it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

9 jobs found

Email me jobs like this
Refine Search
Current Search
senior anti abuse security engineer product security
AVP, Product Security Architect
Synchrony Financial Charlotte, North Carolina
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial West Chester, Ohio
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial Alpharetta, Georgia
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial New York, New York
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial Cincinnati, Ohio
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial Stamford, Connecticut
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
AVP, Product Security Architect
Synchrony Financial Chicago, Illinois
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
04/06/2026
Full time
Role Summary/Purpose: Synchrony is seeking an AVP, Product Security Architect to provide enterprise-level product security architecture leadership across Synchrony's application and SaaS ecosystem. This role operates at L11 scope-setting direction, defining standards, and driving adoption at scale-while partnering closely with product and engineering leaders to embed security into product strategy and modern software delivery. The AVP will lead the definition of an Application Security Blueprint (reference architectures, approved patterns, and engineering guardrails) and will influence outcomes across multiple portfolios by enabling teams to design and deliver software that is secure-by-design, resilient, and compliant. Essential Responsibilities: Set product security architecture direction for assigned portfolios, aligning security architecture decisions with Synchrony technology strategy, risk appetite, and regulatory expectations. Own and evolve the Application Security Blueprint: enterprise application security standards, reference architectures, reusable patterns, and guardrails that enable consistent secure engineering across teams. Serve as a strategic partner to product and engineering leadership, influencing roadmaps and operating models to ensure security is built-in (not bolted-on) and delivery teams can move quickly with well-defined paved roads. Lead architecture governance for product/application security: establish review criteria and decision frameworks perform design reviews and approve/drive remediation plans manage exceptions with documented risk acceptance, compensating controls, and time-bound closure Drive threat modeling at scale by defining methodology and minimum expectations, and by facilitating modeling for high-risk initiatives-explicitly documenting trust boundaries, data flows, abuse cases, and security requirements. Define and standardize API security architectures (north-south and east-west), including authentication/authorization, token strategy, schema and input validation, anti-automation protections, and rate limiting/throttling patterns. Define patterns for service-to-service security controls in distributed systems, including workload identity, authorization, mTLS, secrets handling, and policy enforcement-ensuring controls are practical for engineering adoption. Influence and enable secure SDLC and platform controls with engineering enablement in mind (security requirements, pipeline guardrails, dependency/supply-chain controls, secure configuration guidance), partnering with platform teams to operationalize. Establish and track measurable outcomes (e.g., blueprint adoption, recurring architecture risks, API posture improvements, exception burn-down, control coverage for critical apps) and provide clear executive-level reporting. Act as a coach and multiplier: mentor engineers and architects, elevate secure design skills across teams, and improve security decision-making through clear documentation and reusable assets. Perform other duties and/or special projects as assigned. Qualifications/Requirements: 7+ years in security architecture/engineering, with deep focus on application/product security in modern software environments. Demonstrated ability to operate at an enterprise influence level: setting standards, driving cross-team adoption, and aligning stakeholders with differing priorities. Strong hands-on knowledge of application and service security fundamentals: authentication/authorization, session/token security, cryptography concepts, secrets management, secure logging/monitoring design, and secure data handling. Proven experience leading threat modeling and producing strong architecture artifacts (DFDs, trust boundaries, security requirements, risk assessments). Strong knowledge of API security and common web/service risks (e.g., OWASP Top 10 / API Security Top 10), with the ability to translate risks into enforceable patterns. Excellent communication skills-able to present clearly to engineering teams and senior leaders, and to produce high-quality architecture documentation. Track record of driving security with product teams: embedding security into product planning, influencing roadmaps, defining "definition of done" security requirements, and improving time-to-market through paved-road patterns. Experience securing and integrating SaaS applications, including SSO/federation (SAML/OIDC), tenant and data isolation considerations, audit logging, and shared responsibility alignment. Experience implementing service-to-service security patterns at scale (workload identity, mTLS, authorization, policy-as-code concepts). Experience operationalizing security standards into engineering consumables (shared libraries, templates, reference implementations, runbooks). Familiarity with CI/CD-based security enablement (SAST/DAST/SCA, secrets scanning, gating/exception workflows) and vulnerability management operating models. Experience supporting regulated environments and mapping architecture controls to policies/standards. Certifications (preferred): CISSP, CCSP, CSSLP (or equivalent). Ability and flexibility to travel for business as required Desired Characteristics: Threat modeling tooling; API gateways/policy enforcement; identity and federation (SSO, SAML, OIDC); application security testing (SAST/DAST/SCA/secret scanning); CI/CD tooling (e.g., GitHub/Jenkins); vulnerability management platforms; logging/monitoring; service mesh/mTLS patterns; secrets management solutions Grade/Level: 11 The salary range for this position is 115 000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge. Salaries are adjusted according to market in CA, NY Metro and Seattle. Eligibility Requirements: You must be 18 years or older You must have a high school diploma or equivalent You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act. New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles. Once this new hire time in position requirement is met, the associate will have a minimum 6 months' time in position before they can post for future non-exempt roles. Employees, level 8 or greater, must have at least 18 months' time in position before they can post. All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don't meet the time in position or performance expectations). Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Our Commitment: When you join us, you'll be part of an inclusive culture where your individual skills, experience, and voice are not only heard - but valued. Together, we're building a future where we can all belong, connect, and turn ideals into action. More than 50% of our workforce is engaged in our Employee Resource Groups (ERGs), where community and passion intersect to offer a safe space to learn and grow. This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status. We're proud to have an award-winning culture for all. Reasonable Accommodation Notice: Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-. Representatives are available from 8am - 5pm Monday to Friday, Central Standard Time Job Family Group: Information Technology
L3Harris Technologies
Lead, Information Security Systems Engineer
L3Harris Technologies Salt Lake City, Utah
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3Harris is the Trusted Disruptor in defense tech. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Lead, Information Security Systems Engineer Job Code: 33910 Job Location: Salt Lake City, UT Job Schedule: 9/80 (employee's work 9 out of every 14 days - totaling 80 hours worked - and have every other Friday off) Job Description: As a Lead , Information Security Systems Engineer at L3Harris Technologies, you will be involved in the cryptography that enables communication capabilities for the warfighter . We are looking for people with experience with cryptography design , development , and certification via FIPS 140 , Risk Management Framework and/or NSA certification processes . Our team includes both experienced and developing engineers in the field of cryptography , accreditation and certification . We hope to find candidates who are ready to work on a deeply technical, high energy team. Essential Functions: Understand and apply NSA and FIPS 140 requirements to cryptography products Work with both software and hardware design engineers to im plement requirements that satisfy the certification standards Produce design and testing documentation to validate the implementation of the requirements Lead NSA certification and FIPS 140 validation development efforts Interface with internal and external customers to discuss design , implementation , and certification progress Able to adapt to change, focus on timeliness, and collaborate in joint decision-making processes is essential Ask questions and seek clarification on unfamiliar and/or unclear concepts, designs, and implementation details Travel up to 25% as needed Must be eligible to receive a DoD Secret Clearance Required Qualifications (one of the following 3 with a DoD Secret Clearance) : Bachelor's Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree , minimum of 13 years of prior related experience. Preferred Additional Skills: Minimum of 4 years' on-the-job experience related to cryptography design , implementation and/or certification or equivalent educational experience in the form of a cryptography based Master's program . Possesses one of the following certifications at time of hire, or obtain one within 6 months of hire: Associate of CISSP , CISSP , CCNA Security , CSA+ , GICSP , GSEC , Security+ CE , SSCP (DoD 8140/8570 qualified certifications) Able to obtain and maintain a TS/SCI security clearance Strong technical writing skills . Familiar with communications systems , computer networking concepts , protocols (including TCP/IP ), and security methodologies Familiar with security engineering principles and processes Aware of basic security engineering design patterns , processes , and technologies Able to work in both group and individual settings under the direction, oversight, and mentoring of senior engineers Asks questions and seeks clarification on unfamiliar and/or unclear concepts, designs, and implementation details Strong problem-solving , creative thinking, and multi-tasking skills Familiar with RF communications Experience with matrixed development teams ( hardware , software , systems engineers ) and embedded systems engineering JCIDS , DJSIG , NIACAP , FIPS 140-2 or 140-3 , NSA certification High assurance crypto systems Gov't advisory/assistance as SETA / A&AS contractor in cybersecurity -related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST , Anti-Tamper , or other system security specialties L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law. Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions. L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
04/06/2026
Full time
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3Harris is the Trusted Disruptor in defense tech. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Lead, Information Security Systems Engineer Job Code: 33910 Job Location: Salt Lake City, UT Job Schedule: 9/80 (employee's work 9 out of every 14 days - totaling 80 hours worked - and have every other Friday off) Job Description: As a Lead , Information Security Systems Engineer at L3Harris Technologies, you will be involved in the cryptography that enables communication capabilities for the warfighter . We are looking for people with experience with cryptography design , development , and certification via FIPS 140 , Risk Management Framework and/or NSA certification processes . Our team includes both experienced and developing engineers in the field of cryptography , accreditation and certification . We hope to find candidates who are ready to work on a deeply technical, high energy team. Essential Functions: Understand and apply NSA and FIPS 140 requirements to cryptography products Work with both software and hardware design engineers to im plement requirements that satisfy the certification standards Produce design and testing documentation to validate the implementation of the requirements Lead NSA certification and FIPS 140 validation development efforts Interface with internal and external customers to discuss design , implementation , and certification progress Able to adapt to change, focus on timeliness, and collaborate in joint decision-making processes is essential Ask questions and seek clarification on unfamiliar and/or unclear concepts, designs, and implementation details Travel up to 25% as needed Must be eligible to receive a DoD Secret Clearance Required Qualifications (one of the following 3 with a DoD Secret Clearance) : Bachelor's Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree , minimum of 13 years of prior related experience. Preferred Additional Skills: Minimum of 4 years' on-the-job experience related to cryptography design , implementation and/or certification or equivalent educational experience in the form of a cryptography based Master's program . Possesses one of the following certifications at time of hire, or obtain one within 6 months of hire: Associate of CISSP , CISSP , CCNA Security , CSA+ , GICSP , GSEC , Security+ CE , SSCP (DoD 8140/8570 qualified certifications) Able to obtain and maintain a TS/SCI security clearance Strong technical writing skills . Familiar with communications systems , computer networking concepts , protocols (including TCP/IP ), and security methodologies Familiar with security engineering principles and processes Aware of basic security engineering design patterns , processes , and technologies Able to work in both group and individual settings under the direction, oversight, and mentoring of senior engineers Asks questions and seeks clarification on unfamiliar and/or unclear concepts, designs, and implementation details Strong problem-solving , creative thinking, and multi-tasking skills Familiar with RF communications Experience with matrixed development teams ( hardware , software , systems engineers ) and embedded systems engineering JCIDS , DJSIG , NIACAP , FIPS 140-2 or 140-3 , NSA certification High assurance crypto systems Gov't advisory/assistance as SETA / A&AS contractor in cybersecurity -related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST , Anti-Tamper , or other system security specialties L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law. Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions. L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
Systems & Infrastructure Engineer (Level I - V)
Oglethorpe Power Tucker, Georgia
This position leverages expertise in system administration to maintain systems critical to GSOC's system operations function. As a member of the Systems and Infrastructure department, this position is responsible for the system administration of the Operational Technology systems. This position ensures the security and operational readiness of technology to support GSOC's real-time transmission and generation operations. This position will perform system administration on Operational Technology using best practices, such as installation, patching, backup/recovery, system performance monitoring, and implementation of cyber security system hardening guidelines. Maintains awareness of NERC Reliability standards including Critical Infrastructure Protection Standards. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of security, compliance, and continuous improvement to meet the Corporation's goals and objectives. Additional responsibilities include implementation and management of infrastructure tools to provide system configuration consistency, development of processes and documentation to support systems management activities, participating in the Change Management Program, and collection of necessary evidence for NERC CIP compliance. Coordinates with other departments within GSOC including Control Center operations team, Energy Management System Application teams, Security, Networking, and Enterprise IT teams. Coordinates across companies with GTC and OPC operations and maintenance departments. This role will participate in the on-call 24x7 support rotation. Job Duties: All Levels: Develops and maintains components of GSOC's Operational Technology physical/virtual server environment including hypervisors and storage components. Identifies opportunities for operational process improvements, including documentation, automation, and training. Maintain and identify improvements to GSOC's System and Infrastructure Program. Develops, documents, and implements processes and procedures to effectively perform system administration activities in a consistent manner. Identification, researching, and implementing new technologies that operate GSOC's Operational Technology environment to enhance infrastructure security posture. Works with internal and industry peers to explore innovative solutions and evaluate emerging technologies. Works with existing technology vendors to coordinate product support and subscription renewals. Use GSOC procurement process to submit purchasing documentation to management. Collaborates with other functional departments including GSOC System Operations, Networking, Security, and Enterprise IT on initiatives and projects that ensure systems and infrastructure are being designed, built, and maintained in compliance with NERC CIP standards and GSOC's cyber security policies and procedures. Serves as project engineer for Power Technology projects. Provides technical contribution to the project team and provides accountability for meeting projected milestones and deadlines to the management team. Identifies opportunities for operational process improvements, including documentation, automation, and training. Level I-II: Performs routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure under direct supervision. Level III: Performs routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure with minimal supervision. Levels IV- V: Serves as technical lead for routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure. Serves as lead project engineer for Power Technology projects. Provides technical contribution to the project team and provides accountability for meeting projected milestones and deadlines to the management team. Provides training, mentoring, and assistance to junior staff members related to department processes, tools, and technologies. Works with existing technology vendors to coordinate product support and subscription renewals. Routinely collaborate with the management team to identify gaps and perform root cause analysis, consult on budgetary items, and promote corporate goals. Level V: Serves as lead department engineer and provides training, mentoring, and assistance to junior/senior staff members related to department processes, tools, and technologies. Technical leader across multiple subject areas, which could include system administration, security, networking, EMS, or SCADA. Actively seeks improvements to department processes, policies, procedures. Works across multiple business units within the organization to solve complex problems. Required Qualifications: Education: Bachelor's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering Experience: Level I: 0 to 24 months work experience in a system administration, cyber security, or related position. Experience designing, configuring, and maintaining datacenter server environments, including storage, networking, or cloud. Experience performing system hardening, patch management, and configuration management. Experience evaluating and implementing system administration tools or automation platforms to assist with deployment or maintenance of datacenter systems. Level II: 2+ years work experience as stated above. Level III: 4+ years work experience as stated above. Level IV: 6+ years work experience as stated above. Level V: 8+ years work experience as stated above. Equivalent Education & Experience: Level I: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical Engineering or Computer Engineering AND Four (4) plus years of operational technology or real time systems experience with responsibilities related to system administration, such as system hardening, patch management, configuration management, incident response, or backup/recovery. Level II: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 6+ years of experience as stated above. Level III: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 8+ years of experience as stated above. Level IV: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 10+ years of experience as stated above. Level V: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 12+ years of experience as stated above. Licenses, Certifications and/or Registrations: CISSP, GCIP, MCSA, MCSE, NCP-MCI desired, not required. Specialized Skills: Experience in Security Patch Management, Configuration Monitoring, System Performance Monitoring, Backup and Recovery, Disaster Recovery, and Incident Response is desired Experience in providing 24x7 support for real-time data communications systems and troubleshooting system problems involving real-time data communications systems desired Experience with datacenter infrastructure technology, such as virtualization, Hyper Converged Infrastructure (HCI), storage, firewalls, enterprise backup and recovery solutions, and zero trust network architecture desired Understanding of ITIL-based Incident, Asset, and Change Management systems to document work performed. Previous experience with technologies such as ManageEngine/ServiceDesk Plus, Ivanti Service Manager, or ServiceNow is a plus Experience with Windows Server/Workstation administration, SQL Server administration, Linux administration desired Knowledge and experience with database technologies, such as Microsoft SQL, Oracle, or MySQL is preferred Excellent organizational skills and customer/team communications skills are needed to be successful. Must have strong verbal and written communication. Promotes an environment of compliance and continuous improvement. Must be able to pass NERC CIP PRA (Personal Risk Assessment) screening. Unusual Hours: Provide emergency coverage in support of Incident Response activities. Rotational on-call responsibilities. Travel: 10% Georgia System Operations Corporation is an Equal Employment Opportunity Employer, including veterans and disabled. We are a drug-free workplace. All applicants are subject to substance abuse testing.
04/02/2026
Full time
This position leverages expertise in system administration to maintain systems critical to GSOC's system operations function. As a member of the Systems and Infrastructure department, this position is responsible for the system administration of the Operational Technology systems. This position ensures the security and operational readiness of technology to support GSOC's real-time transmission and generation operations. This position will perform system administration on Operational Technology using best practices, such as installation, patching, backup/recovery, system performance monitoring, and implementation of cyber security system hardening guidelines. Maintains awareness of NERC Reliability standards including Critical Infrastructure Protection Standards. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of security, compliance, and continuous improvement to meet the Corporation's goals and objectives. Additional responsibilities include implementation and management of infrastructure tools to provide system configuration consistency, development of processes and documentation to support systems management activities, participating in the Change Management Program, and collection of necessary evidence for NERC CIP compliance. Coordinates with other departments within GSOC including Control Center operations team, Energy Management System Application teams, Security, Networking, and Enterprise IT teams. Coordinates across companies with GTC and OPC operations and maintenance departments. This role will participate in the on-call 24x7 support rotation. Job Duties: All Levels: Develops and maintains components of GSOC's Operational Technology physical/virtual server environment including hypervisors and storage components. Identifies opportunities for operational process improvements, including documentation, automation, and training. Maintain and identify improvements to GSOC's System and Infrastructure Program. Develops, documents, and implements processes and procedures to effectively perform system administration activities in a consistent manner. Identification, researching, and implementing new technologies that operate GSOC's Operational Technology environment to enhance infrastructure security posture. Works with internal and industry peers to explore innovative solutions and evaluate emerging technologies. Works with existing technology vendors to coordinate product support and subscription renewals. Use GSOC procurement process to submit purchasing documentation to management. Collaborates with other functional departments including GSOC System Operations, Networking, Security, and Enterprise IT on initiatives and projects that ensure systems and infrastructure are being designed, built, and maintained in compliance with NERC CIP standards and GSOC's cyber security policies and procedures. Serves as project engineer for Power Technology projects. Provides technical contribution to the project team and provides accountability for meeting projected milestones and deadlines to the management team. Identifies opportunities for operational process improvements, including documentation, automation, and training. Level I-II: Performs routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure under direct supervision. Level III: Performs routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure with minimal supervision. Levels IV- V: Serves as technical lead for routine system administration activities, such as installation, commissioning, patching, system performance monitoring of GSOC's operational technology infrastructure. Serves as lead project engineer for Power Technology projects. Provides technical contribution to the project team and provides accountability for meeting projected milestones and deadlines to the management team. Provides training, mentoring, and assistance to junior staff members related to department processes, tools, and technologies. Works with existing technology vendors to coordinate product support and subscription renewals. Routinely collaborate with the management team to identify gaps and perform root cause analysis, consult on budgetary items, and promote corporate goals. Level V: Serves as lead department engineer and provides training, mentoring, and assistance to junior/senior staff members related to department processes, tools, and technologies. Technical leader across multiple subject areas, which could include system administration, security, networking, EMS, or SCADA. Actively seeks improvements to department processes, policies, procedures. Works across multiple business units within the organization to solve complex problems. Required Qualifications: Education: Bachelor's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering Experience: Level I: 0 to 24 months work experience in a system administration, cyber security, or related position. Experience designing, configuring, and maintaining datacenter server environments, including storage, networking, or cloud. Experience performing system hardening, patch management, and configuration management. Experience evaluating and implementing system administration tools or automation platforms to assist with deployment or maintenance of datacenter systems. Level II: 2+ years work experience as stated above. Level III: 4+ years work experience as stated above. Level IV: 6+ years work experience as stated above. Level V: 8+ years work experience as stated above. Equivalent Education & Experience: Level I: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical Engineering or Computer Engineering AND Four (4) plus years of operational technology or real time systems experience with responsibilities related to system administration, such as system hardening, patch management, configuration management, incident response, or backup/recovery. Level II: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 6+ years of experience as stated above. Level III: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 8+ years of experience as stated above. Level IV: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 10+ years of experience as stated above. Level V: Associate's Degree in Computer Science, Information Systems, Software Engineering, Electrical or Computer Engineering AND 12+ years of experience as stated above. Licenses, Certifications and/or Registrations: CISSP, GCIP, MCSA, MCSE, NCP-MCI desired, not required. Specialized Skills: Experience in Security Patch Management, Configuration Monitoring, System Performance Monitoring, Backup and Recovery, Disaster Recovery, and Incident Response is desired Experience in providing 24x7 support for real-time data communications systems and troubleshooting system problems involving real-time data communications systems desired Experience with datacenter infrastructure technology, such as virtualization, Hyper Converged Infrastructure (HCI), storage, firewalls, enterprise backup and recovery solutions, and zero trust network architecture desired Understanding of ITIL-based Incident, Asset, and Change Management systems to document work performed. Previous experience with technologies such as ManageEngine/ServiceDesk Plus, Ivanti Service Manager, or ServiceNow is a plus Experience with Windows Server/Workstation administration, SQL Server administration, Linux administration desired Knowledge and experience with database technologies, such as Microsoft SQL, Oracle, or MySQL is preferred Excellent organizational skills and customer/team communications skills are needed to be successful. Must have strong verbal and written communication. Promotes an environment of compliance and continuous improvement. Must be able to pass NERC CIP PRA (Personal Risk Assessment) screening. Unusual Hours: Provide emergency coverage in support of Incident Response activities. Rotational on-call responsibilities. Travel: 10% Georgia System Operations Corporation is an Equal Employment Opportunity Employer, including veterans and disabled. We are a drug-free workplace. All applicants are subject to substance abuse testing.

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board