills. Willingness to travel around the globe to work with clients and BCG teams. At times, this role involves significant travel to client sites. The amount of travel will depend on client needs and nature of projects. Gen AI tool fluency (e.g., proven usage of GenAI such as ChatGPT, Claude) and validation of response. What We Offer An opportunity to work organically across disciplines and across BCG, we offer a unified and unrivaled opportunity that combines strategic thinking with hands on applications. A unique experience to work alongside a team of passionate and driven problem solvers with a mission to deliver innovative and valuable digital solutions in a supportive environment. BCG pioneered strategy consulting more than 50 years ago, and we continue to innovate and redefine the industry. We offer multiple career paths for the world's best talent to have a real impact on business and society. As part of our team, you will benefit from the breadth and diversity of what we are doing today and where we are headed next. We count on your authenticity, exceptional work, and strong integrity. In return we are committed to supporting you in discovering the most fulfilling career journey possible- and unlocking your potential to advance the world. Total compensation for this role includes base salary, annual discretionary performance bonus, contributions to BCG's retirement program, and a market leading benefits package. To learn more about our employee benefit please check our BCG Benefits page. Boston Consulting Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity / expression, national origin, disability, protected veteran status, or any other characteristic protected under national, provincial, or local law, where applicable, and those with criminal histories will be considered in a manner consistent with applicable state and local laws. BCG is an E Verify Employer. Click here for more information on E Verify.
Join to apply for the Director of IT Operations and Security role at Jobright.ai 2 days ago Be among the first 25 applicants Join to apply for the Director of IT Operations and Security role at Jobright.ai Get AI-powered advice on this job and more exclusive features. Jobright is an AI-powered career platform that helps job seekers discover the top opportunities in the US. We are NOT a staffing agency. Jobright does not hire directly for these positions. We connect you with verified openings from employers you can trust. Job Summary: The State Bar of California is responsible for licensing and regulating attorneys and supporting access to the legal system. They are seeking a Director of IT Operations and Security to provide strategic and operational leadership for their technology infrastructure, networking, end-user support services, and cybersecurity programs, ensuring reliable and secure IT services that align with organizational goals. Responsibilities: • Provide strategic leadership and direction for IT operations, infrastructure, and security to support the State Bar's mission and business objectives. • Serve as a key advisor to executive leadership and staff by providing assessments, analysis, and policy guidance on technology strategy, operational risks, security matters, and other technology issues to influence decisions that impact organizational success. • Contribute to IT strategic planning and organizational business continuity efforts, aligning operational initiatives with long-term goals. • Lead, mentor, and develop IT operations teams, fostering a culture of excellence, innovation, and continuous improvement. • Oversee and ensure the effective delivery of IT services, including end-user support, service desk operations, and incident management to maintain high user satisfaction. • Direct the planning, implementation, and optimization of technology infrastructure, leveraging advancements in cloud and emerging technologies to deliver reliable, scalable, and modern solutions that align with organizational needs. • Evaluate and recommend emerging technologies that enhance operational efficiency, security posture, and organizational capabilities. • Ensure the security and availability of the State Bar's information systems by establishing and enforcing robust cybersecurity strategies, policies, and standards. • Provide executive oversight of risk assessments, vulnerability management, and incident response to protect the organization from cybersecurity threats. • Ensure compliance with applicable data security, privacy regulations, and organizational policies through effective governance frameworks and controls. • Oversee asset management and lifecycle planning for hardware and software to ensure compliance with procurement policies and effective utilization of resources. • Develop, manage, and monitor operational and security budgets, ensuring efficient use of resources while delivering high-quality services. • Establish and oversee performance metrics, controls, and processes to ensure effective management of IT operations and continuous improvement. • Collaborate with internal audit, compliance, and risk management teams to address security and operational requirements proactively. • Build and maintain strong relationships with State Bar offices to understand business needs and deliver technology solutions that advance organizational goals. • Oversee vendor and service provider relationships to ensure optimal delivery of outsourced services. • May act on behalf of the Chief Information Officer in their absence, when directed. Qualifications: Required: • Bachelor's degree in a field Information Technology, Computer Science, or related field that develops skills related to essential duties or equivalent academic achievement. • 8+ years of progressive experience in IT operations and security, with at least 3 years in a leadership or management role. • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Cloud Security Professional (CCSP) Preferred: • Master's degree is preferred and may substitute for up to two (2) years of experience. • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Cloud Security Professional (CCSP) Company: The State Bar of California's mission is to protect the public and includes the primary functions of licensing, regulation and discipline of attorneys; the advancement of the ethical and competent practice of law; and support of efforts for greater access to, and inclusion in, the legal system. Founded in 1927, the company is headquartered in San Francisco, California, USA, with a team of employees. The company is currently Late Stage. State Bar of California has a track record of offering H1B sponsorships. Seniority level Seniority levelExecutive Employment type Employment typeFull-time Job function IndustriesSoftware Development Referrals increase your chances of interviewing at Jobright.ai by 2x Inferred from the description for this job Medical insurance Vision insurance 401(k) Get notified about new Director Information Technology Operations jobs in San Francisco, CA . South San Francisco, CA $215,000.00-$235,000.00 2 weeks ago San Leandro, CA $200,000.00-$245,000.00 6 days ago San Francisco, CA $111,200.00-$132,050.00 5 days ago South San Francisco, CA $235,000.00-$255,000.00 5 days ago Associate Director, Global Business Svcs Tech Enablement Strategy Oakland, CA $178,000.00-$304,000.00 2 weeks ago San Francisco, CA $177,600.00-$281,100.00 5 days ago Hayward, CA $142,385.14-$160,646.53 3 weeks ago San Francisco, CA $230,000.00-$270,000.00 2 weeks ago San Francisco, CA $176,490.00-$245,100.00 6 days ago IT Director Business Relationship Management - Global Commercial Excellence Alameda, CA $193,300.00-$386,700. hours ago South San Francisco, CA $117,000.00-$132,000.00 2 weeks ago Foster City, CA $180,000.00-$220,000.00 2 weeks ago San Francisco, CA $129,600.00-$215,000.00 1 month ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
04/02/2026
Full time
Join to apply for the Director of IT Operations and Security role at Jobright.ai 2 days ago Be among the first 25 applicants Join to apply for the Director of IT Operations and Security role at Jobright.ai Get AI-powered advice on this job and more exclusive features. Jobright is an AI-powered career platform that helps job seekers discover the top opportunities in the US. We are NOT a staffing agency. Jobright does not hire directly for these positions. We connect you with verified openings from employers you can trust. Job Summary: The State Bar of California is responsible for licensing and regulating attorneys and supporting access to the legal system. They are seeking a Director of IT Operations and Security to provide strategic and operational leadership for their technology infrastructure, networking, end-user support services, and cybersecurity programs, ensuring reliable and secure IT services that align with organizational goals. Responsibilities: • Provide strategic leadership and direction for IT operations, infrastructure, and security to support the State Bar's mission and business objectives. • Serve as a key advisor to executive leadership and staff by providing assessments, analysis, and policy guidance on technology strategy, operational risks, security matters, and other technology issues to influence decisions that impact organizational success. • Contribute to IT strategic planning and organizational business continuity efforts, aligning operational initiatives with long-term goals. • Lead, mentor, and develop IT operations teams, fostering a culture of excellence, innovation, and continuous improvement. • Oversee and ensure the effective delivery of IT services, including end-user support, service desk operations, and incident management to maintain high user satisfaction. • Direct the planning, implementation, and optimization of technology infrastructure, leveraging advancements in cloud and emerging technologies to deliver reliable, scalable, and modern solutions that align with organizational needs. • Evaluate and recommend emerging technologies that enhance operational efficiency, security posture, and organizational capabilities. • Ensure the security and availability of the State Bar's information systems by establishing and enforcing robust cybersecurity strategies, policies, and standards. • Provide executive oversight of risk assessments, vulnerability management, and incident response to protect the organization from cybersecurity threats. • Ensure compliance with applicable data security, privacy regulations, and organizational policies through effective governance frameworks and controls. • Oversee asset management and lifecycle planning for hardware and software to ensure compliance with procurement policies and effective utilization of resources. • Develop, manage, and monitor operational and security budgets, ensuring efficient use of resources while delivering high-quality services. • Establish and oversee performance metrics, controls, and processes to ensure effective management of IT operations and continuous improvement. • Collaborate with internal audit, compliance, and risk management teams to address security and operational requirements proactively. • Build and maintain strong relationships with State Bar offices to understand business needs and deliver technology solutions that advance organizational goals. • Oversee vendor and service provider relationships to ensure optimal delivery of outsourced services. • May act on behalf of the Chief Information Officer in their absence, when directed. Qualifications: Required: • Bachelor's degree in a field Information Technology, Computer Science, or related field that develops skills related to essential duties or equivalent academic achievement. • 8+ years of progressive experience in IT operations and security, with at least 3 years in a leadership or management role. • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Cloud Security Professional (CCSP) Preferred: • Master's degree is preferred and may substitute for up to two (2) years of experience. • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Cloud Security Professional (CCSP) Company: The State Bar of California's mission is to protect the public and includes the primary functions of licensing, regulation and discipline of attorneys; the advancement of the ethical and competent practice of law; and support of efforts for greater access to, and inclusion in, the legal system. Founded in 1927, the company is headquartered in San Francisco, California, USA, with a team of employees. The company is currently Late Stage. State Bar of California has a track record of offering H1B sponsorships. Seniority level Seniority levelExecutive Employment type Employment typeFull-time Job function IndustriesSoftware Development Referrals increase your chances of interviewing at Jobright.ai by 2x Inferred from the description for this job Medical insurance Vision insurance 401(k) Get notified about new Director Information Technology Operations jobs in San Francisco, CA . South San Francisco, CA $215,000.00-$235,000.00 2 weeks ago San Leandro, CA $200,000.00-$245,000.00 6 days ago San Francisco, CA $111,200.00-$132,050.00 5 days ago South San Francisco, CA $235,000.00-$255,000.00 5 days ago Associate Director, Global Business Svcs Tech Enablement Strategy Oakland, CA $178,000.00-$304,000.00 2 weeks ago San Francisco, CA $177,600.00-$281,100.00 5 days ago Hayward, CA $142,385.14-$160,646.53 3 weeks ago San Francisco, CA $230,000.00-$270,000.00 2 weeks ago San Francisco, CA $176,490.00-$245,100.00 6 days ago IT Director Business Relationship Management - Global Commercial Excellence Alameda, CA $193,300.00-$386,700. hours ago South San Francisco, CA $117,000.00-$132,000.00 2 weeks ago Foster City, CA $180,000.00-$220,000.00 2 weeks ago San Francisco, CA $129,600.00-$215,000.00 1 month ago We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/02/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
Chief Information Security Officer at Rightworks Rightworks offers the only intelligent cloud purpose-built for accounting firms and professionals. Backed by award-winning support, our fully managed IT and applications ensure customers have secure, reliable, on-demand access to their technology. We provide a curated software ecosystem that simplifies the complexity of running an accounting firm or small business, supported by a community of thought leaders, peer networks, and educational resources. Our success is made possible by leveraging decades of specialized experience in leading accounting firms, SMBs, and technology companies. Thousands of firms and SMBs count on us to run their business every day. Job Overview The Chief Information Security Officer (CISO) will be responsible for defining and executing the company's enterprise-wide security strategy across internal systems, customer-facing MSP offerings, and SaaS products. The CISO will ensure the confidentiality, integrity, and availability of all systems and data while positioning Rightworks as a trusted leader in secure cloud services for the accounting industry. As a direct report to the CTO, the CISO will play a strategic role in overall technology leadership. This position participates as a strong voice in the technical leadership team, with specific responsibilities for leading and executing Rightworks Security strategy and operations. This is a hybrid position, with 3 days per week in our Nashua, NH headquarters. Responsibilities Enterprise Security Leadership: Own the overall security strategy for internal systems, networks, and data assets across Rightworks. MSP & Hosting Security: Design and enforce robust security controls for Rightworks' Managed IT and hosting services, ensuring compliance with industry and national standards and requirements. SaaS & Product Security: Support application and public cloud stack security for Rightworks solutions, embedding "security by design," and supporting DevSecOps cultural transformation. Cloud Security Architecture: Ensure secure architecture around integration between public cloud, private cloud, and IT systems. Champion and govern identity and access management (IAM), encryption standards, zero-trust frameworks, and secure DevOps practices. Lead efforts to harden APIs, integrations, and third-party connectors through audit and testing Rightworks technology systems. Customer & Industry Engagement: Act as the company's external security authority, engaging with customers, partners, and industry groups to represent Rightworks as a thought leader in cybersecurity for accounting professionals. Partner with Sales and Customer Success to reassure large enterprises and key customers about data protection and continuity of service. Be a strong voice at the table on behalf of Rightworks with our customers. Lead and listen, bringing industry perspective and expertise to the table. Partner with product engineering, infrastructure, and operations teams to integrate security practices into development pipelines. Identify areas of opportunity for our organization to improve. Governance, Risk & Compliance (GRC): Establish and lead the company's GRC programs, policies, and risk management frameworks. Ensure adherence to applicable regulations and certifications. Security Incident Response & Resilience: Build and maintain robust security incident detection, response, and recovery plans; lead post-mortem analyses and continuous improvement initiatives. Security Operations & Monitoring: Oversee 24/7 security operations, including threat intelligence, vulnerability management, and monitoring of cloud and MSP environments. Lead Operations of Security Products and Systems: Oversee implementation of customer facing security solutions, including endpoint management and office management. Team Leadership: Build and mentor a high-performing security team, developing leadership capacity and instilling a culture of proactive risk management. Engage as a senior leader in our organization, mentoring engineering and infrastructure leaders, and contributing to enterprise architecture strategy. Requirements Proven leadership experience as a CISO, VP Security, or senior security executive within a SaaS, MSP, or cloud-hosting environment at scale. Added plus if provided solutions to accounting organizations, departments, and functions. Demonstrated expertise in: Cloud Security (Azure, AWS, multi-tenant environments). MSP security models (endpoints, networks, client environments). SaaS product security, including secure Software Development Life Cycle and DevSecOps practices. Experience engaging directly with customers and serving as a trusted external voice on cybersecurity topics. Track record of developing and implementing incident response and risk management programs. Ability to balance strategic security leadership with hands on operational oversight. Experience in private equity-backed companies or demonstrated ability to operate in such an environment preferred. This includes being entrepreneurial, metric-driven, and skilled at managing budgets, top line revenue, and bottom line profitability. Strong leadership, mentoring, and executive succession potential. Executive presence with excellent communication, presentation, and board level reporting skills. Excellent communication and presentation skills, both written and verbal. Possesses a command for communicating complex ideas into simple and understandable concepts. Strong leadership and interpersonal skills to help build relationships and effective teams. Ability to work across organizational lines, command respect, and influence. Demonstrated success partnering and collaborating internally and externally with executive level management and with all functions of an organization. Proven success in creating and leading geographically dispersed teams. Successful track record of recruiting and fielding an "A" team through hiring and internal development programs. Preferred education; relevant experience is most crucial: Bachelor's degree in computer science, Information Systems, or related field preferred. Security certifications are highly desirable: (e.g. Certified Information Systems Security Professional, Certified Information Security Manager, Certified Information Systems Auditor, and Certified Cloud Security Professional). Personal Characteristics Entrepreneurial and growth-oriented mindset. Metrics driven with financial acumen and budget discipline. Strong executive presence with the ability to engage customers and industry peers. Results-driven, with a passion for measurable security outcomes. Collaborative leader, able to build trust across engineering, operations, and executive teams. High integrity and commitment to customer trust. Innovative and intellectually curious, staying ahead of emerging threats and technologies. Eligibility Requirements This role is open to US Citizens or permanent residents authorized to work in the United States. Rightworks LLC is unable to offer visa sponsorship. Due to specific state regulations, we are unable to accept applications from residents of California, Hawaii, or Alaska. Relocation will not be offered for this position. Compensation The On-Target Earnings (OTE) range for this role is $260,000-$350,000. Benefits We provide company-paid short and long-term disability insurance, life insurance, and a generous 401(k) match. We offer highly affordable medical, dental, vision coverage, and many other valuable benefits. Flexible PTO, numerous paid holidays, and paid volunteer time off. We encourage giving back to our communities. We are proud to be an Equal Opportunity Employer! This job description may not be inclusive of all assigned duties, responsibilities, or aspects of the job described, and may be amended at any time at the sole discretion of the employer.
04/02/2026
Full time
Chief Information Security Officer at Rightworks Rightworks offers the only intelligent cloud purpose-built for accounting firms and professionals. Backed by award-winning support, our fully managed IT and applications ensure customers have secure, reliable, on-demand access to their technology. We provide a curated software ecosystem that simplifies the complexity of running an accounting firm or small business, supported by a community of thought leaders, peer networks, and educational resources. Our success is made possible by leveraging decades of specialized experience in leading accounting firms, SMBs, and technology companies. Thousands of firms and SMBs count on us to run their business every day. Job Overview The Chief Information Security Officer (CISO) will be responsible for defining and executing the company's enterprise-wide security strategy across internal systems, customer-facing MSP offerings, and SaaS products. The CISO will ensure the confidentiality, integrity, and availability of all systems and data while positioning Rightworks as a trusted leader in secure cloud services for the accounting industry. As a direct report to the CTO, the CISO will play a strategic role in overall technology leadership. This position participates as a strong voice in the technical leadership team, with specific responsibilities for leading and executing Rightworks Security strategy and operations. This is a hybrid position, with 3 days per week in our Nashua, NH headquarters. Responsibilities Enterprise Security Leadership: Own the overall security strategy for internal systems, networks, and data assets across Rightworks. MSP & Hosting Security: Design and enforce robust security controls for Rightworks' Managed IT and hosting services, ensuring compliance with industry and national standards and requirements. SaaS & Product Security: Support application and public cloud stack security for Rightworks solutions, embedding "security by design," and supporting DevSecOps cultural transformation. Cloud Security Architecture: Ensure secure architecture around integration between public cloud, private cloud, and IT systems. Champion and govern identity and access management (IAM), encryption standards, zero-trust frameworks, and secure DevOps practices. Lead efforts to harden APIs, integrations, and third-party connectors through audit and testing Rightworks technology systems. Customer & Industry Engagement: Act as the company's external security authority, engaging with customers, partners, and industry groups to represent Rightworks as a thought leader in cybersecurity for accounting professionals. Partner with Sales and Customer Success to reassure large enterprises and key customers about data protection and continuity of service. Be a strong voice at the table on behalf of Rightworks with our customers. Lead and listen, bringing industry perspective and expertise to the table. Partner with product engineering, infrastructure, and operations teams to integrate security practices into development pipelines. Identify areas of opportunity for our organization to improve. Governance, Risk & Compliance (GRC): Establish and lead the company's GRC programs, policies, and risk management frameworks. Ensure adherence to applicable regulations and certifications. Security Incident Response & Resilience: Build and maintain robust security incident detection, response, and recovery plans; lead post-mortem analyses and continuous improvement initiatives. Security Operations & Monitoring: Oversee 24/7 security operations, including threat intelligence, vulnerability management, and monitoring of cloud and MSP environments. Lead Operations of Security Products and Systems: Oversee implementation of customer facing security solutions, including endpoint management and office management. Team Leadership: Build and mentor a high-performing security team, developing leadership capacity and instilling a culture of proactive risk management. Engage as a senior leader in our organization, mentoring engineering and infrastructure leaders, and contributing to enterprise architecture strategy. Requirements Proven leadership experience as a CISO, VP Security, or senior security executive within a SaaS, MSP, or cloud-hosting environment at scale. Added plus if provided solutions to accounting organizations, departments, and functions. Demonstrated expertise in: Cloud Security (Azure, AWS, multi-tenant environments). MSP security models (endpoints, networks, client environments). SaaS product security, including secure Software Development Life Cycle and DevSecOps practices. Experience engaging directly with customers and serving as a trusted external voice on cybersecurity topics. Track record of developing and implementing incident response and risk management programs. Ability to balance strategic security leadership with hands on operational oversight. Experience in private equity-backed companies or demonstrated ability to operate in such an environment preferred. This includes being entrepreneurial, metric-driven, and skilled at managing budgets, top line revenue, and bottom line profitability. Strong leadership, mentoring, and executive succession potential. Executive presence with excellent communication, presentation, and board level reporting skills. Excellent communication and presentation skills, both written and verbal. Possesses a command for communicating complex ideas into simple and understandable concepts. Strong leadership and interpersonal skills to help build relationships and effective teams. Ability to work across organizational lines, command respect, and influence. Demonstrated success partnering and collaborating internally and externally with executive level management and with all functions of an organization. Proven success in creating and leading geographically dispersed teams. Successful track record of recruiting and fielding an "A" team through hiring and internal development programs. Preferred education; relevant experience is most crucial: Bachelor's degree in computer science, Information Systems, or related field preferred. Security certifications are highly desirable: (e.g. Certified Information Systems Security Professional, Certified Information Security Manager, Certified Information Systems Auditor, and Certified Cloud Security Professional). Personal Characteristics Entrepreneurial and growth-oriented mindset. Metrics driven with financial acumen and budget discipline. Strong executive presence with the ability to engage customers and industry peers. Results-driven, with a passion for measurable security outcomes. Collaborative leader, able to build trust across engineering, operations, and executive teams. High integrity and commitment to customer trust. Innovative and intellectually curious, staying ahead of emerging threats and technologies. Eligibility Requirements This role is open to US Citizens or permanent residents authorized to work in the United States. Rightworks LLC is unable to offer visa sponsorship. Due to specific state regulations, we are unable to accept applications from residents of California, Hawaii, or Alaska. Relocation will not be offered for this position. Compensation The On-Target Earnings (OTE) range for this role is $260,000-$350,000. Benefits We provide company-paid short and long-term disability insurance, life insurance, and a generous 401(k) match. We offer highly affordable medical, dental, vision coverage, and many other valuable benefits. Flexible PTO, numerous paid holidays, and paid volunteer time off. We encourage giving back to our communities. We are proud to be an Equal Opportunity Employer! This job description may not be inclusive of all assigned duties, responsibilities, or aspects of the job described, and may be amended at any time at the sole discretion of the employer.
Join to apply for the Principal Machine Learning Engineer role at Cisco. Meet the Team We are an agile team with a startup feel and a strong bias for action. We move fast, embrace failure as part of the process, and stay focused on solving real world problems for defenders on the front lines. Our team blends deep expertise in AI, cybersecurity, and platform engineering. We are driven by a shared belief that the only way to outpace hackers is through AI advancements that free up humans to tackle real threats and more challenging problems. This is a place for builders who thrive in ambiguity, challenge the status quo, and care deeply about making a meaningful impact. If you're energized by tough problems, excited to shape the future of cyber defense, and eager to work alongside passionate experts, you'll feel right at home. Your Impact Design and build agentic workflows that combine detection signals, context, and playbooks to automate threat triage and response. Prototype and test new AI features-from enrichment agents to incident summarization-working closely with security SMEs to validate real world utility. Develop an AIOps pipeline to enable rapid experimentation with prompts, models, and RAG systems, using clear, measurable success criteria to evaluate iterations. Evaluate model outputs for accuracy, reliability, and usability, then prototype and deploy improvements based on structured feedback and testing. Collaborate with product and platform teams to co design AI enhanced TDIR workflows that are intuitive, scalable, and immediately useful to analysts. Contribute to the core architecture powering AI native security operations, helping to shape how Splunk and Cisco scale trusted automation across the enterprise. Security Minimum Qualifications Security Operations Experience - Understanding of security operations concepts, including detection, triage, investigation, and response. Security Telemetry Fluency - Comfortable working with common data sources such as endpoint logs, network traffic, authentication events, or cloud audit trails-and understanding how they're used in detection and investigation workflows. Engineering Experience Senior level Python Development - Consistent record building scalable backend services, APIs, and automation workflows in Python. DevOps/SecOps Practices - Proficient with CI/CD pipelines, version control (GitHub/GitLab), Jira, and automated testing frameworks. Security Automation - Experience building and integrating with product APIs to drive SecOps efficiency. Cross Functional Collaboration - Comfortable partnering with product managers, security SMEs, and engineers to iterate quickly and deliver impactful solutions. AI/LLM Prompt Engineering & LLM Integration - Skilled in crafting, testing, and optimizing prompts for large language models. Ideally, you have contributed to or shipped an AI powered feature or product, and understand the nuances of integrating LLMs into real world workflows-including usability, performance, and trust considerations. AI Evaluation & Experimentation - Capable of designing experiments to evaluate LLM output for accuracy, usability, performance, and cost. Preferred Qualifications SOAR/SIEM Familiarity - Experience working with security data and/or tools such as SIEM/SOAR platforms (e.g., Splunk), whether from a practitioner, developer, or automation perspective. Splunk Enterprise Security (ES) Experience - Familiarity with ES architecture, correlation searches, notables, and risk based alerting. Bonus if you've worked with Splunk's APIs, internals, or have experience developing on the Splunk platform. Security Operations Background - Former Tier 3 SOC analyst or equivalent, with experience automating SecOps workflows and building scalable, resilient detection infrastructure. RAG and Vector Search Implementation - Hands on experience developing retrieval augmented generation pipelines and working with vector databases (e.g., FAISS, Pinecone). LLM Fine Tuning and Embeddings - Exposure to fine tuning large language models or generating custom embeddings for domain specific tasks in cybersecurity. Security Data Engineering - Experience building and maintaining pipelines for ingesting, parsing, and normalizing large scale security telemetry. UX and Human Factors for Analysts - Background or interest in designing intuitive, AI assisted analyst workflows with a focus on usability, trust, and decision support. Why Cisco? At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era-and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. Salary and Compensation The starting salary range posted for this position is $291,500.00 to $369,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
04/02/2026
Full time
Join to apply for the Principal Machine Learning Engineer role at Cisco. Meet the Team We are an agile team with a startup feel and a strong bias for action. We move fast, embrace failure as part of the process, and stay focused on solving real world problems for defenders on the front lines. Our team blends deep expertise in AI, cybersecurity, and platform engineering. We are driven by a shared belief that the only way to outpace hackers is through AI advancements that free up humans to tackle real threats and more challenging problems. This is a place for builders who thrive in ambiguity, challenge the status quo, and care deeply about making a meaningful impact. If you're energized by tough problems, excited to shape the future of cyber defense, and eager to work alongside passionate experts, you'll feel right at home. Your Impact Design and build agentic workflows that combine detection signals, context, and playbooks to automate threat triage and response. Prototype and test new AI features-from enrichment agents to incident summarization-working closely with security SMEs to validate real world utility. Develop an AIOps pipeline to enable rapid experimentation with prompts, models, and RAG systems, using clear, measurable success criteria to evaluate iterations. Evaluate model outputs for accuracy, reliability, and usability, then prototype and deploy improvements based on structured feedback and testing. Collaborate with product and platform teams to co design AI enhanced TDIR workflows that are intuitive, scalable, and immediately useful to analysts. Contribute to the core architecture powering AI native security operations, helping to shape how Splunk and Cisco scale trusted automation across the enterprise. Security Minimum Qualifications Security Operations Experience - Understanding of security operations concepts, including detection, triage, investigation, and response. Security Telemetry Fluency - Comfortable working with common data sources such as endpoint logs, network traffic, authentication events, or cloud audit trails-and understanding how they're used in detection and investigation workflows. Engineering Experience Senior level Python Development - Consistent record building scalable backend services, APIs, and automation workflows in Python. DevOps/SecOps Practices - Proficient with CI/CD pipelines, version control (GitHub/GitLab), Jira, and automated testing frameworks. Security Automation - Experience building and integrating with product APIs to drive SecOps efficiency. Cross Functional Collaboration - Comfortable partnering with product managers, security SMEs, and engineers to iterate quickly and deliver impactful solutions. AI/LLM Prompt Engineering & LLM Integration - Skilled in crafting, testing, and optimizing prompts for large language models. Ideally, you have contributed to or shipped an AI powered feature or product, and understand the nuances of integrating LLMs into real world workflows-including usability, performance, and trust considerations. AI Evaluation & Experimentation - Capable of designing experiments to evaluate LLM output for accuracy, usability, performance, and cost. Preferred Qualifications SOAR/SIEM Familiarity - Experience working with security data and/or tools such as SIEM/SOAR platforms (e.g., Splunk), whether from a practitioner, developer, or automation perspective. Splunk Enterprise Security (ES) Experience - Familiarity with ES architecture, correlation searches, notables, and risk based alerting. Bonus if you've worked with Splunk's APIs, internals, or have experience developing on the Splunk platform. Security Operations Background - Former Tier 3 SOC analyst or equivalent, with experience automating SecOps workflows and building scalable, resilient detection infrastructure. RAG and Vector Search Implementation - Hands on experience developing retrieval augmented generation pipelines and working with vector databases (e.g., FAISS, Pinecone). LLM Fine Tuning and Embeddings - Exposure to fine tuning large language models or generating custom embeddings for domain specific tasks in cybersecurity. Security Data Engineering - Experience building and maintaining pipelines for ingesting, parsing, and normalizing large scale security telemetry. UX and Human Factors for Analysts - Background or interest in designing intuitive, AI assisted analyst workflows with a focus on usability, trust, and decision support. Why Cisco? At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era-and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. Salary and Compensation The starting salary range posted for this position is $291,500.00 to $369,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Join to apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. 3 days ago Be among the first 25 applicants. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Remote About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the Internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ year in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills and have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cybersecurity 2+ years of Incident Response experience 1+ year of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel; a passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo: Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1: We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal: we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something you'd like to be a part of? We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. . click apply for full job details
Principal Product Manager Cloud Security Join to apply for the Principal Product Manager Cloud Security role at Corelight Principal Product Manager Cloud Security 14 hours ago Be among the first 25 applicants Join to apply for the Principal Product Manager Cloud Security role at Corelight Get AI-powered advice on this job and more exclusive features. Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can't avoid leaving digital footprints on the networks they traverse. Built on open-source innovations from Zeek, Suricata and YARA and refined through years of real-world use, Corelight transforms network footprints from physical, virtual and cloud networks into actionable insights. Our customers use these insights to speed incident response and proactively hunt for threats. We seek an experienced product manager who can execute and contribute to the vision of our NDR cloud offerings. The ideal candidate will help define and execute product roadmaps for cloud-native security detection and response capabilities while supporting market analysis and competitive positioning within the NDR cloud space. This role requires contributing to product development initiatives across AWS, Google Cloud Platform (GCP), and Microsoft Azure, designing product features that integrate seamlessly with cloud infrastructure. You will need to have a deep deep understanding of Secure Access Service Edge (SASE) providers and their ecosystems, contributing to technologies and partnerships that support SASE provider integrations. Additionally, you'll provide technical input on containerization technologies within cloud environments and collaborate with technical teams on cloud-native deployment strategies. The successful candidate will have experience with cloud-based security products and the ability to work effectively with cross-functional teams including engineering, sales, and marketing. Minimum Requirements 7+ years of product management experience, with at least 3 years in cybersecurity or network security Proven track record of successfully launching and scaling cloud-based security products Strong background in cloud platforms (AWS, GCP, Azure) and their security services Deep understanding of cloud networking architectures and security controls across AWS, GCP, and Azure Knowledge of containerization technologies (Docker, Kubernetes) and cloud-native deployments Familiarity with SASE concepts and major provider ecosystems Experience with Network Detection and Response (NDR) or similar security technologies Understanding of network security protocols and threat detection methodologies Experience with microservices architectures and container orchestration platforms Preferred Qualifications MBA or advanced degree in Cybersecurity or related field Cloud platform certifications (AWS Solutions Architect, Google Cloud Professional, Azure Solutions Architect) Knowledge of threat intelligence and security analytics platforms specifically focused around Cloud native threats Fueled by investments from top-tier venture capital organizations such as Crowdstrike, Accel and Insight, Corelight is the fastest growing network detection and response platform in the industry. Our customers trust us to protect mission-critical assets in leading enterprises, government, and research institutions worldwide. We are leading the way with AI-assisted workflows, machine learning models, cloud security and SaaS-based solutions to arm defenders with the tools and knowledge they need to disrupt cyber attacks. Our team of passionate innovators are dedicated to solving some of the toughest challenges in cybersecurity, while fostering a collaborative, inclusive, and growth-oriented culture. Corelight is committed to a geographically distributed yet connected employee base with employees working from home and office locations around the world. At Corelight, we take pride in the diversity of our backgrounds and perspectives, and we are committed to fostering an inclusive environment that strengthens our company. We are looking forward to meeting you. Check us out at Notice of Pay Transparency: The compensation for this position may vary depending on factors such as your location, skills and experience. Depending on the nature and seniority of the role, a percentage of compensation may come in the form of a commission-based or discretionary bonus. Equity and additional benefits will also be awarded. Compensation Range $182,000-$222,000 USDSeniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function Job functionProduct Management and Marketing IndustriesTechnology, Information and Internet Referrals increase your chances of interviewing at Corelight by 2x Get notified about new Principal Product Manager jobs in San Francisco, CA . Principal Product Manager, Consumer Experience San Francisco, CA $187,000.00-$250,000.00 3 weeks ago Senior Product Manager, Conversational ChatbotPrincipal Product Manager, Conversational AI, Agents San Francisco, CA $190,000.00-$211,000.00 2 weeks ago Sr. Manager, Product Management, Loyalty San Francisco, CA $165,300.00-$219,000.00 2 months ago (USA) Principal, Product Manager, Gen AI/ Agentic AI Digital Ad Products - Walmart Connect San Bruno, CA $132,000.00-$286,000.00 2 weeks ago Senior Product Manager - AI/ML PersonalizationLead Product Manager, Autonomous Vehicle Platform Alameda, CA $128,000.00-$256,000.00 3 weeks ago Lead Product Manager, our Talent Management Product San Francisco, CA $126,300.00-$181,550. hours ago Product Lead, Connect Risk and CompliancePrincipal Product Manager, Business Model Strategy San Francisco, CA $145,100.00-$273,200.00 2 weeks ago Senior Product Manager - Investigator - Assets and Platform San Francisco, CA $182,000.00-$222,000.00 4 months ago Product Lead (Enterprise Foundations), Business AI San Francisco, CA $323,000.00-$381,000.00 2 weeks ago Senior Product Manager - Machine Learning Platform San Mateo, CA $138,000.00-$245,000. hours ago San Francisco, CA $180,000.00-$210,000.00 2 hours ago Senior Manager, Product Management (MarTech) San Francisco, CA $140,425.00-$229,600.00 6 hours ago Sr. Product Mgr, Audio Content Solutions San Francisco, CA $200,000.00-$255,000.00 2 weeks ago Senior Product Manager, Data Acquisition We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
04/02/2026
Full time
Principal Product Manager Cloud Security Join to apply for the Principal Product Manager Cloud Security role at Corelight Principal Product Manager Cloud Security 14 hours ago Be among the first 25 applicants Join to apply for the Principal Product Manager Cloud Security role at Corelight Get AI-powered advice on this job and more exclusive features. Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can't avoid leaving digital footprints on the networks they traverse. Built on open-source innovations from Zeek, Suricata and YARA and refined through years of real-world use, Corelight transforms network footprints from physical, virtual and cloud networks into actionable insights. Our customers use these insights to speed incident response and proactively hunt for threats. We seek an experienced product manager who can execute and contribute to the vision of our NDR cloud offerings. The ideal candidate will help define and execute product roadmaps for cloud-native security detection and response capabilities while supporting market analysis and competitive positioning within the NDR cloud space. This role requires contributing to product development initiatives across AWS, Google Cloud Platform (GCP), and Microsoft Azure, designing product features that integrate seamlessly with cloud infrastructure. You will need to have a deep deep understanding of Secure Access Service Edge (SASE) providers and their ecosystems, contributing to technologies and partnerships that support SASE provider integrations. Additionally, you'll provide technical input on containerization technologies within cloud environments and collaborate with technical teams on cloud-native deployment strategies. The successful candidate will have experience with cloud-based security products and the ability to work effectively with cross-functional teams including engineering, sales, and marketing. Minimum Requirements 7+ years of product management experience, with at least 3 years in cybersecurity or network security Proven track record of successfully launching and scaling cloud-based security products Strong background in cloud platforms (AWS, GCP, Azure) and their security services Deep understanding of cloud networking architectures and security controls across AWS, GCP, and Azure Knowledge of containerization technologies (Docker, Kubernetes) and cloud-native deployments Familiarity with SASE concepts and major provider ecosystems Experience with Network Detection and Response (NDR) or similar security technologies Understanding of network security protocols and threat detection methodologies Experience with microservices architectures and container orchestration platforms Preferred Qualifications MBA or advanced degree in Cybersecurity or related field Cloud platform certifications (AWS Solutions Architect, Google Cloud Professional, Azure Solutions Architect) Knowledge of threat intelligence and security analytics platforms specifically focused around Cloud native threats Fueled by investments from top-tier venture capital organizations such as Crowdstrike, Accel and Insight, Corelight is the fastest growing network detection and response platform in the industry. Our customers trust us to protect mission-critical assets in leading enterprises, government, and research institutions worldwide. We are leading the way with AI-assisted workflows, machine learning models, cloud security and SaaS-based solutions to arm defenders with the tools and knowledge they need to disrupt cyber attacks. Our team of passionate innovators are dedicated to solving some of the toughest challenges in cybersecurity, while fostering a collaborative, inclusive, and growth-oriented culture. Corelight is committed to a geographically distributed yet connected employee base with employees working from home and office locations around the world. At Corelight, we take pride in the diversity of our backgrounds and perspectives, and we are committed to fostering an inclusive environment that strengthens our company. We are looking forward to meeting you. Check us out at Notice of Pay Transparency: The compensation for this position may vary depending on factors such as your location, skills and experience. Depending on the nature and seniority of the role, a percentage of compensation may come in the form of a commission-based or discretionary bonus. Equity and additional benefits will also be awarded. Compensation Range $182,000-$222,000 USDSeniority level Seniority levelMid-Senior level Employment type Employment typeFull-time Job function Job functionProduct Management and Marketing IndustriesTechnology, Information and Internet Referrals increase your chances of interviewing at Corelight by 2x Get notified about new Principal Product Manager jobs in San Francisco, CA . Principal Product Manager, Consumer Experience San Francisco, CA $187,000.00-$250,000.00 3 weeks ago Senior Product Manager, Conversational ChatbotPrincipal Product Manager, Conversational AI, Agents San Francisco, CA $190,000.00-$211,000.00 2 weeks ago Sr. Manager, Product Management, Loyalty San Francisco, CA $165,300.00-$219,000.00 2 months ago (USA) Principal, Product Manager, Gen AI/ Agentic AI Digital Ad Products - Walmart Connect San Bruno, CA $132,000.00-$286,000.00 2 weeks ago Senior Product Manager - AI/ML PersonalizationLead Product Manager, Autonomous Vehicle Platform Alameda, CA $128,000.00-$256,000.00 3 weeks ago Lead Product Manager, our Talent Management Product San Francisco, CA $126,300.00-$181,550. hours ago Product Lead, Connect Risk and CompliancePrincipal Product Manager, Business Model Strategy San Francisco, CA $145,100.00-$273,200.00 2 weeks ago Senior Product Manager - Investigator - Assets and Platform San Francisco, CA $182,000.00-$222,000.00 4 months ago Product Lead (Enterprise Foundations), Business AI San Francisco, CA $323,000.00-$381,000.00 2 weeks ago Senior Product Manager - Machine Learning Platform San Mateo, CA $138,000.00-$245,000. hours ago San Francisco, CA $180,000.00-$210,000.00 2 hours ago Senior Manager, Product Management (MarTech) San Francisco, CA $140,425.00-$229,600.00 6 hours ago Sr. Product Mgr, Audio Content Solutions San Francisco, CA $200,000.00-$255,000.00 2 weeks ago Senior Product Manager, Data Acquisition We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
About Istari Istari is a digital engineering software company enabling our customers to turn the physical world into the digital to accomplish their specific mission or business objectives. Istari was founded with the vision of making open, scalable digital engineering ecosystems a reality - where new technologies and systems are created digitally, free from the real-world constraints of costs and schedules. We are creating the world's best engineering model sharing platform, allowing our customers to simply and securely integrate their models across different engineering disciplines, organizations, and security levels. At Istari, we are passionate about our mission of creating the world's first open and scalable industrial metaverse. Whether our customers are designing prototypes, performing virtual testing, or training AI and autonomy for complex systems, we know that going digital will save them time, resources, and reduce their environmental impact. While we are a distributed team with most team-members working remotely, we place an emphasis on staying connected and collaborative, prioritizing in-person opportunities to build trust as a team. At Istari, we still believe that trust is best built in-person. To do this, we have an engineering headquarters in Cambridge, MA for focused technical development and several times per year we gather for an off-site that allows us to develop our professional skills and our team relationships. Values At Istari, we live by our values, which include: Focus is rewarded. Finish is remembered Facts are friendly. Even when they are not fun Fellowship is fundamental. Make others successful Equal Opportunity Istari is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. Position We are seeking a highly experienced and knowledgeable Information System Security Manager (ISSM) to join our Cybersecurity team. This role will be hybrid 3 days per week in our Arlington, VA office. The ISSM will serve as a principal advisor on all matters, technical and otherwise, involving the cybersecurity of information systems under their purview. The role requires a deep understanding of cybersecurity principles, practices, and frameworks, as well as the ability to develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements. The ISSM will work closely with various stakeholders across the organization to ensure the confidentiality, integrity, and availability of our information systems. Key Responsibilities Serve as the principal advisor on all matters involving the cybersecurity of assigned information systems Develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, including JSIG, NIST 800-171, NIST 800-53, CMMC, and ITAR Conduct risk assessments and identify vulnerabilities in information systems Develop and implement security controls to mitigate identified risks Monitor and evaluate the effectiveness of security controls Develop and deliver cybersecurity awareness training to employees Investigate security incidents and breaches Maintain security documentation, including system security plans (SSPs), risk assessments, and incident reports Stay up-to-date with the latest cybersecurity threats and vulnerabilities Collaborate with the engineering and customer success teams to ensure secure implementation and configuration of systems Required Qualifications Minimum of 10 years of experience in a relevant field Deep understanding of cybersecurity principles, practices, and frameworks, including JSIG, NIST 800-171, NIST 800-53, ITAR, and CMMC Experience with risk assessments, vulnerability identification, and security control implementation Experience with security incident investigation and response Excellent communication and collaboration skills, with the ability to effectively communicate with both technical and non-technical audiences Strong analytical and problem-solving skills Preferred Qualifications Bachelor's degree in computer science, information systems, or a related field Relevant certifications (e.g., CISSP, CISM). Experience with SOC compliance and audits Active TS Security Clearance Eligibility Must be a US citizen living within the United States Benefits We offer highly competitive benefits, including: Health and Family Medical/Dental/Vision Employee Premiums are 100% Company Paid Life Insurance Flexible Work Hours Unlimited Paid Time Off (PTO) with federal government holidays Financial: Competitive Compensation 401k Company Stock Options Home Office Setup Budget Learning: Reimbursement for approved trainings and subscriptions Conferences (travel, lodging, and fees) Note - some benefits are not available to interns or contractors. Thank you for your interest in Istari. Expect to hear back from us soon with next steps. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
04/02/2026
Full time
About Istari Istari is a digital engineering software company enabling our customers to turn the physical world into the digital to accomplish their specific mission or business objectives. Istari was founded with the vision of making open, scalable digital engineering ecosystems a reality - where new technologies and systems are created digitally, free from the real-world constraints of costs and schedules. We are creating the world's best engineering model sharing platform, allowing our customers to simply and securely integrate their models across different engineering disciplines, organizations, and security levels. At Istari, we are passionate about our mission of creating the world's first open and scalable industrial metaverse. Whether our customers are designing prototypes, performing virtual testing, or training AI and autonomy for complex systems, we know that going digital will save them time, resources, and reduce their environmental impact. While we are a distributed team with most team-members working remotely, we place an emphasis on staying connected and collaborative, prioritizing in-person opportunities to build trust as a team. At Istari, we still believe that trust is best built in-person. To do this, we have an engineering headquarters in Cambridge, MA for focused technical development and several times per year we gather for an off-site that allows us to develop our professional skills and our team relationships. Values At Istari, we live by our values, which include: Focus is rewarded. Finish is remembered Facts are friendly. Even when they are not fun Fellowship is fundamental. Make others successful Equal Opportunity Istari is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. Position We are seeking a highly experienced and knowledgeable Information System Security Manager (ISSM) to join our Cybersecurity team. This role will be hybrid 3 days per week in our Arlington, VA office. The ISSM will serve as a principal advisor on all matters, technical and otherwise, involving the cybersecurity of information systems under their purview. The role requires a deep understanding of cybersecurity principles, practices, and frameworks, as well as the ability to develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements. The ISSM will work closely with various stakeholders across the organization to ensure the confidentiality, integrity, and availability of our information systems. Key Responsibilities Serve as the principal advisor on all matters involving the cybersecurity of assigned information systems Develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, including JSIG, NIST 800-171, NIST 800-53, CMMC, and ITAR Conduct risk assessments and identify vulnerabilities in information systems Develop and implement security controls to mitigate identified risks Monitor and evaluate the effectiveness of security controls Develop and deliver cybersecurity awareness training to employees Investigate security incidents and breaches Maintain security documentation, including system security plans (SSPs), risk assessments, and incident reports Stay up-to-date with the latest cybersecurity threats and vulnerabilities Collaborate with the engineering and customer success teams to ensure secure implementation and configuration of systems Required Qualifications Minimum of 10 years of experience in a relevant field Deep understanding of cybersecurity principles, practices, and frameworks, including JSIG, NIST 800-171, NIST 800-53, ITAR, and CMMC Experience with risk assessments, vulnerability identification, and security control implementation Experience with security incident investigation and response Excellent communication and collaboration skills, with the ability to effectively communicate with both technical and non-technical audiences Strong analytical and problem-solving skills Preferred Qualifications Bachelor's degree in computer science, information systems, or a related field Relevant certifications (e.g., CISSP, CISM). Experience with SOC compliance and audits Active TS Security Clearance Eligibility Must be a US citizen living within the United States Benefits We offer highly competitive benefits, including: Health and Family Medical/Dental/Vision Employee Premiums are 100% Company Paid Life Insurance Flexible Work Hours Unlimited Paid Time Off (PTO) with federal government holidays Financial: Competitive Compensation 401k Company Stock Options Home Office Setup Budget Learning: Reimbursement for approved trainings and subscriptions Conferences (travel, lodging, and fees) Note - some benefits are not available to interns or contractors. Thank you for your interest in Istari. Expect to hear back from us soon with next steps. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Rivian and Volkswagen Group Technologies
Palo Alto, California
Senior Product Security Infrastructure Engineer Join to apply for the Senior Product Security Infrastructure Engineer role at Rivian and Volkswagen Group Technologies About Us Rivian and Volkswagen Group Technologies is a joint venture between two industry leaders with a clear vision for automotive's next chapter. From operating systems to zonal controllers to cloud and connectivity solutions, we're addressing the challenges of electric vehicles through technology that will set the standards for software-defined vehicles around the world. The road to the future is uncharted. By combining our expertise across connectivity, AI, security and more, we'll map a new way forward. Working together, we'll create a future that's more connected, more intelligent, more sustainable for everyone. Role Summary The Product Security team develops and implements security protection into the vehicle and supporting infrastructure. We are involved in the full chain of security from defining the requirements, planning software and hardware security, developing, deploying, and maintaining security protections. As a Product Security Infrastructure engineer, this person will develop and scale services and infrastructure that are critical security components for vehicle manufacture and operation. This engineer will help develop security critical services according to cloud native best practices and help us ensure that we are developing services in a way that will limit technical debt and toil. The role can be located in California (Irvine or Palo Alto) and reports directly to the Sr. Manager, Product Security Infrastructure. Responsibilities Support, maintain, and improve in-house security critical services. Help meet and exceed scalability standards and demonstrate cloud native best practices. Help in the implementation of new and existing security services. Participate in team incident response/support processes. Mitigate vulnerabilities found or reported by internal and external parties by aligning with company's goals and objectives. Implement cybersecurity protections to comply with regulations and industry standards. Qualifications Bachelor's degree in Computer Science, Computer Engineering, or similar field, or equivalent experience. Experience using modern server side programming languages such as Go or Python to develop web services. Working understanding of modern cryptography, cloud, and security best practices in service development. Experience in SRE, DevOps, DevSecOps or similar working with production services. Real world experience in cloud native development, Kubernetes, OpenTelemetry, reliability engineering, production engineering. Experience working with cross functional heterogeneous engineering teams to ensure reliability of security critical services. Experience working on projects from planning through completion. Pay Disclosure Salary Range/Hourly Rate for Palo Alto, California Based Applicants: $162,800 - $203,500 (actual compensation will be determined based on experience, location, and other factors permitted by law). Salary Range/Hourly Rate for Irvine, California Based Applicants: $149,800 - $187,200 (actual compensation will be determined based on experience, location, and other factors permitted by law). Benefits Summary Rivian and Volkswagen Group Technologies provides robust medical/Rx, dental and vision insurance packages for full time and part time employees, their spouse or domestic partner, and children up to age 26. Full time employee coverage is effective on the first day of employment. Part time employee coverage is effective the first of the month following 90 days of employment. Equal Opportunity Rivian and Volkswagen Group Technologies is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law. We are also committed to ensuring compliance with all applicable fair employment practice laws regarding citizenship and immigration status. Rivian and Volkswagen Group Technologies is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at . Candidate Data Privacy Rivian and Volkswagen Group Technologies may collect, use and disclose your personal information or personal data when you apply for employment and/or participate in our recruitment processes. This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian and Volkswagen Group Technologies may use your Candidate Personal Data for the purposes of tracking interactions with our recruiting system; carrying out, analyzing and improving our application and recruitment process; establishing an employment relationship; complying with legal, regulatory and corporate governance obligations; recordkeeping; ensuring network and information security and preventing fraud; and other permissible purposes. Rivian and Volkswagen Group Technologies may share your Candidate Personal Data with internal personnel, affiliates, and service providers. Rivian and Volkswagen Group Technologies may transfer or store internationally your Candidate Personal Data. Please see our Candidate Data Privacy Notice for more information. Please note that we are currently not accepting applications from third party application services.
04/02/2026
Full time
Senior Product Security Infrastructure Engineer Join to apply for the Senior Product Security Infrastructure Engineer role at Rivian and Volkswagen Group Technologies About Us Rivian and Volkswagen Group Technologies is a joint venture between two industry leaders with a clear vision for automotive's next chapter. From operating systems to zonal controllers to cloud and connectivity solutions, we're addressing the challenges of electric vehicles through technology that will set the standards for software-defined vehicles around the world. The road to the future is uncharted. By combining our expertise across connectivity, AI, security and more, we'll map a new way forward. Working together, we'll create a future that's more connected, more intelligent, more sustainable for everyone. Role Summary The Product Security team develops and implements security protection into the vehicle and supporting infrastructure. We are involved in the full chain of security from defining the requirements, planning software and hardware security, developing, deploying, and maintaining security protections. As a Product Security Infrastructure engineer, this person will develop and scale services and infrastructure that are critical security components for vehicle manufacture and operation. This engineer will help develop security critical services according to cloud native best practices and help us ensure that we are developing services in a way that will limit technical debt and toil. The role can be located in California (Irvine or Palo Alto) and reports directly to the Sr. Manager, Product Security Infrastructure. Responsibilities Support, maintain, and improve in-house security critical services. Help meet and exceed scalability standards and demonstrate cloud native best practices. Help in the implementation of new and existing security services. Participate in team incident response/support processes. Mitigate vulnerabilities found or reported by internal and external parties by aligning with company's goals and objectives. Implement cybersecurity protections to comply with regulations and industry standards. Qualifications Bachelor's degree in Computer Science, Computer Engineering, or similar field, or equivalent experience. Experience using modern server side programming languages such as Go or Python to develop web services. Working understanding of modern cryptography, cloud, and security best practices in service development. Experience in SRE, DevOps, DevSecOps or similar working with production services. Real world experience in cloud native development, Kubernetes, OpenTelemetry, reliability engineering, production engineering. Experience working with cross functional heterogeneous engineering teams to ensure reliability of security critical services. Experience working on projects from planning through completion. Pay Disclosure Salary Range/Hourly Rate for Palo Alto, California Based Applicants: $162,800 - $203,500 (actual compensation will be determined based on experience, location, and other factors permitted by law). Salary Range/Hourly Rate for Irvine, California Based Applicants: $149,800 - $187,200 (actual compensation will be determined based on experience, location, and other factors permitted by law). Benefits Summary Rivian and Volkswagen Group Technologies provides robust medical/Rx, dental and vision insurance packages for full time and part time employees, their spouse or domestic partner, and children up to age 26. Full time employee coverage is effective on the first day of employment. Part time employee coverage is effective the first of the month following 90 days of employment. Equal Opportunity Rivian and Volkswagen Group Technologies is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law. We are also committed to ensuring compliance with all applicable fair employment practice laws regarding citizenship and immigration status. Rivian and Volkswagen Group Technologies is committed to ensuring that our hiring process is accessible for persons with disabilities. If you have a disability or limitation, such as those covered by the Americans with Disabilities Act, that requires accommodations to assist you in the search and application process, please email us at . Candidate Data Privacy Rivian and Volkswagen Group Technologies may collect, use and disclose your personal information or personal data when you apply for employment and/or participate in our recruitment processes. This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian and Volkswagen Group Technologies may use your Candidate Personal Data for the purposes of tracking interactions with our recruiting system; carrying out, analyzing and improving our application and recruitment process; establishing an employment relationship; complying with legal, regulatory and corporate governance obligations; recordkeeping; ensuring network and information security and preventing fraud; and other permissible purposes. Rivian and Volkswagen Group Technologies may share your Candidate Personal Data with internal personnel, affiliates, and service providers. Rivian and Volkswagen Group Technologies may transfer or store internationally your Candidate Personal Data. Please see our Candidate Data Privacy Notice for more information. Please note that we are currently not accepting applications from third party application services.
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/02/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.