Browse
···
Log in / Register

Lead Security Engineer

$170,000-260,000

Jump

Salt Lake City, UT, USA

Favourites
Share

Description

Hey there! We are Jump, AI for Financial Advisors. We are growing super fast, have a culture of kindness and ownership, and we’re looking for someone who is absolutely obsessed with security take ownership of it here at Jump. About you You love security. It’s what you are all about and you are very very good at it. You are very motivated and proactive and can get a lot done every day. You love coding and are excited to learn Elixir. You really want to find and fix security vulnerabilities in an Elixir/Phoenix codebase. You are very pleasant to work with and people feel better about themselves after interacting with you. What you’ll do Provide guidance, training, and tools to developers on secure coding principles, common vulnerabilities, and secure design patterns. Analyze, fix, and test vulnerabilities. Do code reviews, audit and analyze source code for vulnerabilities. Monitor the security industry for new developments. Evaluate, recommend, and implement security tools and technologies to improve our application security posture. Conduct threat modeling exercises for new and existing applications and systems. Ensure systems and processes adhere to relevant security standards, regulations (e.g., ISO 27001, SOC 2, GDPR, HIPAA), and internal policies. Implement and manage security controls for cloud environments (e.g., AWS, GCP), including identity and access management (IAM), network security, and data protection. Maintain comprehensive documentation for security processes, tools, and configurations. What success looks like after 12 months Major vulnerabilities are found SOC 2 Type II report continues to be delivered with zero high‑risk exceptions. Mean‑time‑to‑detect (MTTD) ≥ 90 % of employees complete annual security training and phishing tests. Security is a documented, automated part of CI/CD (build fails on critical vulns). Our largest enterprise customers cite security as a strength in renewals. Nice‑to‑haves: experience with multi‑tenant data isolation, SAML/SCIM integrations, or selling to regulated industries (FinTech, HealthTech, GovTech). Compensation & benefits Base salary: $170 k – $260 k USD Benefits: Health/dental/vision, 401k (no match yet) Time‑off: Flexible PTO with manager approval Gear: Top‑spec laptop, stipend for home office/security hardware Hiring process (2–3 weeks total) Homework assignment — Takes about 1hr Intro call (30 min) — with CTO. Paid Trial week — Come work with us for a week and see how you like it Team member intros & Reference checks Offer Other info: We buy the subscriptions you need (Cursor.ai, ChatGPT, etc) We’re a small and efficient dev team We’re growing gangbusters. All revenue-backed, super low churn. Raised a $20M Series-A a few months ago HQ based in SLC, Utah Remote friendly, must be based in the USA Requirements Have 5+ years hands‑on security engineering in cloud‑native (AWS/GCP/Azure) product environments. Can demonstrate end‑to‑end ownership of at least one compliance framework (SOC 2, ISO 27001, HIPAA, PCI DSS, etc.). Are fluent in modern DevSecOps tooling (Terraform, Kubernetes, GitHub Actions, OIDC/OAuth). Write code well enough to build internal tooling or fix a critical bug (we use Elixir & Terraform). Communicate complex risks in plain language to engineers, execs, and customers. Are comfortable being a “team of one” at first and progressively hiring/mentoring teammates.

Source:  workable View Original Post

Location
Salt Lake City, UT, USA
Show Map

workable

You may also like

OCT Consulting, LLC
Systems Security Administrator
Washington, DC, USA
Systems Security Administrator (15.23) OCT Consulting is a business management and technology consulting firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties OCT currently has an opening for a Systems Security Administrator to work with a technology division within the Federal Bureau of Investigation (FBI). This role will require strong knowledge of system administration and attention to detail. Day to day responsibilities include: Establish and manage Role-Based Access Controls (RBAC) for the Unified Financial Management System Secret Cloud (UFMS-SC), including Writing, Itemizing and Recording Expenses (WIRE) as a component of UFMS-SC, the Asset Management System (AMS), the U.S. Treasury Bureau of Fiscal Service’s Invoice Processing Platform (IPP), the U.S. Treasury Bureau of Fiscal Service’s Over-the-Counter Channel Application (OTCNet), and the U.S. Treasury Bureau of Fiscal Service’s G-Invoicing Application (G-INV) (Other applications may subsequently be added). Coordinate with applicable Information System Security Officers (ISSOs) and other system support personnel to ensure user access is implemented and maintained in accordance with governing policies and procedures. Provide recommendations for developing new user security groups, profiles, and roles to ensure compliance with governing policies and procedures. Create, modify and/or delete user access security groups, profiles, and roles in accordance with governing policies and procedures. Add users and assign initial user security groups, profiles, and/or roles which address separation of duties, “need-to-know,” and “least privileges” to ensure compliance with the FBI’s Risk Management Framework policy. Adhere to established RBACs and established policies and procedures when adding/removing/modifying user access accounts. Identify problematic or incomplete information on security access request forms that could delay or negate the processing of the requests; identify items of security concern; determine whether additional checks are necessary based on the evaluation of available information. Review/respond to routine user access requests for supported applications. Develop procedures for managing changes in user access to applications (as required access, “need-to-know,” and/or “least privileges” change) and for terminating user access when no longer required or authorized, in accordance with governing policies and procedures. Develop/maintain SSA Standard Operating Procedures (SOPs). Provide scheduled and ad-hoc reports regarding user access as directed by ISU PM or designee and/or established policies and procedures. Develop/maintain user guidance documentation for supported applications. Develop/maintain procedures and guidelines providing a detailed overview of the establishment and assignment of user security groups, profiles, and roles. Conduct annual user recertifications for the supported financial and facilities applications to ensure compliance with policy requirements. Develop/maintain procedures and guidelines presenting a detailed overview of the annual user recertifications. Obtain developmental training on supported applications’ security administration functionality. Validate current/requested access. Requirements Qualifications/Requirement Must be a US Citizen. Must hold an active DoD Top Secret (TS) clearance. Undergraduate degree, preferably in a math or science field. Minimum of 2 years of experience. Demonstrated experience in systems security administration, as described above. Demonstrated experience analyzing complex problems and identifying and resolving root causes. Strong interpersonal skills; strong analytical, critical thinking, and problem-solving skills. Must be able to work onsite: the primary place of performance will be at FBI facilities in the Washington Metropolitan Area (WMA)/ National Capital Region (NCR). Benefits Benefits OCT offers competitive compensation packages and a full suite of benefits which includes: Medical, Dental, and Vision insurance Retirement savings 401K plan provided by an industry leading provider with 3% employer contributions of the employee’s gross salary Paid Time Off and Standard Government Holidays Life Insurance, Short- and Long-Term disability benefits Training Benefits Salary Range: $100,000-$125,000 yearly commensurate with experience, education, etc. About OCT Consulting OCT Consulting LLC is a minority-owned, Small ​Disadvantaged Business (SDB) providing professional services and information technology solutions to the Federal government and commercial clients. Founded in 2013, we bring the advantage of agility in operations along with a management team with a track record of leading successful engagements at major Federal government agencies. At OCT, we are committed to ensuring equal opportunity for all individuals, recognizing that merit and qualifications are the foundation of our hiring, promotion, and development practices. We believe in creating a work environment where every employee can thrive based on their abilities, skills, and achievements. Our practices are designed to ensure fair treatment and equal access to opportunities for all, regardless of race, ethnicity, gender, sexual orientation, age, abilities, or other personal characteristics. We are dedicated to providing career growth and professional development based on individual merit and fostering a workplace where everyone’s contributions are valued and recognized.
$100,000-125,000
Global Dimensions
Cyber Systems Analyst - Junior - TS/SCI - Quantico, VA
Quantico, VA 22134, USA
Global Dimensions is a HUBZone, service disabled, veteran-owned small business based in Fredericksburg, VA. We are a dynamic, expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). Global Dimensions is currently seeking Junior Cyber Systems Analysts for upcoming opportunities in Quantico, Virginia. Junior Cyber Systems Analyst will: Evaluate the cybersecurity stance of a USMC defense program, ensuring it adapts to leading cybersecurity practices and prioritizes cyber threats based on comprehensive cyber analysis. Examine foreign capabilities to detect, disrupt, and block USMC emissions and signals across the entire cyber kill chain, including, but not limited to, emissions from targeting, communications, and ISR (Intelligence, Surveillance, and Reconnaissance) systems, as well as reversible and non-reversible attacks. Monitor and assess advancements in emerging and commercial technologies that state and non-state actors could leverage to detect, disrupt, or compromise USMC acquisition programs’ network infrastructure. Identify critical risk factors within the environment, such as network classification, baseline activity, system architecture, operating systems, services, connectivity, and bandwidth. Determine the boundaries of the network for potential collection activities. Define the limits of connected or supporting networks that may require collection efforts. Evaluate existing databases to identify intelligence gaps. Utilize open-source information to collect Publicly Available Information (PAI). Investigate the physical battlespace to understand how the environment could influence tactical operations. Characterize the effects of the battlespace. Analyze the battlespace environment in terms of information, services, and networks, focusing on confidentiality, integrity, and availability, and evaluating mechanisms to protect, detect, respond, restore, and conduct reviews. Examine additional characteristics of the battlespace, such as security measures, auditing procedures, and backup systems. Assess the adversary's physical location of assets, architecture, automation capabilities, security policies, baseline activity, vulnerabilities, and conclusions related to Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND), and Computer Network Attack (CNA). Identify potential Courses of Action (COA) for the adversary. Determine the adversary’s likely objectives and desired outcomes. Identify all possible COAs available to the adversary, with an emphasis on the most likely and most dangerous options. Develop COAs based on the adversary's perspective of friendly information architecture (reverse cyber IPB). Evaluate and prioritize each adversary’s COA. Continuously refine COAs as new information becomes available over time. Assess foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities. Evaluate potential vulnerabilities in USMC tactical systems to CNA, including systems associated with targeting, ISR, and navigation. Provide portfolio-specific analysis, expertise, and intelligence production as outlined below. Conduct Threat Steering Groups with participants from USMC Combat Development & Integration to identify key factors and significant risk drivers for potential material solutions that may influence lifecycle cost, performance, schedule, and other acquisition decisions. Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support Marine Corps Acquisition Programs throughout the Joint Capabilities Integration and Development System (JCIDS) process, assisting the Defense Acquisition System. Requirements TS/SCI Security Clearance Desired Experience: At least 3 years of experience conducting analysis relevant to the labor category, with at least some of the experience within the last 2 years. Desired Education: Bachelor’s degree in a field related to the labor category from an accredited college or university recognized by the U.S. Department of Education. Alternatively, an additional 4 years of experience in the specific labor category, totaling 7 years, may substitute for a Bachelor’s degree. Demonstrates a working knowledge of the concepts involved in the specific functions outlined in the labor category description. Knowledgeable of and demonstrates the ability to apply IC and DoD classification guidelines and procedures. Demonstrates the ability to work semi-independently with oversight and direction. Demonstrates the ability to apply logic when evaluating and synthesizing multiple sources of information. Shows understanding of interpreting analysis, including its meaning, significance, and implications. Demonstrates the ability to defend analytic judgments with sound, logical conclusions, and to adapt these judgments when new information, changing conditions, or unexpected developments arise. Demonstrates the ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in various formats, including Microsoft Office tools (e.g., Excel, Word, PowerPoint), electronic/soft copy matrices, and/or web-enabled formats. Demonstrates the ability to clearly communicate complex issues in a concise and organized manner, both verbally and non-verbally, with strong grammar skills. Demonstrates proficiency with Microsoft Office tools. Demonstrates the ability to develop structured research, including but not limited to obtaining, evaluating, organizing, and maintaining information within security and data protocols. Demonstrates the ability to recognize nuances and resolve contradictions and inconsistencies in information. Demonstrates working knowledge of complex analytic methodologies, such as structured analytic techniques or alternative approaches, to examine biases, assumptions, and theories, reducing uncertainty, strengthening analytic arguments, and mitigating surprise. Structured analytic techniques include, but are not limited to, Analysis of Competing Hypotheses, Devil’s Advocacy, High-Impact / Low-Impact Analysis, Red Team Analysis, and Alternative Futures Analysis. Demonstrates understanding of intelligence collection capabilities and limitations, including but not limited to technical sensors/platforms and human intelligence sources relevant to the labor category. Demonstrates understanding of evaluating collected intelligence reporting, engaging with collection managers, and developing collection requirements. Global Dimensions does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits. Equal Opportunity Employer/Veterans/Disabled.
Negotiable Salary
RP Pro Services
Senior Threat Manager (Top Secret Clearance Required)
Washington, DC, USA
RP Professional Services is a rapidly growing Technology consulting firm headquartered in Virginia. We’re an 8a and Service-Disabled Veteran-Owned Small Business (SDVOSB) serving both federal and commercial customers. At RP, we help our clients achieve their mission by developing value driven, customized solutions that are executed by the best people. Our dedication to our employees and clients is driven by our promise to deliver Excellence, Value, and Flexibility. "People, not just Resources" is more than our motto; it's the foundation on which we are built! RP Professional Services is seeking a Senior Threat Manager to identify, assess, and mitigate security risks, particularly those related to violent threats, insider threats, and intelligence vulnerabilities. This role requires expertise in threat assessment and management (TAM), risk mitigation strategies, and collaboration with military and government agencies. The ideal candidate will possess structured professional judgment expertise, law enforcement and intelligence experience, and a deep understanding of threat management frameworks within the Department of Defense (DoD) and Intelligence Community (IC). This position is contingent upon the contract being awarded to RP Professional Services. Requirements: Conduct structured threat assessments utilizing industry-recognized methodologies. Apply Structured Professional Judgment (SPJ) tools, such as WAVR-21 and TRAP-18, to evaluate threats. Develop and implement risk mitigation strategies for military and civilian leadership. Provide written and verbal briefings on threat intelligence, security risks, and emerging patterns. Support local, state, and federal threat management teams focused on preventing violent behavior. Collaborate with law enforcement, intelligence agencies, and government organizations to assess threats. Utilize DoD and commercial databases to compile and analyze threat intelligence reports. Ensure compliance with national security protocols, regulations, and industry best practices. Conduct training programs for leadership teams on threat management and risk mitigation. Requirements Certified Threat Assessment Professional (administered by the Association of Threat Assessment Professionals - ATAP). Must be an active ATAP member. Minimum ten (10) years in threat assessment and/or threat management. Minimum ten (10) years of experience advising military or civilian leaders on threat assessment strategies. Direct experience working with the DoD population in a security or intelligence capacity. Experience supporting threat management units or teams focused on assessing and mitigating violent behavior risks. Familiarity with Intelligence and/or Law Enforcement communities, including Government, DoD, and commercial databases used to compile analytic products. Preferred Qualifications: Advanced certifications such as CISSP, CISM, CEH, or GCIH. Strong understanding of geopolitical risks and global threat landscapes. Proven ability to train personnel in threat assessment methodologies and risk mitigation strategies. Salary Range: $195,000 - $210,000 The salary range for this role considers a wide range of factors, including, but not limited to, skill sets, equity, experience and training, licensure and certifications, and other business and organizational needs. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.   Benefits Health Benefits: Medical, Vision, Dental Up to 4% retirement match with 100% vesting Company paid STD and LTD Company paid basic life insurance Competitive PTO package RP Professional Services, LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
$195,000-210,000
DMV IT Service
Senior Security Analyst
Seattle, WA, USA
Job Title: Senior Security Analyst  Location: Seattle, WA  Employment Type: Contract About Us:  DMV IT Service LLC is a trusted IT consulting firm, established in 2020. We specialize in optimizing IT infrastructure, providing expert guidance, and supporting workforce needs with top-tier staffing services. Our expertise spans system administration, cybersecurity, networking, and IT operations. We empower our clients to achieve their technology goals with a client-focused approach that includes online training and job placements, fostering long-term IT success. Job Purpose: The Cyber Security Senior Analyst will play a pivotal role in Security Operations, focusing on incident response, threat detection, malware analysis, and monitoring. This role requires a senior technical expert who can enhance security defenses, mentor junior analysts, and contribute to continuous improvement in security operations. Requirements Key Responsibilities Conduct advanced threat assessments, malware analysis, and support incident response efforts. Lead complex security investigations escalated from junior SOC analysts. Provide mentorship and technical guidance to Tier 1 and Tier 2 SOC teams. Perform root cause analyses and recommend containment and remediation strategies. Identify attacker tactics, techniques, and procedures (TTPs), and apply Indicators of Compromise (IOCs) for proactive defense. Develop internal tools, scripts, and automated solutions to strengthen detection and response capabilities. Collaborate with technical and business teams, acting as the subject matter expert for SOC initiatives. Engage in proactive threat hunting to identify potential vulnerabilities and threats. Create and maintain SOC documentation, including runbooks and process guidelines. Support security audits and ensure adherence to compliance standards and regulations. Participate in on-call rotations and provide after-hours incident response support when required. Required Skills & Experience Bachelor’s degree in cybersecurity, computer science, IT, or a related field. Over 5 years of experience in a Security Operations Center or incident response role. Strong knowledge of NIST 800-61 incident response frameworks. Proven expertise in handling advanced security incidents and investigations. Solid background in disciplines like host forensics, malware analysis, network traffic inspection, container security, insider threat, and alert tuning. Comprehensive knowledge of cloud security across Azure, AWS, and GCP platforms. Experience with security tools such as Azure Sentinel, Splunk, Microsoft Defender Suite, IDS/IPS, firewalls, antispam solutions, and device hardening. Understanding of security methodologies like MITRE ATT&CK, Cyber Kill Chain, and defense-in-depth strategies. Expertise in operating systems including Windows, Linux, and Mac OS. Proficiency in KQL, SPL, and scripting languages like Bash, PowerShell, or Python. Familiarity with security orchestration, automation, and response (SOAR) tools. Strong verbal and written communication skills tailored for varied technical audiences. Excellent analytical, troubleshooting, and problem-solving abilities under high-pressure scenarios. Knowledge of ISO 27001, PCI DSS, NIST standards. Experience with forensic analysis of network data, DNS logs, proxy logs, and host-based security logs. Proficiency with Cloud Security Posture Management (CSPM) tools and best practices.
Negotiable Salary
Prosync
COMSEC Specialist
Port Hueneme, CA, USA
ProSync is seeking a passionate COMSEC Specialist (COMS-S) to help ensure security and intelligence compliance with policies and regulations, drawing on some of the nation's leading personnel and cybersecurity thought leaders for enhancing, accelerating, and assuring the United States Navy's ability to counter existing and emerging security threats.  This position offers a salary in the range of $78k-98k based on numerous factors, including degree and overall experience.  ProSync Technology Group, LLC (ProSync) is an award-winning, SDVOSB Defense Contracting company with a strong military heritage and a record of excellence in supporting the Department of Defense and the Intelligence Community.  If you have prior military service or government contracting experience, are proud to serve and support our nation, and want to help support ProSync's mission to "Define and Redefine the State of Possible,” please apply today! RESPONSIBILITIES This position handles the support of the Sensitive Compartment Information Facility. This role includes: Preparing comprehensive intelligence reports that distill complex information into clear and actionable insights for various stakeholders. Gathering and meticulously evaluating intelligence from a diverse range of sources, ensuring the validity and reliability of the information collected. Identifying potential threats through thorough analysis and ensuring that vital information is promptly communicated to superiors and critical decision-makers to facilitate timely and informed actions. Conducting briefings for both internal and external stakeholders, providing them with crucial updates and strategic recommendations based on the latest intelligence assessments. Conceptualizing, drafting, coordinating, and publishing in-depth intelligence assessments that address pertinent security issues, thus contributing to the organization's overall situational awareness and strategic planning. Requirements Two (2) years of experience in Intelligence and Analysis in the DoD or IC.  Witnessing, delivering, picking up, and processing KOA Material. Reviewing, updating, and applying status markings. File destruction. Performing two-person integrity checks. One (1) year of experience in the following areas of intelligence and analysis: Conducting page checks; Executing material transfers. Providing COMSEC briefings and training. If a proposed individual does not meet both the desired education and experience qualifications, six (6) years of experience related to intelligence and analysis would be considered equivalent. Two (2) of these six (6) years should demonstrate experience in "1" through "4". One (1) of the six (6) years should demonstrate experience in “1” through “3”. A minimum Top Secret security clearance with SCI eligibility or higher is required to be considered for this position. EDUCATIONAL REQUIREMENTS A Bachelor’s degree or higher from an accredited college or university. Benefits Join PROSYNC and enjoy our great benefits! Compensation We also offer bonuses that are awarded quarterly to our employees and our compensation rates are highly competitive. Health & Retirement We offer a comprehensive Health Benefits package and 401K retirement plan so you can take care of yourself and your family, now and in the future. Other health-related benefits include an employee assistance program for those difficult times or when you need to take care of your mental health. Education Individual growth is a priority at ProSync. Employees are encouraged to take advantage of our company-sponsored continuing education program so they can get their degree or that next certification they need to propel them to the next level. Work/Life Balance A healthy work/life balance is essential for building and executing your work effectively at ProSync, but it’s also necessary to allow you the room to pursue everything else you want to develop in your personal life. We offer generous Paid Time Off and 11 paid holidays a year. ProSync also provides flexible work options that work with your schedule and lifestyle.
$78,000-98,000
Control Risks
Associate Director, Cyber Incident Response
Washington, DC, USA
The Associate Director is responsible for managing the Cyber Response Team in the US and leading overall delivery of incident response cases in the region. This role involves leading the technical aspects of the cyber response practice, managing our technical team members as well as managing client relationships. This role will report to Global Head of Cyber Response and work in tandem with European, Middle East and Asia colleagues on a follow-the-sun basis. The successful candidate will have a strong technical skill set, deep understanding of the North American cyber incident response market and a deep understanding of current and emerging advanced threat actors. They will have a proven track record of responding to advanced threats leveraging forensics and threat hunting technology. Role tasks and responsibilities Technical response Oversee incident response cases for all host and network based investigations, be responsible for the overall quality of our technical incident response work. Ownership of the entire lifecycle of a cyber incident including identification, containment, eradication and recovery. A particular area of specialty in eradication and recovery from an incident. Threat hunting using EDR tooling to evaluate an attacker's spread through a system and network, anticipating and thwarting further attacker activity. Perform live compromise assessments for organizations who suspect a compromise. Detect and hunt unknown live, dormant, and custom malware in memory across multiple systems in an enterprise environment. Demonstrate a deep understanding of both existing and emerging threat actors, as well as experience identifying rapidly changing tools, tactics and procedures of attackers. Advise on the safe technical recovery of an organizations IT systems balancing the need to understand what has happened but speed up recovery. Be responsible for Control Risks technical Cyber Response strategy. Identify, design and then implement solutions that meet these strategic objectives. Client Management To build and develop client relationships facilitating where appropriate introduction and provision of additional Control Risks services. Working closely with the Global Head of Cyber Response and Global colleagues to ensure a cohesive go-to-market approach. Possess and develop working knowledge of key insurer and law firm relationships that may drive growth. Reporting Provide situation reports and other significant case related material to the client and the Director of Cyber Response. Provide documentation to the relevant consultants in sufficient time to allow review and feedback, before submitting to a client. Report on the performance of the Technical Cyber Response work and forecast technical and resource requirements in the near and long term. Team management Establish resourcing requirements for our already growing Cyber Response practice, hire and then manage these technical individuals. Establish relationships with key recruiters and where possible align with the Cyber Crisis Management teams resourcing plans. Align with and help to expand the already re-occurring Internship Program and where business need requires onboard interns into the technical team. Define clear roles and responsibilities for new hires including a learning pathway for training & development. Ensure new joiners have appropriate time dedicated to technical development and research whilst balancing un-predictable workload. Governance Own the technical response Standard Operating Procedures, working with the team to ensure they are kept up to date with the latest threats. Ensure issues identified during delivery of cases are identified, escalated and resolved efficiently. Supporting the growth of the Cyber Response practice Refining Control Risks’ cyber response methodologies and approaches and tailoring the approach in changing market conditions. Identifying potential new areas of growth and opportunity. Requirements Candidates must be legally authorized to work in the US on a permanent basis without sponsorship. Candidates must possess unrestricted US work authorization. Proven experience in technically responding to significant and complex cyber attacks and information security related advisory Proven experience of managing and/or building the requisite technologies necessary for responding to a wide variety of common cyber security incidents Demonstrable experience of operating within a commercial environment and engaging with key stakeholders in insurance and risk management. Technical degree or demonstrated knowledge of common networks, software and hardware used in business environments Experience in conducting log analysis and digital forensics following a cyber incident Experience of working with law firms, communications experts, and others on sensitive investigations. Track record of developing consultative relationships with clients Excellent people management skills Fluent in English (written and spoken) Excellent presentation skills Excellent analytical skills Preferred: Strong understanding of MITRE ATT&CK techniques / sub-techniques. The ability to articulate TTPs to clients in non-technical terms. Preferred: Experience in generating SIGMA rules for host detection, SNORT rules for network detection and YARA Signatures for file and memory artefact identification. Preferred: Experience in engaging in industry and law enforcement intelligence forums Preferred: Experience of supporting cross-jurisdictional response cases Preferred: Qualifications such as: CREST Registered Intrusion Analyst (CRIA), Certified Network Intrusion Analyst (CCNIA), Certified Host Intrusion Analyst (CCHIA), SANS Advanced Incident Response, Threat Hunting, and Digital Forensics (FOR508) or Enterprise-Class Incident Response & Threat Hunting (FOR608), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and full membership of ISACA. The base salary range for this position is $140,000-$150,000 per year. Exact compensation offered may vary depending on job-related knowledge, skills, and experience. Control Risks is committed to a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status. If you require any reasonable adjustments to be made in order to participate fully in the interview process, please let us know and we will be happy to accommodate your needs. Control Risks participates in the E-Verify program to confirm employment authorization of all newly hired employees. The E-Verify process is completed during new hire onboarding and completion of the Form I-9, Employment Eligibility Verification, at the start of employment. E-Verify is not used as a tool to pre-screen candidates. For more information on E-Verify, please visit www.uscis.gov. Benefits Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarized in the full job offer. Control Risks supports hybrid working arrangements, wherever possible, that emphasize the value of in-person time together - in the office and with our clients - while continuing to support flexible and remote working. Medical Benefits, Prescription Benefits, FSA, Dental Benefits, Vision Benefits, Life and AD&D, Voluntary Life and AD&D, Disability Benefits, Voluntary Benefits, 401 (K) Retirement, Nationwide Pet Insurance, Employee Assistance Program. As an equal opportunities employer, we encourage suitably qualified applicants from a wide range of backgrounds to apply and join us and are fully committed to equal treatment, free from discrimination, of all candidates throughout our recruitment process.
$140,000-150,000
Cookie
Cookie Settings
© 2025 Servanan International Pte. Ltd.