Job Archives


A pivotal role is available at a leading cybersecurity company for a highly organized and technically proficient IT Software Asset Management (SAM) Specialist to join their IT team. This full-time, remote position is open to candidates in the USA, offering exceptional flexibility. You'll take day-to-day ownership of the IT software portfolio's contract lifecycle management, actively managing software usage, reclaiming unused licenses, supporting procurement negotiations, ensuring timely renewals, and significantly reducing software waste.

This role is absolutely critical to optimizing software investments, maintaining compliance, advancing technical asset maturity, and supporting future IT and corporate budget planning for the company. You will also lead the operational setup and ongoing administration of a Software Asset Management platform (such as ServiceNow SAM Pro or an equivalent solution).


Who You Are: A Proactive, Detail-Oriented SAM Leader

You thrive in structured, fast-paced environments where proactive ownership is key. You're a technical thinker who genuinely enjoys problem-solving, analyzing intricate usage data, and identifying strategic cost-saving opportunities. As an operational leader, you ensure no renewal or compliance task ever slips through the cracks. You're a natural collaborator, adept at partnering seamlessly with IT, Finance, and Procurement teams, while leading the SAM process with remarkable independence and precision.

Here are some examples of what that looks like in action:

  • You notice unused software licenses and immediately initiate a reclamation project without waiting to be asked.
  • You meticulously track every vendor contract renewal date months in advance, proactively rallying stakeholders for early conversations.
  • You spot duplicative platforms within the environment and present a well-researched plan to consolidate them, resulting in significant cost savings for the company.
  • You expertly deploy and optimize asset management tools to gain real-time insights into the IT environment and drive data-driven decisions.
  • You consistently leverage asset data and trends to inform IT budget cycles and forward-looking financial planning, ensuring strategic allocation of resources.
  • You possess strong oral and written communication skills, enabling clear and effective interaction across all levels of the organization.

What You Will Do: Owning the Software Asset Lifecycle

As an IT Software Asset Management Specialist, you will oversee the entire lifecycle of the organization's software assets, blending strategic optimization with meticulous operational execution. Your responsibilities will directly impact cost efficiency, compliance, and budget accuracy.

  • License Optimization: You will actively monitor software usage across the organization and efficiently reclaim licenses from inactive users. This proactive approach ensures that the company is not paying for unused software, directly contributing to cost savings and optimal license utilization.
  • Contract Management: You will meticulously track and maintain all IT software agreements, including precise renewal dates, key compliance terms, and licensing metrics. This comprehensive management ensures that all contractual obligations are met and future planning is well-informed.
  • Renewal Process: You will lead the software renewal process by collaborating closely with the Procurement team to initiate renewal conversations at least 90 days in advance. You'll provide essential support materials such as detailed usage reports, contract summaries, and optimization analyses to inform negotiations and secure favorable terms.
  • Software Rationalization: You will proactively identify duplicative or underused software systems across the organization. You will then lead initiatives to reduce waste and eliminate overlapping spend, proposing and executing plans for consolidation or decommissioning to streamline the software portfolio and achieve cost efficiencies.
  • Platform Ownership: You will take full ownership of the Software Asset Management (SAM) platform. This involves meticulously implementing, configuring, and maintaining a SAM tool such as ServiceNow SAM Pro or an equivalent industry-leading solution. Your expertise ensures the platform provides accurate, real-time insights into the software environment.
  • Governance: You will be instrumental in developing robust policies, processes, and reporting practices for software asset management. This establishes a clear framework for how software is acquired, used, monitored, and retired, ensuring compliance and operational excellence across the organization.
  • Reporting: You will deliver regular, insightful dashboards and reports on various critical SAM metrics. This includes detailed information on license utilization, upcoming renewals, potential compliance risks, identified optimization opportunities, and the financial impact of SAM initiatives, providing clear visibility to stakeholders.
  • Budget Planning Support: You will translate SAM findings and insights into actionable intelligence that directly supports IT budget forecasting, renewal planning, and overall cost optimization strategies. Your data-driven contributions will inform strategic financial planning and ensure efficient allocation of IT resources.
  • Cross-Functional Collaboration: You will foster strong partnerships and collaborate extensively with IT, Finance, GRC (Governance, Risk, and Compliance), Procurement, and Security teams. This ensures an aligned, compliant, and cost-effective software environment, where all stakeholders contribute to and benefit from robust SAM practices.

Must Haves: Your Essential Qualifications

To excel as an IT Software Asset Management Specialist, you'll need significant experience in SAM, hands-on platform expertise, strong data analysis skills, and an independent, proactive work style.

  • Experience Managing IT Software Assets and Licensing (3-5+ years): You must possess 3-5+ years of verifiable experience managing IT software assets and licensing. This extensive background demonstrates your practical knowledge of SAM principles, processes, and the complexities of software entitlements.
  • Educational Background: A Bachelor’s degree in Information Technology, Business Administration, or a related field (or equivalent experience) is required. This academic foundation provides the essential knowledge for understanding business operations and IT systems.
  • Hands-on SAM Platforms Experience: You have hands-on experience with SAM platforms such as ServiceNow SAM Pro, Flexera, Snow Software, or an equivalent industry-leading tool. This indicates your practical ability to configure, administer, and leverage these systems for effective software asset management.
  • Strong Knowledge of Software Licensing Models: You possess strong knowledge of various software licensing models, including SaaS (Software as a Service), subscription-based licenses, and perpetual licenses. This understanding is critical for optimizing costs and ensuring compliance across a diverse software portfolio.
  • Familiarity with Contract Terms and Compliance: You have strong familiarity with contract terms, understanding key clauses related to software usage, renewals, and audits. This includes knowledge of compliance requirements and preparing for vendor audits, ensuring the organization adheres to all contractual obligations.
  • Strong Data Analysis, Reporting, and Dashboard Development Skills: You demonstrate strong data analysis, reporting, and dashboard development skills. This includes the ability to extract insights from software usage data, create clear and compelling reports, and build informative dashboards for various stakeholders.
  • Excellent Communication Skills: You possess excellent written, verbal, and cross-functional communication skills. This is crucial for collaborating with diverse teams, negotiating with vendors, and presenting complex data clearly to all levels of the organization.
  • Proactive, Independent Work Style: You exhibit a proactive, independent work style, demonstrating initiative and accountability in managing tasks with minimal oversight. This is coupled with a meticulous attention to operational excellence, ensuring high standards in all SAM activities.
  • Experience Working in a Remote-First Company: You have practical experience working in a remote-first company. This is crucial for success in a fully remote role, highlighting your ability to collaborate effectively, manage time autonomously, and thrive in a distributed team environment.

Nice to Have: Enhancing Your SAM Profile

  • SAM Certification: A certification in Software Asset Management (e.g., CSAM - Certified Software Asset Manager) or an ITIL Foundation certification would be a significant plus, validating your specialized knowledge in SAM processes or IT service management.
  • Vendor Negotiation Assistance: Experience assisting in vendor negotiations, particularly by providing usage and optimization data to Procurement teams, is desirable. This demonstrates your ability to contribute to cost-saving efforts directly.
  • Software Rationalization Experience: Experience with software rationalization, including identifying duplicate systems and leading consolidation initiatives, is a plus, showcasing your ability to streamline software portfolios.
  • Knowledge of Major Vendor Licensing: Specific knowledge of major vendor licensing models (e.g., Google, Zoom, Slack, Microsoft) would be highly beneficial, indicating familiarity with common enterprise software providers.

Compensation & Benefits: Rewarding Your Impact

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $93,500—$110,000 USD.

The company's compensation and benefits philosophy is designed to attract, motivate, and retain top talent. They pay competitively, and equity is an important and exciting part of their total compensation strategy as a pre-IPO startup, guided by the belief that team members should share in the financial success of the company. They offer flexible PTO, observe 12 paid holidays, and provide generous healthcare coverage (100% of employee healthcare premium costs in the US, and up to 100% for dependents, depending on the plan). As a globally-distributed, majority remote company, they prioritize a balance of deep focus time with virtual meetings and regular in-person events. As a fast-growing startup, they continuously review, improve, and personalize their benefits offerings based on team input.


Job Features

Job CategoryIT, Security

A pivotal role is available at a leading cybersecurity company for a highly organized and technically proficient IT Software Asset Management (SAM) Specialist to join their IT team. This full-time, re...View more


A pivotal role is available at Abnormal AI for a highly driven IT Project Manager to support their cutting-edge AI Platform team. This full-time, remote position is open to candidates in the USA, offering exceptional flexibility. You'll help drive the delivery of impactful AI capabilities by managing multiple concurrent projects within an Agile framework. This unique opportunity allows you to orchestrate seamless collaboration across ML, infrastructure, and product teams. Your leadership will directly enable fast, reliable feature development at scale, ultimately impacting the robust protection Abnormal AI delivers to its customers.


Who You Are: A Master of Agile, Driving AI Impact

You're confident leading Agile and Scrum ceremonies, excelling at facilitating collaboration across technical teams. Highly organized and driven by curiosity, you consistently improve project visibility and accountability. You’re comfortable working in deeply technical environments and possess a solid knowledge of machine learning, data engineering, or AI concepts. As an excellent communicator, you keep stakeholders informed and aligned across both technical and business units. You thrive in ambiguity, take ownership, and deliver impactful results quickly. You’re passionate about process excellence, continuous improvement, and creating clarity and structure where it doesn’t yet exist. You value inclusivity, clear communication, and bring a customer-obsessed, intellectually honest mindset to everything you do.


What You Will Do: Orchestrating AI/ML Projects from Conception to Delivery

As an AI Platform Project Manager, you'll be at the heart of the AI development lifecycle, ensuring that complex initiatives are executed seamlessly and deliver measurable business value. Your responsibilities will blend strategic planning, meticulous execution, and effective communication across diverse teams.

  • Drive AI Platform Projects: You will drive AI Platform projects from conception to delivery within a dynamic Agile environment. This involves overseeing the entire project lifecycle, from initial ideation and requirements gathering to development, testing, and successful deployment of AI capabilities. Your leadership will ensure projects align with strategic goals and are completed efficiently.
  • Maintain Sprint Plans and Backlog Hygiene: You'll meticulously maintain sprint plans, ensuring all tasks are clearly defined, prioritized, and assigned. You'll expertly coordinate team ceremonies (e.g., daily stand-ups, sprint planning, sprint reviews, retrospectives) to foster collaboration and transparency. Additionally, you'll ensure accurate story estimation and maintain backlog hygiene, making sure the product backlog is well-organized, refined, and ready for development.
  • Define and Track KPIs for Delivery Performance: You will strategically define and track Key Performance Indicators (KPIs) to rigorously measure project delivery performance and stakeholder satisfaction. This involves identifying relevant metrics (e.g., velocity, lead time, defect density, stakeholder feedback), collecting data, and reporting on progress to evaluate the effectiveness of project execution and identify areas for improvement.
  • Build and Maintain Stakeholder Relationships: You will cultivate and build and maintain strong relationships with Engineering, Data Science, and Product partners. This involves fostering open communication, understanding their needs, managing expectations, and ensuring alignment across diverse technical and business functions. Your collaborative approach is crucial for seamless project execution.
  • Implement Tooling for Project Tracking and Reporting: You will actively implement and manage tooling for project tracking, communication, and reporting. This includes leveraging platforms like ServiceNow, Jira, or similar Agile project management tools to ensure comprehensive visibility into project status, facilitate team collaboration, and streamline reporting processes for all stakeholders.
  • Facilitate Retrospectives and Continuous Improvement: You will expertly facilitate retrospectives and continuous improvement loops. This involves leading discussions to identify what went well, what could be improved, and developing actionable plans for enhancing team processes, tools, and overall efficiency. Your leadership here fosters a culture of iterative improvement.
  • Report Regularly to Leadership: You will report regularly to leadership with concise updates on project progress, identified blockers, and proposed mitigation strategies. Your clear and timely communication ensures that senior management is well-informed and can provide necessary support to resolve impediments and keep strategic initiatives on track.
  • Support Roadmap Planning and Resource Forecasting: You will provide crucial support for roadmap planning by contributing insights on project feasibility, technical dependencies, and estimated effort. You'll also assist with team resource forecasting, ensuring that sufficient personnel are available to meet future project demands and that resources are optimally allocated for upcoming initiatives.

Must Haves: Your Foundational Expertise for Project Management

To excel as an AI Platform Project Manager, you'll need substantial experience in technical project management, particularly within Agile frameworks and AI/ML domains, along with strong communication and problem-solving skills.

  • Project Management Experience in Technology (4-6 years): You must possess 4–6 years of verifiable project management experience in technology environments, with a primary focus on utilizing Agile delivery methodologies. This demonstrates your practical ability to manage technical projects within iterative development cycles.
  • Experience with AI/ML or Data Engineering Teams: You have proven experience working with or supporting AI/ML or Data Engineering teams. This indicates your understanding of the unique challenges, workflows, and technical requirements associated with machine learning and data-intensive projects.
  • Proficiency with Agile Project Management Tools: You possess a solid command of ServiceNow, Jira, and/or similar Agile project management tools. This demonstrates your ability to manage work items, track progress, facilitate ceremonies, and maintain project visibility within an Agile framework.
  • Track Record of Delivering High-Impact Features: You have a proven track record of delivering high-impact software or platform features. This highlights your ability to drive projects to successful completion, resulting in tangible business value and measurable outcomes.
  • Effective Communication and Facilitation Skills: You are an effective communicator and facilitator across highly technical and non-technical audiences. This enables you to bridge communication gaps, foster understanding, and lead productive discussions with diverse stakeholders.
  • Bachelor's Degree: You hold a Bachelor's degree in Computer Science, Information Systems, or a related field. This academic background provides a strong foundational understanding relevant to technology and project management.
  • Demonstrated Ability to Drive Change: You have a demonstrated ability to drive change and process improvements in ambiguous environments. This indicates your proactive mindset, leadership capabilities, and comfort with navigating uncertainty to achieve positive outcomes.
  • Experience with Distributed or Remote Teams: You have practical experience working with distributed or remote-first teams. This is crucial for success in a fully remote role, highlighting your ability to collaborate effectively across geographical boundaries.

Nice to Have: Enhancing Your Project Management Profile

  • PMP, CSM, or SAFe Certification: Possession of a PMP (Project Management Professional), CSM (Certified ScrumMaster), or SAFe (Scaled Agile Framework) certification is a plus, indicating formal training and expertise in project or agile methodologies.
  • MLOps Workflow Experience: Experience with MLOps (Machine Learning Operations) workflows or AI/ML deployment practices would be beneficial, demonstrating familiarity with operationalizing machine learning models.
  • High-Growth Startup or SaaS Company Experience: Experience at a high-growth startup or SaaS (Software as a Service) company is a plus, indicating adaptability to fast-paced, evolving environments.
  • Cloud Platforms Exposure: Exposure to cloud platforms like AWS (Amazon Web Services), GCP (Google Cloud Platform), or Azure (Microsoft Azure) would be advantageous, demonstrating familiarity with cloud computing environments.
  • Data Product or AI Feature Lifecycle Management: A background in data product or AI feature lifecycle management would be a plus, indicating an understanding of managing data-centric products from conception to retirement.
  • ServiceNow SPM / PPM Experience: Experience managing processes/projects in ServiceNow SPM (Strategic Portfolio Management) / PPM (Project Portfolio Management) would be beneficial for leveraging a specific enterprise tool.

Compensation & Benefits: Rewarding Your Impact

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $114,800—$135,050 USD.

Our client's compensation and benefits philosophy is designed to attract, motivate, and retain top talent. They pay competitively, and equity is an important and exciting part of their total compensation strategy as a pre-IPO startup, guided by the belief that team members should share in the financial success of the company. They offer flexible PTO, observe 12 paid holidays, and provide generous healthcare coverage (100% of employee healthcare premium costs in the US, and up to 100% for dependents, depending on the plan). As a globally-distributed, majority remote company, they prioritize a balance of deep focus time with virtual meetings and regular in-person events. As a fast-growing startup, they continuously review, improve, and personalize their benefits offerings based on team input.

A pivotal role is available at Abnormal AI for a highly driven IT Project Manager to support their cutting-edge AI Platform team. This full-time, remote position is open to candidates in the USA, offe...View more


A reputable a company focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers.  is seeking a well-rounded AI Solution Engineer to join their technology team. This full-time, remote role is open to candidates living in the United States and Canada, offering exceptional flexibility. In this high-impact position, you will serve as a key contributor to the technical development of AI-powered tools and platforms—designing, building, and deploying solutions that transform how teams operate. You'll be hands-on with coding, system integration, and model implementation, while also deeply involved with stakeholders to identify high-impact opportunities for AI adoption.

This is a high-velocity, high-visibility role for someone who is customer-obsessed, technologically fluent, and highly motivated to drive measurable outcomes with AI.


Who You Are: A Customer-Obsessed, Impact-Driven Engineer

You're an engineer with a passion for building impactful, real-world solutions, thriving at the intersection of technology, communication, and innovation. You're comfortable working across both technical and non-technical domains, bringing fantastic communication skills and a systems-thinking mindset to every challenge. You have hands-on experience with AI tools, development frameworks, APIs, and automation, and you’re always exploring emerging technologies with curiosity and enthusiasm. From ideation to production, you’re confident architecting and implementing end-to-end AI solutions that solve real business problems. You navigate ambiguity with ease, translating complex requirements into elegant, scalable systems, and you take pride in helping others adopt new tools through training and support. A proactive teammate, you can take ownership of your work, iterate quickly, and know when progress today is more valuable than perfection tomorrow. Detail-oriented but never losing sight of the bigger picture, you balance technical excellence with business impact—always focused on solutions that truly matter.


What You Will Do: Accelerating Business Functions with AI

In this role, you'll be instrumental in designing and implementing AI tools, workflows, and integrations that directly empower key business functions. Your responsibilities will bridge technical development with strategic enablement and continuous optimization of AI solutions.

  • Design and Implement AI Tools, Workflows, and Integrations: You'll design and implement custom AI tools, workflows, and integrations specifically tailored to empower key business functions like Sales, Marketing, and Customer Success. This involves creating new software solutions, configuring existing platforms, and ensuring seamless data flow between AI models and business applications to drive efficiency and impact.
  • Engage Directly with Stakeholders: You'll engage directly with stakeholders from various business units to assess their needs, understand their processes, and map AI capabilities to real process improvements. This collaborative approach ensures that AI solutions are designed to solve genuine business challenges and deliver measurable value.
  • Hands-on Development and Deployment of AI Tools: Whether building custom solutions or leveraging third-party platforms, you'll be hands-on in developing and deploying AI tools that drive efficiency and impact. This includes writing code, configuring tools, integrating APIs, and optimizing tool usage to ensure AI models are effectively operationalized within business workflows.
  • Collaborate Across Internal Teams: You'll foster strong relationships and collaborate across internal teams, including AI/ML engineering, IT operations, and data teams. This ensures that AI solutions are designed to be secure, scalable, and compliant with organizational standards, facilitating seamless integration into the existing technology landscape.
  • Support Enablement Efforts with Documentation and Best Practices: You'll play a crucial role in supporting enablement efforts by creating comprehensive documentation and best practices for AI tool usage. This material will support broader adoption across the organization, empowering users to leverage AI effectively and confidently in their daily work.
  • Monitor Usage Metrics and Iterate Based on Insights: You'll continuously monitor usage metrics for deployed AI tools and solutions. This involves collecting data on adoption rates, performance, and user engagement. You'll then iterate based on these insights, making data-driven improvements to optimize tool effectiveness and ensure they continue to meet evolving business needs.
  • Stay Up to Date with Emerging AI Platforms: You'll proactively stay up to date with emerging AI platforms and diligently evaluate their fit for the business. This commitment to continuous learning ensures that the organization remains at the forefront of AI innovation, exploring new technologies that can further enhance operational capabilities.

Must Haves: Your Core Skills for AI Solution Engineering

To excel as an AI Solution Engineer, you'll need a strong foundation in technical solution development, expertise in AI/ML libraries, and the ability to translate business needs into AI-driven outcomes.

  • Experience in Technical Solution Development: You must possess 3–4 years of verifiable experience in technical solution development, AI/ML applications, or IT systems enablement. This background demonstrates your practical ability to build and deploy technology solutions in a professional environment.
    • A Master’s degree in Machine Learning, AI, or a related field may substitute for some experience.
  • Python Proficiency with AI/ML Frameworks: You must be proficient in Python and have hands-on experience using AI/ML libraries and frameworks. This includes familiarity with LangChain (for LLM application development), Hugging Face (for pre-trained models), Transformers (for NLP), Scikit-learn (for classical ML), TensorFlow (for deep learning), and PyTorch (for deep learning). This expertise is fundamental to building advanced AI solutions.
  • Translating Business Requirements into AI Projects: You are skilled at translating complex business requirements into actionable technical solutions, with a proven ability to deliver AI projects from initial ideation through to successful production deployment. This highlights your end-to-end project lifecycle management skills for AI initiatives.
  • Hands-on Experience with AI Tool Deployment: You have direct hands-on experience configuring and deploying AI tools through various methods, including APIs, SDKs (Software Development Kits), or SaaS platforms. This demonstrates your practical ability to integrate and operationalize AI solutions within diverse business environments.
  • Ability to Assess Business Challenges and Recommend AI Solutions: You possess the strong ability to assess business challenges and effectively recommend AI-driven solutions that provide measurable value. This requires a keen analytical mind and an understanding of how AI capabilities can address real-world problems.
  • Experience with LLM APIs and AI Platforms: You have practical experience with LLM (Large Language Model) APIs (e.g., OpenAI) and familiarity with prominent AI platforms like Google AI Studio, AWS Bedrock, or other similar AI platforms. This indicates your proficiency in leveraging cutting-edge generative AI models for application development.
  • Fantastic Communication and Documentation Skills: You possess fantastic communication skills, both verbal and written, essential for user training and effective stakeholder interaction. Your ability to create clear documentation is crucial for enabling broader AI adoption.
  • Experience Collaborating with Various Teams: You have proven experience in collaborating with various teams, such as marketing and business operations. This highlights your cross-functional teamwork abilities and your capacity to align AI solutions with diverse business needs.
  • Working Knowledge of AI Privacy, Security, and Compliance: You bring a solid working knowledge of data privacy, security, and compliance best practices in AI implementation. This ensures that the AI solutions you develop are not only effective but also adhere to ethical guidelines and regulatory requirements.

Nice to Have: Enhancing Your AI Solution Engineering Profile

  • High-Growth or Startup Environment Experience: Experience working in a high-growth or startup environment is a plus. This indicates adaptability, resilience, and comfort with fast-paced, evolving landscapes.
  • AI Chatbots, Copilots, or Automation Tools Deployment: Prior experience deploying AI chatbots, copilots, or automation tools to support various business functions would be highly beneficial, demonstrating practical application of AI for efficiency.
  • Modern Data Stacks Familiarity: Familiarity with modern data stacks (e.g., dbt, Snowflake, Databricks) and an understanding of how AI connects to data workflows would be a valuable asset, showcasing a broader data ecosystem understanding.
  • Prompt Engineering Experience: Experience with prompt engineering and prompt optimization for generative AI tools is a plus, indicating specialized skills in fine-tuning LLM interactions.
  • IT Service Management/Agile Project Management Familiarity: Exposure to IT service management or agile project management practices would be beneficial for understanding operational workflows and project delivery.
  • MLOps Practices Familiarity: Familiarity with MLOps practices (e.g., Docker, Git, CI/CD, monitoring) would be a plus, demonstrating an understanding of operationalizing machine learning models.
  • Other Programming Languages: Familiarity with other programming languages (e.g., SQL, JavaScript) would be advantageous, showcasing versatility.

Compensation & Benefits: Rewarding Your Impact

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $114,800—$135,000 USD.


If this AI Solution Engineer role aligns with your passion for building impactful AI tools, your expertise in Python and AI/ML frameworks, and your drive to accelerate AI adoption across an organization, we encourage you to learn more about this exciting full-time, remote opportunity.

Are you ready to design, build, and deploy AI solutions that transform how teams operate?

Job Features

Job CategoryIT, Security

A reputable a company focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers.  is seeking a well-rounded AI Solution Engi...View more

Onsite, Permanent
Dallas, TX
Posted 3 days ago

SkillPatron (DBA eStreet Security), we are at the forefront of digital security, dedicated to safeguarding our clients' digital assets with innovative and robust solutions. We are seeking an exceptional Application Security Engineer to join our dynamic team in Dallas, TX. This highly specialized cybersecurity role is crucial for ensuring the confidentiality, integrity, and availability of our clients' applications.

Key Responsibilities:

Security Assessments:

  • Conduct in-depth security assessments of applications, including manual source code reviews to identify vulnerabilities such as SQL injection, Cross-Site Scripting (XSS), and insecure authentication mechanisms.
  • Perform penetration testing using tools like Burp Suite and OWASP ZAP to simulate real-world attacks, exploit vulnerabilities, and assess the overall security posture of applications. This includes utilizing Burp Suite's intruder functionality for automated vulnerability scanning and ZAP's scripting capabilities for customized security testing.
  • Employ static and dynamic analysis tools (SAST/DAST) to identify potential security flaws in application code and runtime behavior, respectively.

Security Solution Development:

  • Design, develop, and implement robust security solutions to address identified vulnerabilities, including secure authentication and authorization mechanisms, data encryption techniques, and input validation routines.
  • Architect and implement security measures within applications, leveraging knowledge of secure coding practices and security frameworks such as OWASP and NIST Cybersecurity Framework.
  • Collaborate closely with development teams to integrate security best practices and controls into every phase of the SDLC, promoting a security-by-design approach.

Secure Coding and Training:

  • Champion secure coding practices and provide expert guidance and training to development teams on secure coding techniques, security standards, and best practices in languages like Python and Java.
  • Stay abreast of the latest application security threats, vulnerabilities, and mitigation techniques, proactively identifying and addressing potential risks through continuous research and threat intelligence analysis.
  • Utilize tools like Ghidra to reverse engineer and analyze malicious software targeting applications, understanding attack patterns and developing effective countermeasures.

Collaboration and Communication:

  • Work effectively in a highly collaborative environment, closely interacting with software developers, architects, project managers, and other stakeholders to ensure application security is prioritized throughout the SDLC.
  • Clearly and effectively communicate complex security concepts, findings, and recommendations to both technical and non-technical audiences, fostering a security-conscious culture within the organization.
  • Contribute to the development and maintenance of comprehensive security policies, standards, and procedures, ensuring alignment with industry best practices, regulatory requirements, and evolving threat landscape.

Incident Response:

  • Assist in incident response activities related to application security incidents, contributing to the timely detection, analysis, containment, and eradication of security breaches.
  • Utilize Kali Linux and its suite of security tools to conduct forensic investigations, analyze network traffic, and identify the root cause of security incidents.
  • Recommend and implement preventive measures to avoid future security incidents and enhance the overall security posture of applications.

Japanese Language Proficiency:

  • JLPT N4 or N5 level is required: This level of proficiency in Japanese is essential to collaborate effectively with our team in Japan on security-related tasks, particularly for the localization and cultural adaptation of the eStreet Security app for the Japanese market. This includes translating security-related content, adapting security features to comply with local regulations, and providing technical support to Japanese-speaking clients.

What We Offer:

- A dynamic and supportive work environment.
- Opportunities for professional growth and development.
- Competitive salary and comprehensive benefits package.
- The chance to work with cutting-edge technology in a rapidly evolving field.

Join us at SkillPatron Corporation dba eStreet Security and be a vital part of our mission to protect and empower our clients through top-tier information security solutions.

Job Features

Job CategoryEngineering, IT, Security

SkillPatron (DBA eStreet Security), we are at the forefront of digital security, dedicated to safeguarding our clients’ digital assets with innovative and robust solutions. We are seeking an exc...View more


A rapidly growing cybersecurity company, focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers is looking for an Infrastructure/DevOps Engineer to join their IT team. This full-time, remote role is open to candidates living in the United States or Canada. In this high-impact position, you will be instrumental in enabling AI software engineers to move fast by building and maintaining reliable, scalable, and secure infrastructure. You will partner closely with IT, security, and AI/ML engineering teams, ensuring that foundational systems robustly support the experimentation, deployment, and monitoring of advanced AI tools and solutions.

This role is ideal for someone who thrives at the intersection of systems engineering and AI enablement, and who loves solving complex operational challenges to unlock innovation across the company. You'll contribute directly to protecting the modern workplace from sophisticated threats with AI-native technology, working alongside talented colleagues in a culture of learning, ownership, and high performance.


Who You Are: A Collaborative, Security-Minded Builder

You're a skilled Infrastructure/DevOps Engineer with a solid background in cloud infrastructure and platform engineering. You love building scalable systems that empower other engineers to work faster and more efficiently. You thrive in collaborative, cross-functional environments and embody a customer-first mindset – your internal teams are your customers, and your goal is to remove blockers and boost their productivity. You're passionate about automation, self-service tools, and building highly reliable systems. You deeply value security, observability, and operational excellence, and you communicate clearly through both meticulous documentation and effective collaboration. You consistently stay up-to-date with the latest trends in DevOps and AI infrastructure, and you're driven by impact, ownership, and continuous improvement, always moving fast without sacrificing quality.


What You Will Do: Accelerating AI/ML Development at Scale

As an Infrastructure/DevOps Engineer, you'll be at the forefront of designing, implementing, and optimizing the foundational systems that power advanced AI/ML initiatives. Your responsibilities will blend architecture, automation, security, and performance tuning in a dynamic cloud environment.

  • Architect and Manage Infrastructure for AI/ML: You will architect and manage the foundational infrastructure that specifically supports AI/ML pipelines, critical AI tools, and vast data platforms. This involves designing scalable, resilient, and high-performance environments that meet the unique computational and data storage demands of machine learning and artificial intelligence workloads.
  • Implement and Maintain Containerization and Orchestration: You will actively implement and maintain containerization technologies like Docker (for packaging applications into portable containers) and orchestration platforms like Kubernetes (for managing, scaling, and deploying containerized applications). Your expertise ensures efficient resource utilization and reliable application delivery for AI/ML solutions.
  • Develop CI/CD Systems for Reproducible AI: You will be instrumental in developing robust CI/CD (Continuous Integration/Continuous Delivery) systems that are meticulously integrated with ML workflows. This ensures reproducible AI experiments by automating the build, test, and deployment processes for machine learning models and applications, promoting consistency and accelerating the iteration cycle.
  • Collaborate on Data Protection Standards: You will collaborate closely with security and compliance teams to ensure that all infrastructure components and configurations meet stringent data protection standards. This involves implementing security controls, adhering to regulatory requirements, and safeguarding sensitive AI/ML data throughout its lifecycle.
  • Automate Provisioning and Deployment with IaC Tools: You will drive automation by automating provisioning and deployment processes using cutting-edge Infrastructure as Code (IaC) tools such as Terraform or Pulumi. Your proficiency in IaC ensures that infrastructure can be deployed consistently, rapidly, and reliably across various environments, reducing manual effort and potential errors.
  • Monitor and Troubleshoot Infrastructure Issues: You will continuously monitor and troubleshoot infrastructure issues using industry-leading tools like Prometheus (for metrics collection), Grafana (for data visualization and dashboards), and the ELK stack (Elasticsearch, Logstash, Kibana) for centralized logging and analysis. Your proactive monitoring and expert troubleshooting will ensure high availability and performance of foundational systems.
  • Partner with AI and Software Engineers for Optimization: You will partner closely with AI and software engineers to optimize platform performance and resource utilization. This involves understanding their specific needs, identifying bottlenecks in AI/ML workloads, and implementing solutions (e.g., resource allocation adjustments, infrastructure scaling) that enhance the efficiency and speed of AI development and deployment.
  • Maintain Clear, Accessible Documentation: You will meticulously maintain clear, accessible documentation to effectively scale platform knowledge across the organization. This includes creating architectural diagrams, operational runbooks, troubleshooting guides, and best practices, empowering other teams to leverage the infrastructure effectively and ensuring long-term maintainability.

Must Haves: Your Essential Qualifications

To excel as an Infrastructure/DevOps Engineer, you'll need extensive experience in DevOps, SRE, or infrastructure engineering roles, with strong cloud, containerization, scripting, and automation skills.

  • Extensive DevOps, SRE, or Infrastructure Experience: You possess 4+ years of demonstrable experience in DevOps, SRE (Site Reliability Engineering), or Infrastructure Engineering roles. This background indicates a solid understanding of building and maintaining scalable, reliable, and efficient IT infrastructure.
  • Cloud Providers, Kubernetes, and Docker Proficiency: You have strong proficiency with cloud providers (AWS preferred), indicating hands-on experience with core cloud services. Crucially, you are proficient with Kubernetes (for container orchestration) and Docker (for containerization), demonstrating your ability to manage modern application deployment environments.
  • Infrastructure as Code Tools Experience: You have hands-on experience with infrastructure as code tools such as Terraform, Ansible, or Pulumi. This demonstrates your ability to provision and manage infrastructure declaratively and automate deployment processes effectively.
  • Strong Scripting Skills: You possess strong scripting skills in Python, Bash, or similar languages. This proficiency is essential for automating administrative tasks, building custom tools, and streamlining operational workflows.
  • Familiarity with CI/CD Systems: You have familiarity with CI/CD (Continuous Integration/Continuous Delivery) systems such as GitHub Actions, Jenkins, or CircleCI. This indicates your understanding of automated build, test, and deployment pipelines.
  • Understanding of Cloud Networking, Security, and Identity Management: You have a solid understanding of networking, security, and identity management in cloud environments. This includes knowledge of virtual networks, security groups, firewalls, IAM roles, and best practices for securing cloud resources.
  • Experience Supporting ML Workloads and GPU Infrastructure: You have practical experience supporting ML workloads (machine learning models and applications) and GPU-based infrastructure. This demonstrates your ability to manage specialized hardware and software environments required for computationally intensive AI tasks.
  • Ability to Troubleshoot Complex System Issues: You possess the ability to troubleshoot complex system issues effectively within a distributed environment. This indicates strong analytical and problem-solving skills for diagnosing and resolving intricate technical problems.
  • Comfort Working Across Functional Teams: You are comfortable working across functional teams and communicating effectively with both technical and non-technical stakeholders. This includes translating complex technical concepts into understandable terms for various audiences, fostering collaboration.

Nice to Have: Enhancing Your AI Infrastructure Profile

  • MLOps Tools Familiarity: Familiarity with MLOps tools like MLflow, Kubeflow, or SageMaker would be a plus, indicating a deeper understanding of machine learning operations workflows.
  • AI Platform Infrastructure Experience: Experience with AI platform infrastructure, including model serving (deploying trained models for inference) and feature stores (managing reusable features for ML models), would be highly desirable.
  • Logging and Monitoring Frameworks Knowledge: Knowledge of logging and monitoring frameworks such as Fluentd or Loki (for collecting and aggregating log data) would be beneficial.
  • Data Platform Support Background: A background in supporting data platforms like Snowflake, Databricks, or Hadoop would be a plus, indicating broader data engineering capabilities.
  • Startup or High-Growth Tech Experience: Experience working in high-growth startups or tech companies, where ambiguity and rapid change are common, would be advantageous.
  • AWS Certified: Holding an AWS certification (e.g., Solutions Architect, DevOps Engineer) is a significant plus, validating your expertise in AWS cloud services.

Compensation & Benefits: Rewarding Your Impact

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $127,500—$150,000 USD. For positions based in San Francisco/New York, the base pay range is $140,300—$165,000 USD.

Our client's compensation and benefits philosophy is designed to attract, motivate, and retain top talent. They pay competitively, and equity is an important and exciting part of their total compensation strategy as a pre-IPO startup, guided by the belief that team members should share in the financial success of the company. They offer flexible PTO, observe 12 paid holidays, and provide generous healthcare coverage (100% of employee healthcare premium costs in the US, and up to 100% for dependents, depending on the plan). As a globally-distributed, majority remote company, they prioritize a balance of deep focus time with virtual meetings and regular in-person events. As a fast-growing startup, they continuously review, improve, and personalize their benefits offerings based on team input.


If this Infrastructure/DevOps Engineer role aligns with your passion for building scalable, secure, and reliable infrastructure for AI platforms, your expertise in cloud environments and automation, and your drive to unlock innovation, we encourage you to learn more about this exciting full-time, remote opportunity.

Are you ready to accelerate AI/ML development in a leading cybersecurity company?

Job Features

Job CategoryEngineering, IT

A rapidly growing cybersecurity company, focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers is looking for an Infrastr...View more


A security MSSP focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers, is on the hunt for a visionary Senior Cyber Security Engineer to help build the next generation of security capabilities at scale. This full-time, remote position in the USA is a senior individual contributor (IC)-level role that perfectly blends deep technical security expertise with strong engineering fundamentals. You'll be instrumental in building integrations between infrastructure and security tooling, automating crucial security workflows, and partnering with cloud and platform engineering teams to harden the cloud environment.

As a technical lead, you'll own the architecture and development of systems that enhance both preventative guardrails and detective capabilities, all while ensuring security is a proactive partner to stakeholders. You'll also mentor junior engineers, act as a vital technical liaison across teams, and contribute directly to keeping our client's platforms and customers secure. This is the ideal role for engineers who are intellectually curious and highly motivated to bridge the gap between security principles and practical engineering execution.


Who You Are: A Security-Minded Engineering Leader

You're an intellectually curious, solution-focused engineer with a strong security mindset who thrives in fast-paced environments. You are:

  • A technical leader who can architect scalable security solutions while maintaining engineering velocity.
  • Someone who thinks like an attacker but builds like a defender, possessing a deep understanding of both offensive and defensive security principles.
  • A collaborative engineer who can seamlessly translate complex security requirements into actionable engineering tasks.
  • A dedicated mentor who genuinely enjoys teaching security best practices and automation techniques to junior engineers, fostering their growth and expertise.

What You Will Do: Architecting and Automating Cloud Security at Scale

As a Senior Cyber Security Engineer, your responsibilities will involve a strategic blend of security architecture, hands-on automation, incident response, and continuous improvement, all focused on strengthening cloud security within a dynamic environment.

  • Lead Threat Modeling and Security Design Discussions: You'll take the lead in threat modeling and security design discussions with platform teams. This involves proactively identifying potential threats and vulnerabilities in new and existing systems, and meticulously translating these risks into actionable engineering tasks and secure architectural designs. Your input ensures security is embedded from the earliest stages of development.
  • Build Scalable Preventative Controls via Infrastructure-as-Code (IaC): You will collaborate extensively with Platform, Infrastructure, and DevOps teams to build scalable preventative controls primarily leveraging Infrastructure-as-Code (IaC). This includes using Terraform as a primary tool, with experience in CloudFormation also being welcome. Your work will ensure security guardrails are automatically enforced, preventing misconfigurations and vulnerabilities at scale.
  • Evaluate and Uplift Security Tooling: You'll be responsible for meticulously evaluating and uplifting existing security tooling across both commercial and cloud-native capabilities. Your focus will be on enhancing their scale, efficiency, and precision, ensuring that the security team has the most effective and performant tools to detect, prevent, and respond to threats across a large, dynamic environment.
  • Mentor and Support Junior Engineers: You will play a crucial role in mentoring and supporting junior engineers by sharing your deep expertise in automation best practices, secure architecture principles, and tooling integrations. Your guidance will foster their professional development and contribute to the overall strength and capability of the engineering teams.
  • Design and Deploy Automation Workflows for Incident Response: You will architect, design, and deploy advanced automation workflows to significantly enhance incident response capabilities. This involves building systems that can automatically correlate security signals, enrich alerts with contextual information, and auto-remediate known failure patterns, minimizing manual intervention and accelerating response times during security incidents.
  • Architect, Build, and Maintain Integrations: You will architect, build, and maintain crucial integrations between cloud-native infrastructure and various security tooling. This includes seamlessly connecting cloud services with SIEM (Security Information and Event Management) systems for centralized logging and analysis, SOAR (Security Orchestration, Automation, and Response) platforms for automated responses, and IAM (Identity and Access Management) tooling for robust access controls.
  • Serve as a Hands-on Technical Contributor During Security Incidents: You will serve as a vital hands-on technical contributor during security incidents. This involves actively participating in incident response efforts by meticulously tracing system-level behavior, performing forensic analysis, identifying root causes, and contributing to the enhancement of response processes to improve future incident handling.
  • Stay Current with Emerging AI Platforms: You will proactively stay current with emerging AI platforms, including generative AI models and related technologies. This involves evaluating their security implications, assessing their business applicability, and planning for their secure integration into the existing infrastructure.
  • Partner with Cloud Infrastructure Teams on Security Controls: You will actively partner with cloud infrastructure teams to implement and maintain security controls across AWS accounts and services. This collaborative effort ensures consistent security configurations, adherence to best practices, and robust protection of cloud resources against evolving threats.
  • Build Security Telemetry Pipelines and Log Correlation: Prior experience in building security telemetry pipelines or log correlation frameworks is a highly desirable skill. This involves designing and implementing systems that efficiently collect, process, and analyze security logs from various sources to detect anomalies and identify potential threats.
  • Integrate Security Checks into Developer Workflows: Familiarity with CI/CD (Continuous Integration/Continuous Delivery) systems and experience in integrating security checks into developer workflows is beneficial. This includes implementing automated security testing (SAST/DAST), vulnerability scanning, and policy enforcement directly into the development pipeline, shifting security left.

Must-Haves: Your Core Security Engineering Arsenal

To excel as a Senior Cyber Security Engineer, you'll need extensive experience in security engineering, deep cloud expertise, strong programming skills, and a solid understanding of security tooling and practices.

  • Proven Delivery in Security Engineering or Infrastructure Security: You must have a proven track record of successful delivery in security engineering or infrastructure security roles, ideally within cloud-native environments. This demonstrates your practical ability to design, build, and implement robust security solutions in modern, scalable infrastructures.
  • Hands-on AWS Native Tooling Expertise: You bring extensive hands-on experience with AWS Native tooling, specifically including:
    • IAM (Identity and Access Management): For managing user identities and access controls.
    • KMS (Key Management Service): For managing cryptographic keys.
    • Config: For compliance auditing and configuration management.
    • Lambda: For serverless compute in automation.
    • EKS (Elastic Kubernetes Service): For managed Kubernetes services.
    • A strong working knowledge of Azure and GCP is also highly valued, indicating multi-cloud familiarity.
  • Strong Scripting and Dev Skills: You possess strong scripting and development skills in Python and/or Go. This coding proficiency is essential for building automation tools, security utilities, and integrating diverse systems. You also have proven proficiency with Git for version control, Linux for system administration, and a solid understanding of infrastructure automation patterns.
  • Expertise in Integrating/Building Security Tooling: You have expertise in integrating or building tooling for critical security platforms. This includes SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), vulnerability management, and CSPM (Cloud Security Posture Management) platforms. Your experience ensures these tools are effectively deployed and utilized.
  • Experience Deploying Security Controls via Infrastructure-as-Code (IaC): You have proven experience deploying security controls via Infrastructure-as-Code (IaC), specifically using Terraform or CloudFormation. This demonstrates your ability to define and manage security configurations declaratively and automate their deployment.
  • Comfort with Incident Analysis and Logging: You are comfortable investigating logs, tracing events, and contributing to incident analysis workflows. This indicates strong diagnostic skills and familiarity with security incident response processes.
  • Proven Cross-Functional Influence and Collaboration: You have a proven ability to influence and collaborate cross-functionally with engineering, infrastructure, and IT teams. Your communication and interpersonal skills enable seamless teamwork and drive shared security objectives.
  • Strong Written Communication and Documentation Skills: You possess strong written communication and documentation skills, with the ability to convey complex designs clearly and concisely. This is crucial for creating robust architectural diagrams, security policies, and operational procedures.
  • Experience with Container Orchestration Security: You bring a strong background with using and securing container orchestration platforms like Kubernetes, including expertise in workload security (e.g., Pod Security Standards) and service mesh controls (e.g., Istio, Linkerd) for secure microservices communication.

Nice to Have: Enhancing Your Security Engineering Profile

  • Startup Environment Experience: Experience working in fast-paced or startup environments with sometimes ambiguous ownership lines, demonstrating adaptability and resilience.
  • JavaScript or TypeScript Familiarity: Familiarity with JavaScript or TypeScript, particularly in the context of DevOps tooling or plugins.
  • Commercial Cloud Security Tools: Hands-on experience with commercial Cloud Security tools like CNAPP (Cloud-Native Application Protection Platform), CSPM (Cloud Security Posture Management), DSPM (Data Security Posture Management), and KSPM (Kubernetes Security Posture Management).
  • Compliance Frameworks Exposure: Exposure to compliance frameworks such as SOC 2 and ISO 27001, and an understanding of how engineering decisions affect auditability.

Compensation & Benefits: Rewarding Your Expertise

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $175,000—$200,000 USD. For positions based in San Francisco/New York, the base pay range is $191,300—$225,050 USD.


If this Senior Cyber Security Engineer role aligns with your passion for building scalable security capabilities, your expertise in cloud-native environments and automation, and your drive to bridge security principles with engineering execution, we encourage you to learn more about this exciting full-time, remote opportunity.

Are you ready to think like an attacker but build like a defender for a leading AI security firm?

Job Features

Job CategoryIT, Security

A security MSSP focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers, is on the hunt for a visionary Senior Cyber Securi...View more

Permanent, Remote
Remote
Posted 4 days ago

An AI security focused agency, operating in the Computer and Mathematical industry, is seeking a Security Analyst to join their team. This full-time position is 100% remote within the USA, offering exceptional flexibility. The ideal candidate is detail-oriented with a passion for cybersecurity and a positive attitude, comfortable working in a fast-paced virtual environment, and able to communicate clearly both verbally and in writing.


About You: Passion for Cybersecurity and Problem-Solving

You are a highly detail-oriented individual with a genuine passion for cybersecurity and a consistently positive attitude. You thrive in fast-paced and virtual work environments, demonstrating the ability to adapt quickly and manage tasks effectively. Furthermore, you possess excellent communication skills, enabling you to convey complex information clearly through both verbal and written methods, and you are an active listener, ensuring you fully understand requests and issues.

In this role, you will leverage your foundational skills, which typically include:

  • Less than 1 year of related experience.
  • A Bachelor's degree, or actively working towards a Bachelor's degree.
  • Proficiency with G Suite (Google) applications (e.g., Gmail, Google Docs, Google Sheets).
  • Familiarity with Zoom for virtual collaboration.

Role Responsibilities: Safeguarding Against Cyber Threats

As a Security Analyst, you'll be instrumental in supporting critical cybersecurity operations, focusing on protecting against email fraud and other sophisticated attack strategies. Your responsibilities will blend operational tasks with proactive improvement initiatives and investigative support.

  • Perform Operational Tasks: You will perform operational tasks essential to the security function, such as efficiently handling high-volume intake queues of security alerts or requests. You'll also be responsible for accurately labeling machine learning data, which is crucial for training and improving AI-powered security systems. All tasks must be completed in a timely manner to maintain operational efficiency.
  • Propose Improvements for Processes and Policies: You will actively propose improvements for existing processes, workflows, products, and policies related to cybersecurity. Your proactive mindset will help identify inefficiencies, potential vulnerabilities, or areas where current practices can be enhanced to strengthen the overall security posture and streamline operations.
  • Support Investigation Efforts: You will provide vital support for investigation efforts across a range of critical issues. This includes assisting senior analysts or incident response teams in gathering information, analyzing data, and documenting findings related to security incidents, ensuring thorough and timely resolution of threats.
  • Learn About Email Fraud Attack Strategies: You will continuously learn about various email fraud attack strategies and patterns (e.g., phishing, business email compromise, impersonation). This in-depth knowledge is crucial for proactively identifying potential threats and implementing preventative measures to effectively prevent an event from occurring, safeguarding the organization and its customers from financial and reputational damage.
  • Work on Specialized Security Areas: You will contribute to specific, critical areas of cybersecurity operations. This includes working on a subset of tasks related to the Live Queue (real-time incident handling), POV (Proof of Value) data sets (analyzing data from potential new security solutions), ATO (Account Takeover) cases (investigating compromised user accounts), and VAC (Voice/SMS Authentication Bypass) cases (addressing authentication bypass attempts).
  • Contribute to Team Growth and Scale: You will actively engage in task work to help the team grow, scale, and mature. This involves contributing to automation initiatives, developing new documentation, cross-training, and participating in efforts that enhance the team's overall capabilities and efficiency in a rapidly evolving cybersecurity landscape.

Compensation & Benefits: Rewarding Your Contributions

Certain roles are eligible for a bonus, restricted stock units (RSUs), and a comprehensive benefits package. Individual compensation packages are tailored based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $20.19—$20.19 USD (note: this appears to be a placeholder and actual compensation will vary). Benefits are recognized as an important piece of your total compensation package, reflecting a commitment to overall employee well-being.


Additional Information: Commitment to Security and Compliance

Our client is an equal opportunity employer, committed to diversity and inclusion. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or other legally protected characteristics.

This position involves access to technology subject to the U.S. Export Administration Regulations (EAR). Therefore, candidates offered employment must be eligible to access controlled technology under U.S. export control laws. Employment is conditioned on the availability of government authorization. The company reserves the right to delay commencement of employment, rescind an offer, or terminate employment to ensure compliance with applicable government access control restrictions.

As part of our client's secure hiring practices, they conduct video interviews and validate applicant identity at various stages through their recruitment process. If your application is successful and a conditional offer of employment is made, pre-employment checks will be carried out, which must be successfully completed to progress to a final offer. All processes and pre-employment checks align with prevailing legislation and our client's policies relevant to their security and privacy standards. Our client is committed to protecting your privacy; please review their Applicant Privacy Policy for full information on how your personal information is used. By submitting an application, you confirm that you have read and understand the Applicant Privacy Policy.

Job Features

Job CategoryIT, Security

An AI security focused agency, operating in the Computer and Mathematical industry, is seeking a Security Analyst to join their team. This full-time position is 100% remote within the USA, offering ex...View more

Our client is seeking a highly skilled Senior Project Manager to join their team. This long-term contract position is 100% remote, based out of Raleigh, North Carolina, offering exceptional flexibility for the right candidate.


What's the Job? Driving Project Success in a Remote Environment

As a Senior Project Manager, you'll be instrumental in leading complex initiatives from inception to successful completion. Your responsibilities will revolve around meticulous planning, vigilant oversight, and proactive problem-solving to ensure projects meet their objectives, even within a fully remote setting.

  • Maintain Project Workstream Timeframes and Budgeting Estimates: You will meticulously maintain project workstream timeframes, ensuring that all project phases and tasks adhere to established schedules. You'll also rigorously manage budgeting estimates, tracking financial expenditures against plans to ensure projects remain within their allocated financial parameters. Your diligence in these areas is crucial for project efficiency and financial accountability.
  • Develop Roadmaps/Schedules and Track Progress: You will be responsible for developing comprehensive roadmaps and detailed schedules for various projects. This involves outlining key milestones, dependencies, and resource allocations. You will then vigilantly track progress against these plans, proactively identifying any deviations and implementing corrective actions to keep projects on course.
  • Utilize Project Management Tools for Performance and Adherence: You will expertly utilize a range of industry-standard project management tools to track project performance and ensure schedule adherence. This includes proficiency with platforms such as MS Project, Jira, M&A Accelerator, Clarity, and Planview. Your command of these tools will provide real-time visibility into project health and enable data-driven decision-making.
  • Schedule and Facilitate Discussions, Track Minutes: You will expertly schedule and facilitate crucial discussions with stakeholders, project teams, and external partners. Your facilitation skills will ensure productive meetings, leading to clear decisions and actionable outcomes. You will meticulously track minutes in a standard, predefined format, capturing key agreements, decisions, and action items for clear accountability and future reference.
  • Generate Weekly Program Management Reports: You will be responsible for preparing and delivering weekly report-outs to program management. These reports will provide concise and accurate updates on project status, progress, upcoming activities, and any identified risks or issues, ensuring consistent communication and transparency at the program level.
  • Conduct Risk Assessments for Projects: You will systematically conduct thorough risk assessments for projects. This involves identifying potential threats, evaluating their likelihood and impact, and developing proactive mitigation strategies. Your foresight in risk management is crucial for minimizing negative impacts and ensuring project resilience.
  • Establish and Maintain Project's RAID Log: You will be responsible for the establishment and ongoing maintenance of a project's RAID log (Risks, Assumptions, Issues, Dependencies). This critical document will capture all relevant project dynamics, enabling proactive management of potential blockers, clear communication of assumptions, and efficient resolution of issues.
  • Identify and Organize Working Sessions: You will proactively identify and organize necessary working sessions to meet project goals and drive progress. This involves recognizing when cross-functional collaboration, technical deep-dives, or strategic planning meetings are required, and efficiently coordinating these sessions to ensure impactful outcomes.
  • Identify Project Goals, Needs, and Scope: You will play a crucial role in the initial project phases by clearly identifying project goals, defining specific needs, and meticulously outlining the project scope. This foundational work ensures that all stakeholders are aligned from the outset, preventing scope creep and setting clear boundaries for project execution.
  • Plan, Monitor/Control, and Document Tasks: You will engage in the core project management functions of planning, monitoring/controlling, and meticulously documenting tasks throughout the project lifecycle. This includes creating detailed task breakdowns, assigning responsibilities, tracking progress, managing changes, and ensuring all activities are recorded for auditability and future reference.
  • Ensure Timely Delivery of Tasks, Deliverables, and Materials: You are accountable for ensuring all tasks, deliverables, and project materials are delivered promptly. You will also take proactive steps in reporting any delays in a timely fashion to relevant stakeholders, allowing for swift adjustments and transparent communication regarding project status.
  • Manage Resources for Project Execution: You will efficiently manage all resources necessary for project execution in conjunction with program management and delivery leadership. This involves optimizing resource allocation, addressing any resource constraints, and ensuring that teams have the necessary tools and support to achieve project objectives.
  • Foster Effective Communication with Stakeholders: You will cultivate and foster effective communication and meetings with stakeholders concerning project status. This ensures that all key parties are regularly informed about progress, challenges, and next steps, building trust and maintaining alignment throughout the project's duration.
  • Foresee and Strategically Eliminate Blockers and Potential Risks: You possess a proactive mindset, enabling you to foresee and strategically eliminate blockers and potential risks before they impact project timelines or objectives. Your ability to anticipate challenges and implement preventive measures is crucial for smooth project execution.
  • Work Effectively with Program Manager and Leads: You will work effectively with the Program Manager and various leads (e.g., technical leads, functional leads) to ensure the successful delivery of project goals and objectives. This collaborative approach ensures seamless integration of efforts across different project workstreams.
  • Document Each Step of the Process: You will rigorously document each step of the process using various project management tools. This meticulous approach ensures complete traceability, auditability, and provides a clear record of all project activities, decisions, and outcomes.
  • Ensure Top-Quality Results and Project Success: Your ultimate responsibility is to ensure top-quality results and overall project success. This commitment to excellence drives high standards in deliverables, processes, and stakeholder satisfaction, delivering tangible value to the business.

What's Needed? Your Qualifications for Senior Project Management

To excel as a Senior Project Manager in this remote role, you'll need extensive experience in project management, a strong understanding of project tools, and exceptional communication and leadership skills.

  • Extensive Project Management Experience: You possess extensive experience in project management, demonstrating a proven track record of successfully leading complex projects from initiation to closure. This includes managing schedules, resources, and budgets for diverse IT initiatives.
  • Proficiency in Project Management Tools: You are highly proficient in using various project management tools such as MS Project, Jira, M&A Accelerator, Clarity, and Planview. Your expertise ensures effective tracking of project performance, schedule adherence, and robust reporting.
  • Strong Communication Skills: You have strong written and verbal communication skills, essential for developing roadmaps, documenting schedules, facilitating discussions, tracking minutes, and providing clear report-outs to program management and stakeholders.
  • Risk Assessment and Management Expertise: You possess proven expertise in conducting risk assessments for projects and establishing/maintaining a project's RAID log. This includes foreseeing and strategically eliminating blockers and potential risks.
  • Independent Work and Proactive Problem-Solving: You demonstrate the ability to work independently while also being proactive in identifying project goals, needs, and scope. Your self-starting approach enables you to quickly identify and resolve potential issues without constant oversight.
  • Experience in Cross-Functional Coordination: You are adept at identifying and organizing working sessions necessary to meet project goals and drive progress, demonstrating strong cross-functional coordination skills in a remote environment.
  • Resource Management Expertise: You have experience managing all resources necessary for project execution in conjunction with program management and delivery leadership, ensuring optimal team allocation and efficient project delivery.
  • Stakeholder Communication and Expectation Management: You are skilled at fostering effective communication and meetings with stakeholders concerning project status, ensuring transparency and managing expectations effectively in a remote setting.

Job Features

Job CategoryEngineering, IT

Our client is seeking a highly skilled Senior Project Manager to join their team. This long-term contract position is 100% remote, based out of Raleigh, North Carolina, offering exceptional flexibilit...View more

Contract, Hybrid, Remote
Charlotte, NC, Raleigh, NC
Posted 4 days ago

Our client, operating in the Finance & Insurance sector, is seeking a highly skilled Program Manager to oversee critical command center operations and technology systems. This 12-month contract position, based hybrid in Charlotte, North Carolina, offers a unique opportunity to ensure seamless integration and functionality within a complex environment. The ideal candidate will have robust experience in the financial industry, proven leadership skills, and an extremely organized and detailed-oriented approach.


What You'll Be Doing: Orchestrating Command Center Excellence

As a Program Manager, you'll be instrumental in leading the development, implementation, and coordination of advanced command center operations and technology systems. Your responsibilities will blend strategic planning, meticulous project management, and effective cross-functional collaboration.

  • Develop and Execute a Strategic Roadmap: You'll create and execute a comprehensive strategic roadmap specifically designed for integrating systems, processes, and technology within the command center. This involves outlining long-term goals, identifying key initiatives, and planning the sequence of activities to achieve optimal performance and seamless functionality.
  • Set Program Goals and Manage Schedules: You'll define clear program goals, develop detailed program plans and schedules to ensure those goals are met, and provide timely reports on any delays. This proactive approach ensures projects stay on track and stakeholders are always informed of progress and potential challenges.
  • Prioritize Tasks and Allocate Resources: You'll effectively prioritize project tasks based on strategic importance and operational needs. You'll also skillfully allocate project team members and manage all necessary resources for project execution in conjunction with program management and delivery leadership, ensuring optimal resource utilization and efficient delivery.
  • Manage Program Budget and Timelines: You'll meticulously manage the program budget and timelines, ensuring financial adherence and timely delivery. You'll also oversee the consolidation of workstream status reports, providing a unified view of overall program progress.
  • Coordinate Project Teams and Responsibilities: You'll be responsible for coordinating project team members across various workstreams, fostering collaboration and clear communication. You'll also develop detailed schedules and individual responsibilities, ensuring everyone understands their role in achieving project objectives.
  • Track Project Performance with Management Tools: You'll leverage various project management tools such (as MS Project, Jira, M&A Accelerator, Clarity, and Planview) to meticulously track project performance and schedule adherence. This ensures real-time visibility into project health and enables proactive adjustments to keep initiatives on track.
  • Facilitate Discussions and Track Minutes: You'll expertly schedule and facilitate discussions, ensuring productive meetings with internal teams, external vendors, and stakeholders. You'll also diligently track minutes in a standard, predefined format, capturing key decisions, action items, and next steps for clear accountability.
  • Conduct Risk Assessments and Manage RAID Logs: You'll perform thorough risk assessments for projects, identifying potential threats and vulnerabilities. You'll also establish and maintain a project's RAID log (Risks, Assumptions, Issues, Dependencies), proactively foreseeing and strategically eliminating blockers and potential risks to ensure project success.
  • Foster Effective Communication with Leadership and Stakeholders: You'll cultivate and foster effective communication and meetings with executive sponsors and stakeholders concerning project status. This ensures transparency, manages expectations, and secures buy-in for critical decisions related to program progress and budget spend, including weekly and monthly report-outs.
  • Collaborate for Goal Delivery: You'll work effectively with workstream leads and program management to ensure the successful delivery of project goals and objectives. This collaborative approach ensures that all contributing parties are aligned and working cohesively towards common strategic aims.
  • Act as Primary Point of Contact: You'll serve as the primary point of contact between technical teams, key stakeholders, and external vendors. Your role as a central communication hub ensures seamless information flow and coordination across all project facets.
  • Ensure SDLC Adherence and Operational Readiness: You'll be instrumental in ensuring strict SDLC (Software Development Life Cycle) adherence throughout the project lifecycle. You'll also confirm that testing validation occurs to verify operational readiness, guaranteeing that all deployed systems are stable, secure, and ready for production use.
  • Ensure Compliance with Regulations and Best Practices: You'll verify and confirm compliance with relevant regulations, standards, and best practices pertinent to command center operations and technology systems. This vigilance ensures legal adherence, operational integrity, and alignment with industry benchmarks in the financial sector.
  • Facilitate Cross-Functional Collaboration: You'll actively facilitate cross-functional collaboration across various departments to meet integration goals. This involves breaking down silos, fostering teamwork, and ensuring that all contributing teams work cohesively towards shared objectives.
  • Ensure Top-Quality Results: You'll consistently ensure top-quality results and success for every project. This commitment to excellence drives high standards in deliverables, processes, and overall project outcomes.
  • Manage Systems Integration and Business Process Improvement Projects: You bring direct experience managing systems integration projects, ensuring seamless data flow and interoperability between disparate technology systems. You also have direct experience managing business process improvement projects, focusing on analyzing and formulating "As-Is" and "To-Be" processes to optimize operational efficiency.
  • Partner with Vendors and Team Members: You have significant experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative approach ensures effective external and internal coordination for project success.

What's Needed: Your Profile for Program Leadership

To excel as a Program Manager, you'll need a unique blend of extensive experience in the financial industry, strong project management skills, and a deep understanding of command center operations and technology.

  • Extensive Financial Industry Experience: You have 8+ years of experience in the financial industry and/or equivalent business and enterprise systems experience. This deep domain knowledge provides critical context for managing complex projects within a regulated financial environment.
  • Direct Experience Managing Systems Integration Projects (Preferred): Direct experience managing systems integration projects is preferred. This highlights your ability to oversee projects that connect diverse technology systems, ensuring seamless data flow and interoperability.
  • Direct Experience Managing Business Process Improvement Projects (Preferred): Direct experience managing business process improvement projects is preferred. This demonstrates your ability to analyze existing workflows, identify inefficiencies, and design optimized "to-be" processes.
  • Extremely Organized and Detailed-Oriented: You are extremely organized and detailed-oriented. This meticulous approach is crucial for managing complex project plans, tracking numerous tasks, and ensuring accuracy in documentation and reporting.
  • Self-Motivated: You are self-motivated, demonstrating initiative and a proactive approach to identifying challenges, developing solutions, and driving projects to completion independently.
  • Proven Leadership Skills: You possess proven leadership skills, capable of guiding project teams, influencing stakeholders, and driving consensus towards shared goals.
  • Strong Written and Verbal Communications: You have strong written and verbal communication skills. This is crucial for articulating complex project details, reports, and strategic plans to diverse audiences, including executive sponsors and technical teams.
  • Strong Interpersonal Skills: You possess strong interpersonal skills, enabling you to build rapport, foster collaboration, and manage conflicts effectively within and across teams.
  • Business, Financial, and Technical Acumen: You bring a robust blend of business, financial, and technical acumen. This allows you to understand the strategic, budgetary, and technical aspects of projects, ensuring holistic problem-solving and decision-making.
  • Assertive and Action-Oriented: You are assertive and action-oriented, taking decisive steps to move projects forward, overcome obstacles, and ensure timely delivery of results.
  • Manages Conflict: You are skilled at managing conflict constructively, mediating disagreements, and finding resolutions that maintain positive working relationships and keep projects on track.
  • Collaborative: You are inherently collaborative, valuing teamwork and actively seeking input from others to achieve project objectives.
  • Experience Partnering with Vendors and Team Members: You have extensive experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative leadership ensures effective coordination with external partners and internal teams.

If this Program Manager role in Charlotte, NC, aligns with your experience in leading complex integration projects, your expertise in command center operations, and your strong project management acumen within the financial industry, we encourage you to learn more about this exciting hybrid contract opportunity. This is a fantastic chance to make a significant impact on critical technology systems.


Job Features

Job CategoryIT

Our client, operating in the Finance & Insurance sector, is seeking a highly skilled Program Manager to oversee critical command center operations and technology systems. This 12-month contract po...View more


Our client, a prominent organization in the Information Technology sector, is seeking a highly experienced and motivated Senior Infrastructure Administrator. This permanent position, based hybrid in Phoenix, Arizona, requires 3 days a week in the office. You’ll play a critical role in managing and maintaining the organization's complex IT infrastructure. You'll be responsible for the design, implementation, optimization, and security of server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure the high availability, performance, and security of the IT environment, while also mentoring junior staff and contributing to the overall success of IT operations.

At AAA, their team members strive to deliver amazing service and help their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work. They're working to transform AAA for the next century with a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.


Why Work For This Organization?

  • Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
  • 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
  • Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and more.
  • Paid Holidays: Enjoy paid holidays, promoting work-life balance.
  • Paid Time Off: Team Members accrue paid time off monthly, and depending on position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
  • Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
  • AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
  • Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Summary: Leading IT Infrastructure Management

We are seeking a highly experienced and motivated Senior Infrastructure Administrator to play a critical role in managing and maintaining our organization's complex IT infrastructure. In this role, you will be responsible for the design, implementation, optimization, and security of our server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure high availability, performance, and security of our IT environment, while also mentoring junior staff and contributing to the overall success of our IT operations.

Responsibilities / Job Duties: Driving Infrastructure Excellence

As a Senior Infrastructure Administrator, you'll oversee and contribute to all facets of the IT infrastructure, ensuring its stability, performance, and security across diverse platforms. Your duties will blend hands-on technical work with strategic planning and mentorship.

  • Infrastructure Management: You will comprehensively manage and maintain all aspects of our IT infrastructure, which includes physical and virtual servers, network devices, storage systems, and various cloud platforms. Your primary goal is to proactively identify and resolve potential issues to ensure the unwavering stability, optimal performance, and robust security of the entire infrastructure. You'll also be instrumental in implementing and maintaining sophisticated infrastructure monitoring and alerting systems to guarantee proactive identification of any issues before they impact operations.
  • Server Administration: You will demonstrate expert-level administration of Windows Server and/or Linux environments. This includes meticulous installation, configuration, security hardening, performance tuning, and advanced troubleshooting. You will also manage and maintain critical core infrastructure services such as Active Directory, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol), ensuring seamless user authentication, resource resolution, and network address management.
  • Network Management: You will expertly manage and maintain the network infrastructure, encompassing routers, switches, firewalls, and VPNs (Virtual Private Networks). Your responsibilities include continuously monitoring network performance to identify bottlenecks, swiftly troubleshooting network connectivity issues to restore service, and implementing robust network security measures to protect against unauthorized access and cyber threats.
  • Storage Administration: You will diligently manage and maintain storage systems, including both SAN (Storage Area Network) and NAS (Network Attached Storage) devices. Your critical tasks involve ensuring data integrity through various validation methods, guaranteeing data availability through redundancy and replication, and ensuring security through robust backups, replication strategies, and disaster recovery planning to protect against data loss and ensure business continuity.
  • Cloud Infrastructure: You bring extensive experience with leading cloud platforms such as Google Cloud, Azure, and AWS (Amazon Web Services). This includes deep knowledge of cloud architecture, managing virtualization in cloud environments, implementing and maintaining hybrid environments (connecting on-premises to cloud), and ensuring comprehensive cloud security. You will manage and maintain various cloud resources, including virtual machines, storage accounts, and networking components within these cloud ecosystems.
  • Infrastructure Projects: You will take a leading role in leading and managing complex infrastructure projects. These projects include vital initiatives such as large-scale system migrations (e.g., to cloud, new hardware), significant upgrades (e.g., OS, hardware, software versions), and large-scale deployments of new systems or services. You will meticulously develop project plans, timelines, and budgets, ensuring all projects are completed on time and within financial parameters.
  • Automation and Scripting: You will actively develop and maintain scripts using languages such as PowerShell, Bash, or Python. These scripts are designed to automate administrative tasks, streamline the deployment of infrastructure components, and develop custom solutions that address specific operational needs. Your efforts in automation will significantly improve operational efficiency and reduce manual effort across the IT environment.
  • Mentorship: You will provide invaluable guidance and mentorship to junior infrastructure administrators, sharing your extensive knowledge and expertise. Your contributions to their professional development will strengthen the overall capabilities of the IT team, fostering a culture of continuous learning and growth.

Knowledge / Skills / Abilities: Your Core Competencies

  • Server Administration: You possess expert-level proficiency with Windows Server and/or Linux administration, including in-depth knowledge of configuration, security hardening, performance tuning, and advanced troubleshooting for enterprise environments. You have a proven track record of managing complex server ecosystems.
  • Network Management: You have a strong understanding of networking concepts (e.g., TCP/IP, VLANs, routing protocols, firewalls, VPNs) and extensive experience with managing network devices and infrastructure, ensuring robust and secure connectivity.
  • Storage Administration: You bring extensive experience with storage technologies (e.g., SAN, NAS, object storage) and advanced storage administration tasks, including data replication, backup/recovery, and disaster recovery planning.
  • Cloud Platforms: You possess a deep understanding of cloud platforms (e.g., Google Cloud, Azure, AWS), including cloud architecture, virtualization strategies for hybrid environments, and comprehensive cloud security best practices.
  • Scripting: You have strong scripting skills in PowerShell, Bash, or Python for automating administrative tasks and developing custom solutions, driving efficiency and consistency.
  • System Monitoring: You have hands-on experience with infrastructure monitoring tools (e.g., Nagios, Zabbix, SolarWinds, cloud-native monitoring) and the ability to interpret monitoring data to proactively identify and troubleshoot complex issues.
  • Troubleshooting: You possess expert analytical and problem-solving skills that enable you to quickly diagnose and resolve complex infrastructure issues, often under pressure, minimizing downtime and impact.
  • Security: You have a strong understanding of infrastructure security principles and best practices, including vulnerability management, access control, and threat mitigation strategies.
  • Communication: You demonstrate excellent communication skills, both written and verbal, allowing you to effectively interact with diverse technical teams, non-technical audiences, and leadership.
  • Leadership: You have a proven ability to lead and mentor junior staff, fostering their growth and contributing to a high-performing team.
  • Project Management Track Record: You have a proven track record of managing complex infrastructure projects from initiation to successful completion.
  • High-Availability and Disaster Recovery: You possess expertise in managing Windows Server and/or Linux environments, with extensive experience in high-availability solutions, meticulous disaster recovery planning, and advanced performance tuning techniques to ensure continuous operation and optimal system responsiveness.

Education, Competencies, Certifications/Licenses: Your Foundational Expertise

  • Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related field is required, coupled with 8 years of experience in IT infrastructure administration. This experience must encompass server and network management, storage solutions, system optimization, and infrastructure security. Alternatively, a High School Diploma and 12 years of equivalent experience in these domains will be considered.
  • Preferred Certifications: Industry certifications are highly preferred, validating your expertise. This includes credentials such as Microsoft MCSE (Microsoft Certified Solutions Expert), various Linux certifications (e.g., Red Hat Certified Engineer - RHCE), and AWS Certified Solutions Architect.

Work Environment:

This position operates in a professional office environment with standard office equipment, including computers, telephones, photocopiers, and filing cabinets.


Job Features

Job CategoryIT

Our client, a prominent organization in the Information Technology sector, is seeking a highly experienced and motivated Senior Infrastructure Administrator. This permanent position, based hybrid in P...View more

Hybrid, Permanent
La Mirada, CA
Posted 1 week ago

Join the team that connects California to the world! Our client is dedicated to advancing education and research statewide by providing a world-class computing network essential for innovation, collaboration, and economic growth. Their organization operates the California Research and Education Network (CalREN), a high-capacity computer network spanning over 8,000 miles of optical fiber. CalREN serves over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.

Our client is seeking a highly experienced and proactive Senior Cybersecurity Analyst. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $115.5K/yr - $144.3K/yr. Reporting to the Manager, Information Security Office, you'll actively serve as a crucial cybersecurity resource on multiple complex projects. You'll initiate and drive security activities to ensure our client's networks, systems, and data are protected and readily available to support the organization's mission to serve the California educational community. Working as part of the core security team, you'll collaborate with members of our client's Security Advisory Committee, peer staff throughout the organization, and external solution partners to establish and enhance security tools, resources, and processes. Your responsibilities will cover data protection, incident response, vulnerability management, email gateway security, identity and access management security architecture, network security monitoring, malware defense, and security awareness training. This position also functions as a vital point of cybersecurity expertise for internal staff and may involve representing our client in technical forums, panel discussions, and conference presentations.


What You Will Do: Driving Comprehensive Cybersecurity for a Critical Network

As a Senior Cybersecurity Analyst, you'll be at the forefront of protecting California's vital Research and Education Network. Your role demands broad cybersecurity expertise, from threat analysis and incident response to vulnerability management and strategic security enhancements.

  • Lead Security Activities and Solutions: You'll actively work under limited supervision with members of the Information Security Office (ISO) and extended teams on security solutions and implementations. This involves initiating and driving security activities to ensure our client's networks, systems, and data are robustly protected and continuously available to support the organization's mission to serve the California educational community.
  • Serve as a Core ISO Team Member: You'll function as a core member of our client's Information Security Office (ISO), performing diverse security duties. This includes maintaining threat awareness, conducting proactive network traffic analysis to detect anomalies, leading incident response efforts, performing detailed forensic analysis to understand security breaches, and driving the resolution of security incidents. Your vigilance ensures network integrity.
  • Collaborate on Security Operations Center (SOC) Development: You will collaborate extensively with our client's Security Advisory Committee, segment leaders, and other security experts around the state to develop strategic plans for establishing and enhancing a Security Operations Center (SOC), ensuring a centralized and proactive approach to network defense.
  • Integrate Security into Network Environment: You'll integrate deep knowledge of network protocols, services, threats, vulnerabilities, mitigation strategies, and hardware capabilities. This comprehensive understanding will allow you to build a security environment that effectively reduces and mitigates risk while simultaneously allowing our client’s open science mission to succeed without unnecessary hindrance.
  • Evaluate Data for Incident Detection: You'll meticulously evaluate a wide range of security data from various sources, including Zeek (Bro) logs, email security logs, netflow data, centralized syslog, authentication logs, and others, to effectively detect security incidents. Upon detection of suspicious activity, you'll take timely action, which may include blocking problem traffic, sending immediate alerts, and/or initiating in-depth investigations.
  • Maintain ISO Documentation and Lead New Projects: You will meticulously maintain ISO documentation and perform updates as needed, ensuring all security processes, configurations, and incident responses are accurately recorded. You'll also work with internal and external stakeholders to lead and complete new ISO projects and initiatives, driving continuous improvement in our client's security posture.
  • Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with our client's network security monitoring and SIEM services. This proactive measure ensures that our client's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
  • Design and Implement Secure Email Gateway Services: You'll work closely with ISO staff and peer teams to design and implement secure email gateway services. This involves configuring email security solutions to filter malware, phishing attempts, spam, and other email-borne threats, protecting users and systems from a primary attack vector.
  • Design and Implement Secure Identity and Access Management Services: You'll collaborate with ISO staff and peer teams to design and implement secure identity and access management (IAM) services. This ensures robust user authentication, authorization, and privileged access management, controlling who can access what resources and safeguarding sensitive data.
  • Perform Threat Hunting for Anomalous Activity: You will regularly perform threat hunting to proactively search for anomalous activity within our client's network and systems. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
  • Monitor and Respond to Security Alerts: You'll be responsible for monitoring and responding to security alerts generated by various tools. This involves triaging alerts, assessing their severity, and initiating appropriate response actions to mitigate potential threats quickly.
  • Maintain Vulnerability Management Asset Inventory: You'll meticulously maintain the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
  • Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report, summarizing key findings from regular vulnerability scans for internal and external stakeholders.
  • Create Monthly Enterprise Vulnerability Risk Status Report: You'll prepare a comprehensive monthly enterprise vulnerability risk status report, providing a broader overview of the organization's vulnerability posture, trends, and mitigation efforts to executive leadership.
  • Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis, ensuring your cybersecurity skills remain current with the latest industry trends and threat landscapes.
  • Lead Incident Response Efforts: You'll take a leading role in incident response efforts, coordinating with internal and external security personnel and system administrators to contain, eradicate, and recover from security incidents.
  • Respond to Complaints and Notifications: You'll respond appropriately to internal and/or external complaints and notifications related to security issues (e.g., scanning, hacking, spamming), ensuring proper investigation and resolution.
  • Promote a Strong Security Culture: You will actively promote a strong security culture throughout our client’s internal network, consulting with our client's management and staff to foster security awareness and best practices.
  • On-Call Availability: You must have the ability to be ‘on call’ outside of regular business hours on a regular and recurring basis, ensuring 24/7/365 readiness for critical incident response.

Key Success Factors: Cultivating Operational Excellence and Innovation

Your success in this role will be defined by a powerful combination of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for our client and its mission.

  • Prioritization and Timely Completion: You possess the ability to prioritize and complete tasks assigned in a timely manner, even in a fast-paced environment with rapidly changing priorities.
  • Strong Interpersonal and Teamwork Skills: You bring strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships. You are also capable of leading teams to reach consensus on complex security issues.
  • Working Knowledge of IP-Based Networking: You have a working knowledge of IP-based networking, understanding fundamental concepts, protocols, and architectures essential for network security.
  • Scripting and Data Manipulation Proficiency: You have a working knowledge of scripting using regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
  • Background in Statistics and Analytics: You have a background in basic statistics and analytics, and experience with modern analytic and visualization packages (e.g., Tableau, Power BI), enabling data-driven security insights and reporting.
  • Adept at Understanding and Learning Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
  • Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
  • Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of work, ensuring precision in security implementations and analyses.
  • Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
  • Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with our client.
  • Experience Streamlining Operations: You have experience streamlining operational capabilities through standardization and automation, enhancing security operations and reducing manual effort.
  • Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for our client's security services, influencing future architectural decisions and technology roadmaps.
  • Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize our client's security profile while remaining sensitive to its mission.
  • Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
  • Knowledge of Encryption Techniques: You have knowledge of public-key and private-key encryption techniques, including DES, RSA, and PGP/GPG.
  • Strong Understanding of Complex TCP/IP Networks: You possess a strong understanding of complex TCP/IP networks.
  • Knowledge of Layer 2, Wireless, Switching, and Routing Protocols: You have knowledge of Layer 2 protocols, Wireless networking, Switching, and Routing Protocols.
  • Familiarity with Virtualized Environments: You have familiarity with securing virtualized environments.
  • Familiarity with Research and Education Networks: You have familiarity and experience working on research and education networks, and within Research and Education networking communities in the US or abroad.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
  • Information Security Experience (7+ years): You must have a minimum of 7 years of experience in information security, cybersecurity, or network security engineering design, deployment, and implementation of security solutions. This includes continuous monitoring and making improvements to those solutions, working with the information security and security operations teams.
  • Mid-Level Cybersecurity Certification: Certifications and/or equivalent training in a technical security specialty (e.g., GIAC, CISSP) are required, validating your expertise.
  • SIEM Experience (4+ years): A minimum of 4 years of experience running and supporting Security Information and Event Management (SIEM) services is required.
  • Vulnerability Management Experience (4+ years): A minimum of 4 years of experience running and supporting vulnerability management services is required.

Preferred Education And/Or Experience: Enhancing Your Profile

  • Advanced Security Education: A Bachelor's degree in cybersecurity, information assurance, or a related field is preferred.
  • SOAR Experience: Experience configuring and supporting security orchestration and automated response (SOAR) services is a plus.
  • Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred.
  • Unix/Linux Administration: A minimum of 4 years of experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.

Why Work at Our Client? Making a Meaningful Impact

Working at our client offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: Our client provides generous medical, dental, vision, and life insurance benefits, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: Our client demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours a day, 7 days a week, 365 days a year availability for incident response needs. An employee’s work shift is based on our client’s business needs.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. Our client is unable to sponsor or take over sponsorship of an employment Visa at this time.

Job Features

Job CategoryIT, Security

Join the team that connects California to the world! Our client is dedicated to advancing education and research statewide by providing a world-class computing network essential for innovation, collab...View more


Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving more than 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.

CENIC is seeking an Associate Director of Network Operations to oversee the strategic direction, performance, and modernization of its vital Network Operations function. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $170K/yr - $200K/yr. While the shift leads manage the day-to-day operations on their respective shifts, the Associate Director provides the strategic leadership, structure, and oversight necessary to enhance service reliability, performance, and accountability across CENIC's network operations. This role is ideal for a seasoned leader with a track record of transforming teams, combining technical fluency, operational discipline, and people-first leadership to build high-performing, responsive, and metrics-driven teams within a culture of continuous improvement.


What You'll Be Doing: Leading Network Operations and Driving Modernization

As the Associate Director of Network Operations, you'll be instrumental in shaping the future of CENIC's world-class network. Your role is a blend of strategic leadership, operational oversight, and continuous improvement, all focused on enhancing service reliability and performance for millions of users.

  • Leadership & Organizational Development: You will lead OKR (Objectives and Key Results) activities, offering strategic guidance and enforcing rigor in their implementation across the Network Operations team. You'll actively promote a culture of professionalism, accountability, and collaboration, fostering an environment where team members thrive. Furthermore, you'll provide robust support for staff development through personalized coaching, targeted training initiatives, and effective performance management practices, all designed to foster continuous learning, skill development, and career growth within the team. You'll also engage directly with the HR team and senior leadership to address legacy challenges and strengthen overall team dynamics, ensuring a cohesive and high-performing unit.
  • Operational Oversight & Strategy: You will oversee all aspects of network operations, including the 24/7/365 Network Operations Center (NOC). Your leadership will ensure strict alignment with organizational goals and service expectations, guaranteeing that the network delivers on its mission-critical role. You'll meticulously define, implement, and monitor key performance indicators (KPIs), establish robust service level agreements (SLAs), and conduct thorough post-incident reviews (PIRs) to drive accountability and continuous improvement. You'll also spearhead initiatives to improve incident response, problem management, and root cause analysis, identifying areas for greater operational alignment with best practices, such as ITIL and ITSM (IT Service Management) frameworks, and implementing processes to enhance this alignment.
  • Tools & Automation: You'll develop a working familiarity with the current toolset used in network operations. Your strategic insight will then guide efforts to assess requirements for enhancing, supplementing, and/or replacing tools in support of more effective monitoring, alerting, and escalation processes. You'll collaborate closely with the engineering team to enhance observability and telemetry across the entire network infrastructure, ensuring comprehensive data collection for proactive management. Furthermore, you'll champion process efficiency, including advocating for and implementing appropriate automation solutions to improve operational outcomes, reduce manual effort, and increase system reliability.
  • Cross-Functional Engagement: You will actively review and refine processes to ensure close coordination with other internal functional groups. This includes collaborating seamlessly with teams responsible for network design, cybersecurity, project management, asset management, finance, and member relations, ensuring integrated workflows and shared objectives. You will serve as the primary escalation point of contact and leadership liaison during a major network incident, providing critical guidance and communication during high-impact events. You'll also collaborate with the rest of the management team on broader process improvements to ensure timely communication and strong accountability both within and across various teams.

Key Success Factors: Cultivating Operational Excellence and Innovation

Your success in this role will hinge on a powerful combination of leadership, technical depth, and a commitment to continuous improvement, all within the context of a vital educational and research network.

  • Strong Organizational and Leadership Skills: You possess strong organizational and leadership skills, with a proven ability to effectively manage multiple competing priorities in a fast-paced, dynamic environment. Your leadership will inspire confidence and drive results.
  • Deep Technical Expertise in Network Operations: You bring deep technical expertise in network operations, encompassing WAN (Wide Area Network), MAN (Metropolitan Area Network), and optical transport environments. This includes a comprehensive understanding of their design, implementation, and troubleshooting.
  • Proven Track Record in Managing Operational Teams: You have a proven track record of effectively managing operational teams and fostering a collaborative culture. Your experience demonstrates your ability to build, motivate, and guide high-performing teams to achieve ambitious goals.
  • Exceptional Problem-Solving Skills: You possess exceptional problem-solving skills, with a distinct focus on proactive issue resolution. You're adept at diagnosing complex network problems, identifying root causes, and implementing effective, long-term solutions.
  • Excellent Communication Skills: You have excellent communication skills, enabling you to articulate complex technical concepts clearly to diverse stakeholders at all levels, from engineers to executive leadership and external partners.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related technical field (or equivalent experience) is required. This academic foundation provides the essential theoretical knowledge for advanced network operations and management.
  • Extensive Network Experience with Management Focus: You must possess a minimum of 10 years of experience in network engineering or operations, with at least 5 years in a management role. This extensive background demonstrates a seasoned professional capable of both deep technical understanding and effective team leadership within complex network environments.
  • Expertise in Managing Live Production Networks: You have expertise in managing live production networks in dynamic environments, including advanced troubleshooting skills. This highlights your ability to ensure continuous availability and performance of critical network infrastructure under real-world operating conditions.
  • Experience with Key Tools and Methodologies: You bring practical experience with monitoring tools (for network health and performance), automation frameworks (for streamlining operations), and change management processes (for controlled deployments and updates).
  • Network Security Principles: You have proven experience in applying network security principles and practices, ensuring that network operations are conducted with a strong focus on data protection and threat mitigation.
  • Standards-Based Frameworks: You have experience implementing a standards-based framework, such as ITIL (Information Technology Infrastructure Library), to promote best practices in IT service management and operational efficiency.

Preferred Education And/Or Experience: Enhancing Your Leadership Profile

  • Large Commercial Service Provider Networks: Experience working with large commercial service provider networks is a plus, providing valuable context on high-scale, carrier-grade operations.
  • High-Performance Research Networks: Experience working with high-performance research networks is desirable, indicating familiarity with cutting-edge networking demands and innovative applications.
  • Deep Networking Protocol Knowledge: Familiarity with operating and troubleshooting networks at Layers 1-3 (Physical, Data Link, Network layers), as well as with advanced networking protocols, is preferred, demonstrating a comprehensive understanding of network fundamentals.
  • Master's Degree: A Master's degree in a related technical or management field is a plus, indicating advanced academic specialization and leadership potential.

Why Work at CENIC? Making a Meaningful Impact

Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The regular workweek is Monday through Friday, 8:00 a.m. to 5:00 p.m. The Network Operations Center is a 24-hour per day/7 days per week/365 days per year operation, meaning evening and weekend work may be required based on CENIC’s business demands.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.

Job Features

Job CategoryIT, Security

Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). ...View more


Our client, a prominent organization in the Information Technology sector, is looking for a skilled IAM Cybersecurity Engineer. This permanent position is based hybrid in Walnut Creek, California, requiring 3 days in the office per week. This role is crucial for leading projects to design, implement, and enhance cybersecurity controls, thereby protecting a large and complex IT environment. You'll be a key player in ensuring ongoing support, mentoring junior team members, and fulfilling routine cybersecurity tasks.

At AAA, their team members strive to deliver exceptional service, helping their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work, fostering a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.


Why Work For This Organization?

  • Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
  • 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
  • Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and other comprehensive benefits.
  • Paid Holidays: Enjoy paid holidays, promoting work-life balance.
  • Paid Time Off: Team Members accrue paid time off monthly, and depending on your position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
  • Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
  • AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
  • Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Summary: Leading Cybersecurity Controls and Mentoring Talent

The IAM Cybersecurity Engineer plays a pivotal role in strengthening the overall cybersecurity posture of Mountain West Group. Reporting to the Director, Cyber Security and Network Engineering, this position demands proficiency across all aspects of information security. You will provide ongoing support and mentorship to more junior team members, ensuring their growth and development, while also expertly fulfilling routine cybersecurity tasks. A core responsibility includes rigorously testing the effectiveness of security controls and providing strategic advice to business partners on a wide range of cybersecurity topics.

Responsibilities / Job Duties: Driving Security Enhancements and Compliance

As an IAM Cybersecurity Engineer, your responsibilities will blend hands-on technical execution with strategic oversight and cross-functional collaboration, ensuring the robust protection of a complex IT environment.

  • Respond to Cybersecurity-Related Requests: You will be the primary point of contact for responding to cybersecurity-related requests, taking appropriate action, which includes meticulously approving, fulfilling, or rejecting requests. This requires careful assessment of security implications and working closely with business partners to meet their legitimate needs while maintaining security standards. Your judgment ensures that all access and changes adhere to strict security protocols.
  • Manage and Maintain Cybersecurity Tools: You will be responsible for the full lifecycle of managing and maintaining cybersecurity tools. This encompasses applying necessary patches to keep tools updated and secure, as well as overseeing the onboarding and offboarding of these tools within the security ecosystem. Your diligence ensures that security tools are always operational, effective, and fully integrated into the security infrastructure.
  • Manage Projects, Initiatives, and Changes: You will take a leading role in managing cybersecurity projects, initiatives, and changes. This involves comprehensive planning to define scope and objectives, meticulous scheduling to ensure timely delivery, seamless implementation of new security controls or systems, and rigorous reporting of status to all relevant stakeholders. Your project management skills will be crucial for successful security enhancements.
  • Audit and Improve Security Controls: You will actively audit various security controls, including firewall rules, cloud and SaaS security configurations, and API controls. Through these audits, you will meticulously recommend improvements to enhance their effectiveness, mitigate risks, and ensure compliance with internal policies and industry best practices. Your proactive approach strengthens the organization's defense mechanisms.
  • Detect and Remediate Vulnerabilities: You will work in close collaboration with application, cloud, and infrastructure teams to effectively detect and remediate vulnerabilities. This includes identifying weaknesses in system configurations and in-house developed software. Your efforts will minimize the attack surface and strengthen the overall security posture by ensuring that known flaws are addressed promptly and effectively.
  • Conduct Periodic Testing of Security Controls and Establish Metrics: You will regularly conduct periodic testing of security controls to evaluate their effectiveness. This involves performing various assessments to ensure controls are functioning as intended and providing the expected level of protection. Based on these evaluations, you will recommend improvements and establish and collect risk-based metrics to measure control effectiveness and overall security posture, informing data-driven security decisions.
  • Assist with Development of Security Requirements: You will provide crucial assistance in the development of security requirements and assessment procedures for business use of technologies. This involves translating business needs into actionable security mandates, ensuring that new technologies and applications are securely designed and implemented from the outset.
  • Other Duties as Assigned: You will be flexible and willing to perform other duties as assigned by the Director, Cyber Security and Network Engineering, contributing to the overall success and adaptability of the cybersecurity department.

Knowledge, Skills, and Abilities: Your Core Competencies

  • Ability to Lead Individual Projects: You possess the proven ability to lead individual projects from conception to completion, demonstrating strong project management and ownership skills.
  • Strong Oral and Written Communication Skills: You have strong oral and written communication skills, essential for articulating complex cybersecurity concepts clearly to technical teams, business partners, and leadership.
  • Act as a Team Player: You are a natural team player, demonstrating a collaborative spirit and contributing positively to group efforts and shared security goals.
  • Act with a Sense of Urgency: You act with a sense of urgency to effectively resolve requests and respond to incidents, recognizing the critical nature of cybersecurity operations.
  • Ability to Weigh Request Reasonableness: You have the discerning ability to weigh whether a request is reasonable before fulfilling it, ensuring that security is balanced with operational needs and that exceptions are justified.

Education, Competencies, Certifications/Licenses: Your Foundational Expertise

  • Educational Background: A Bachelor’s Degree in Information Technology or a related field, or equivalent work experience and education, is required.
  • Information Technology Field Experience (5+ years): You must have 5+ years of experience in the information technology field, demonstrating a broad understanding of IT systems and operations.
  • Cybersecurity Experience (4-7 years): You possess 4-7 years of dedicated cybersecurity experience, indicating significant practical knowledge of security principles and practices.
  • Core Security Concepts Application (1+ year): You have at least one year of experience in one or two applications of core security concepts, including:
    • Security Operations and Administrations: Daily management and oversight of security tools and processes.
    • Access Controls: Managing and enforcing user permissions and system access.
    • Risk Identification, Monitoring, and Analysis: Proactively identifying, tracking, and assessing security risks.
    • Incident Response and Recovery: Handling security breaches and restoring systems.
    • Cryptography: Understanding encryption and secure communication.
    • Network and Communications Security: Securing network infrastructure and data in transit.
    • Systems and Application Security: Protecting operating systems and software applications from vulnerabilities.
  • Information or Cyber Security Certification: You hold a valid Information or Cyber Security Certification (e.g., CompTIA Security+, CySA+, CEH).

Preferred Qualifications: Enhancing Your Profile

  • Project Management Experience: 2 years of project management experience is preferred, further strengthening your ability to lead initiatives.
  • Advanced Certifications: Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) certifications are highly preferred, validating expert-level knowledge in information security and cloud security respectively.

What We Offer: Rewarding Your Contributions

  • Competitive Salary and Incentives: Enjoy competitive pay with the opportunity to participate in a discretionary annual incentive plan or other incentive plans, reflecting the value of your contributions. The compensation range is targeted between Min: $129,223.00 - Mid: $161,528.00 - Max: $193,834.00, with all offers subject to a fair pay analysis.
  • Robust 401k Matching: Benefit from a strong 401k matching program, with $1 for $1 company match up to 6% of eligible earnings per pay period, significantly boosting your retirement savings.
  • Comprehensive Benefits Package: Access robust medical, dental, and vision coverage, along with a wellness program and more, ensuring your health and well-being are prioritized.
  • Paid Time Off and Holidays: Enjoy generous paid holidays and monthly accrual of paid time off. Additionally, 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a highly collaborative environment where your contributions to providing exceptional service to members are genuinely valued.
  • Free AAA Classic Membership and Product Discounts: Receive a complimentary AAA Classic Membership and enjoy discounts on various AAA products, providing extra perks.
  • Tuition Reimbursement Program: Take advantage of a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Features

Job CategoryIT, Security

Our client, a prominent organization in the Information Technology sector, is looking for a skilled IAM Cybersecurity Engineer. This permanent position is based hybrid in Walnut Creek, California, req...View more


Cybersecurity Engineer (Permanent - Hybrid - La Mirada, CA)

Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.


Position Summary: Advancing Cybersecurity for California's Research & Education Network

This is a full-time, permanent position within the CENIC Information Security Office (ISO), offering a hybrid work model based out of La Mirada, California. The Cybersecurity Engineer reports directly to the Manager of the Information Security Office, undertaking a broad and critical range of technical cybersecurity, operational cybersecurity, and general administrative support duties. You'll be instrumental in diverse areas, including vulnerability management, ticket handling, security documentation, email gateway security, identity and access management security, network security monitoring, and various security audit and administrative tasks. The successful Cybersecurity Engineer will play a pivotal role in advancing CENIC's ISO team efforts, providing essential information security services and support to CENIC and its Charter Associate members, thereby safeguarding a network vital to millions.

Supervisory Responsibility: None.


What You Will Do: Core Functions in Network Security & Operations

As a Cybersecurity Engineer, you'll be on the front lines of protecting a critical research and education network. Your responsibilities will span system implementation, threat mitigation, incident response, and continuous improvement in security practices.

  • Build and Implement Enterprise-Class Security Systems: You'll be responsible for meticulously building and implementing enterprise-class security systems within a live production environment. This involves deploying robust security controls, tools, and platforms designed to protect a high-capacity, high-traffic network serving millions of users. Your work ensures that the network's defenses are continuously strengthened against evolving threats.
  • Align Security with Business and Technology Strategy: You'll actively align security standards, frameworks, and practices with the overall business and technology strategy of CENIC. This involves understanding organizational goals, technical roadmaps, and ensuring that security initiatives are integrated seamlessly, contributing to strategic objectives while meeting critical customer and regulatory requirements.
  • Implement Security Processes to Mitigate Emerging Threats: You'll design and implement proactive security processes specifically aimed at identifying and mitigating emerging threats. This includes developing procedures for threat intelligence integration, vulnerability assessment, incident response, and continuous monitoring to ensure that CENIC's defenses can adapt rapidly to new attack vectors and evolving cyber risks.
  • Code, Test, and Debug Applications for Security Solutions: You'll leverage current programming languages and technologies to write code, complete programming tasks, and perform rigorous testing and debugging of applications. This coding capability will be applied directly to developing and enhancing security solutions, automating security processes, and ensuring the reliability and performance of tools used in cybersecurity operations.
  • Support Security Implementations Under Senior Guidance: You'll work under the limited direction and supervision of senior members of the ISO team on complex security solutions and implementations. This collaborative approach allows you to contribute to high-impact projects while gaining valuable mentorship and technical guidance from experienced cybersecurity professionals, ensuring successful project outcomes.
  • Process and Update Service Desk Tickets: You'll be responsible for efficient service desk ticket processing and updates related to information security. This involves receiving, categorizing, prioritizing, and diligently resolving security-related incidents and service requests, ensuring timely resolution and clear communication with affected users and teams.
  • Administer and Utilize Information Security Tools: You'll actively use and administer a wide range of information security tools and services. This includes platforms for vulnerability management, network security monitoring (NSM), Endpoint Detection and Response (EDR), email security gateways, Security Information and Event Management (SIEM) systems, alert management platforms, and Identity Management (IdM) security tools. You'll also utilize network analysis tools like nmap, tcpdump, and Wireshark for deep packet inspection and network forensics.
  • Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with CENIC's network security monitoring and SIEM services. This proactive measure ensures that the organization's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
  • Perform Threat Hunting for Anomalous Activity: You'll regularly perform threat hunting to proactively search for anomalous activity within CENIC's network and systems during standard ISO business hours. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
  • 24/7 Monitoring and Incident Response (On-Call Rotation): You'll be responsible for 24/7 monitoring and responding to security alerts as a rotating member of the ISO escalations team. This critical on-call duty ensures that security incidents are addressed promptly around the clock, minimizing potential impact on CENIC's network and services, and maintaining continuous security vigilance.
  • Maintain Vulnerability Management Asset Inventory: You'll be responsible for meticulously maintaining the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
  • Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report. This involves generating and analyzing reports from regular vulnerability scans, summarizing key findings, and presenting them in a clear and actionable format for relevant stakeholders.
  • Create Monthly Enterprise Vulnerability Risk Status Report: You'll meticulously create the monthly enterprise vulnerability risk status report. This comprehensive report provides a broader overview of the organization's overall vulnerability posture, trends, identified risks, and the effectiveness of mitigation efforts to executive leadership and other key stakeholders.
  • Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis. This commitment to continuous learning ensures that your cybersecurity skills remain current with the latest industry trends, technologies, and threat landscapes, supporting your professional development.
  • Provide Other CENIC Business User Security Assistance: You'll provide other CENIC business user security assistance as needs dictate. This involves offering guidance on secure practices, addressing user-specific security concerns, and supporting the broader user community in maintaining a secure digital environment.
  • Improve CENIC's Privacy and Security Practices: You'll continuously look for opportunities, procedures, and tools to improve CENIC's privacy and security practices. This proactive mindset drives innovation, streamlines processes, and enhances the overall security and privacy profile of the organization, aligning with best practices.
  • Collaborate on Software Tools and Solutions: You'll work closely with the CENIC Security Team to identify, discuss, and implement software tools and solutions in support of CENIC’s networks, network security designs, and the effective implementation of network security policies, procedures, and technologies. This ensures a collaborative and integrated approach to security enhancement.

Key Success Factors: Driving Security Excellence

Success in this role will be defined by a blend of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for CENIC.

  • Consulting and Engineering Security Best Practices: You'll excel at consulting and engineering in the development and design of security best practices and the implementation of solid security principles across the organization. Your contributions will help meet business goals, stringent customer demands, and evolving regulatory requirements.
  • Understanding Cloud Computing Security Considerations: You possess a deep understanding of security considerations related to cloud computing. This includes knowledge of risks such as data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, Advanced Persistent Threats (APTs), data loss, and Denial of Service (DoS) attacks, enabling you to design secure cloud solutions.
  • Expertise in Identity and Access Management (IAM): You have expert knowledge of Identity and Access Management (IAM)—the comprehensive framework of security policies and technologies that limit and meticulously track the access of individuals and entities within an organization to sensitive technology resources.
  • Security-Centric Software Development: You have proven experience developing software and proficiency in coding, using a security-centric approach. This means integrating security considerations throughout the software development lifecycle, building secure applications, and conducting security testing.
  • Experience using Zeek network security monitoring (NSM) and host intrusion detection systems (HIDS) is crucial.
  • IDS Script and Signature Development: You possess skills in IDS (Intrusion Detection System) script and signature development, enabling you to create custom rules for detecting specific threats or anomalous behaviors.
  • Hands-on Network/Packet Level Examination: You are adept at hands-on network/packet level examination using tools such as tcpdump or Wireshark. This allows for deep forensic analysis of network traffic to diagnose security incidents and understand attack methodologies.
  • Data and Text Manipulation Proficiency: You have a working knowledge of regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
  • Operational Streamlining through Standardization and Automation: You have proven experience streamlining operational capabilities through standardization and automation. This demonstrates your ability to identify inefficiencies and implement automated solutions that enhance security operations and reduce manual effort.
  • Multi-Tasking and Adaptability: You are highly adept at working on multiple tasks concurrently and can respond effectively to rapidly changing priorities in a fast-paced security environment.
  • Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for CENIC's security services, influencing future architectural decisions and technology roadmaps.
  • Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize CENIC's security profile while remaining sensitive to its mission.
  • Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
  • Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
  • Strong Interpersonal and Teamwork Skills: You possess strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships.
  • Working Knowledge of IP-Based Networking: You have a solid working knowledge of IP-based networking, including fundamental concepts, protocols, and architectures, crucial for network security.
  • Background in Basic Statistics and Analytics: You have a background in basic statistics and analytics and experience with modern analytics and visualization packages (e.g., Tableau, Power BI). This enables data-driven security insights and reporting.
  • Adept at Understanding Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
  • Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of your work, ensuring precision in security implementations and analyses.
  • Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
  • Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with CENIC.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
  • Information Security Experience (2-4 years): You must have 2-4 years of experience in information security, cybersecurity, or network security engineering, specifically focusing on the design, deployment, and implementation of security solutions. Alternatively, an equivalent combination of education, certifications, and experience will be considered.
  • Mid-Level Cybersecurity Certification: A mid-level cybersecurity certification like CompTIA CySA+, SANS GSEC, or an equivalent credential, is required, validating your foundational and practical cybersecurity knowledge.

Preferred Education And/Or Experience: Enhancing Your Profile

  • Advanced Security Education: A BA/BS in information security, information assurance, cybersecurity, or equivalent experience is preferred, indicating a specialized academic focus.
  • Working Knowledge of Computer and Network Security: A strong working knowledge of computer and network security principles is desirable.
  • Advanced-Level Cybersecurity Certification: An advanced-level cybersecurity certification like (ISC)2 CISSP (Certified Information Systems Security Professional), SANS GCIA (GIAC Certified Intrusion Analyst), or an equivalent is highly preferred, demonstrating expert-level security knowledge.
  • Logging Environment Experience: Experience with logging environments such as Elastic (ELK Stack) or Splunk for security information and event management is a plus.
  • Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred, enhancing automation and tool development capabilities.
  • Unix/Linux Administration: A minimum of 2 years experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.
  • Distributed Team Interpersonal Skills: Strong interpersonal skills and the ability to work effectively in a distributed team environment are desirable for this position.

Why Work at CENIC? Making a Meaningful Impact

Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours per day/7 days per week/365 days per year availability for incident response needs. An employee’s work shift is based on CENIC’s business needs.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.

Cybersecurity Engineer (Permanent – Hybrid – La Mirada, CA) Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewi...View more

We're partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They're looking for a highly skilled Software Systems Developer to join their team. This permanent position, based fully onsite in Gray, Tennessee, is critical for optimizing internal systems and enhancing performance through custom software development and robust IT infrastructure.

As a Software Systems Developer, you'll be responsible for designing, planning, and implementing technical solutions based on cross-functional requirements. You'll work closely with various teams to understand operational needs and translate them into scalable, maintainable software systems.


What You'll Be Doing: Building Integrated Technology Solutions

As a Software Systems Developer, you'll be at the heart of developing and enhancing the custom software that drives the client's business operations. Your role will blend technical design, hands-on development, and deep collaboration to create scalable, maintainable, and efficient systems.

  • Gather Requirements and Implement Tailored Software Solutions: You'll start by meticulously gathering requirements from various business stakeholders, thoroughly understanding their operational needs and challenges. You'll then translate these requirements into detailed technical specifications and proceed to implement tailored software solutions that precisely address those needs, ensuring the delivered software directly optimizes business processes.
  • Collaborate with the IT Team on Infrastructure: You'll work in close collaboration with the IT team to ensure that the underlying infrastructure effectively supports the software solutions you develop. This involves ensuring that network, server, and other IT components are configured for optimal performance, security, and scalability, guaranteeing that applications run efficiently and reliably.
  • Maintain, Extend, and Integrate Internal Software Systems: You'll be responsible for the ongoing maintenance, extension, and integration of various internal software systems. This includes debugging existing code, adding new features to enhance functionality, and ensuring seamless communication and data exchange between different applications across the organization's technology landscape.
  • Design, Administer, and Optimize MS SQL Server Databases: A core responsibility will involve deep engagement with data. You'll design, administer, and optimize MS SQL Server databases, ensuring they are structured for efficiency, scalability, and data integrity. This includes schema design, writing complex queries, optimizing stored procedures, managing user access, and performing routine maintenance to ensure peak database performance.
  • Develop and Maintain Custom Reports: You'll be instrumental in enabling data-driven decision-making by developing and maintaining custom reports. This involves extracting data using various methods, creating insightful dashboards, and building reports using specialized tools like SSRS (SQL Server Reporting Services) and Crystal Reports. Your work will provide critical business intelligence, transforming raw data into actionable insights.
  • Automate Business Processes: You'll drive operational efficiency by automating business processes. This involves leveraging your technical skills in SQL for data-driven automation, integrating solutions via APIs, and building custom applications that streamline workflows, reduce manual effort, and enhance productivity across various departments.
  • Manage Source Control and Maintain Codebase: You'll meticulously manage source control for software projects, ensuring proper versioning, branching, and merging of code. Your commitment to maintaining a clean, extensible codebase will promote long-term maintainability, facilitate team collaboration, and support future enhancements.
  • Document System Modifications and Customizations: You'll thoroughly document all system modifications and customizations for future reference. This includes creating technical specifications, architectural diagrams, user guides, and troubleshooting procedures. High-quality documentation is vital for knowledge transfer, onboarding new team members, and ensuring the long-term supportability of the developed systems.

What's Needed: Your Technical Qualifications

To excel as a Software Systems Developer, you'll need strong expertise in SQL Server, object-oriented programming, full-stack development, and a solid understanding of IT infrastructure.

  • Strong Expertise in SQL Server Development and Architecture: You must possess strong expertise in SQL Server development and architecture. This includes advanced proficiency in writing T-SQL, designing database schemas, optimizing queries and stored procedures, and understanding SQL Server's architectural components for high performance and scalability.
  • Proficiency in Object-Oriented Programming and Software Design: You're required to have proficiency in object-oriented programming (OOP) principles and strong knowledge of software design principles. This ensures you can build modular, maintainable, and scalable software solutions.
  • Full-Stack Development Experience: You have proven experience with full-stack development, demonstrating your ability to contribute across all layers of a software application. This includes expertise in database technologies (SQL Server), server-side logic (C#, VB.Net, MVC/Web API), and client-side technologies (JavaScript, HTML5).
  • Ability to Debug and Test Applications: You possess the ability to debug and test applications effectively within various integrated development environments (IDEs) and web browsers. This includes utilizing debugging tools, writing unit tests, and performing integration testing to ensure software quality and functionality.
  • Solid Understanding of IT Infrastructure: You have a solid understanding of core IT infrastructure, including networking fundamentals (TCP/IP, LAN/WAN), operating systems (Windows, Linux), databases (SQL Server), and Active Directory (identity and access management). This holistic view enables you to design and troubleshoot integrated solutions.
  • Excellent Communication and Interpersonal Skills: You bring excellent communication and interpersonal skills. This is crucial for effectively gathering requirements from diverse teams, collaborating with technical and non-technical stakeholders, and presenting solutions clearly.
  • Self-Motivated with Strong Time Management: You are self-motivated with strong time management and task prioritization abilities. This indicates your capacity to manage your workload effectively, meet deadlines, and drive projects to completion independently.
  • Capable of Providing Project Updates: You are capable of providing clear and concise project updates and timelines to leadership, ensuring proper visibility and alignment on project status and progress.

Education & Technical Skills:

  • Bachelor's Degree: A Bachelor's degree in Information Technology or a related field, or equivalent experience, is required.
  • MS SQL Development, Management, and Administration: Proficiency in MS SQL development, management, and administration.
  • Programming Languages: Experience with C#, VB.Net, JavaScript, and HTML5.
  • Web Development: Familiarity with MVC/Web API development.
  • Source Control: Experience with source control systems and version management.

Job Features

Job CategoryEngineering

We’re partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They’re looking for a highly skilled Softwar...View more