Expoint – all jobs in one place
Finding the best job has never been easier

Information Security Officer jobs

With Expoint, the dream vaccancy is waiting for you around the corner. Jobs as Information Security Officer, is this the job you are looking for? We definitely have a Information Security Officer job with your name on it.
Company
Job type
Job categories
Job title (1)
United States
State
City
4,926 jobs found
Today
PA

Palo Alto Principal Engineer Software Backend - AI Security Cloud United States, California

Limitless High-tech career opportunities - Expoint
Collaborate with product managers, cybersecurity researchers, AI application researchers and infrastructure software engineers. Design and build an innovative and solid products to ensure our customers can use AI service securely....
Description:

Being the cybersecurity partner of choice, protecting our digital way of life.

Your Impact

  • Collaborate with product managers, cybersecurity researchers, AI application researchers and infrastructure software engineers
  • Design and build an innovative and solid products to ensure our customers can use AI service securely
  • Participate in all phases of the product development cycle, from definition, design, through implementation and test
  • Implement real-time security services to customers
  • Work with PLM on new feature requirement
  • Work with QA and DevOps on new release deployment

Your Experience

  • Solid golang/python programming skills
  • Solid knowledge on HTTP 1.1/HTTP2 protocols and gRPC
  • Profound knowledge on web service proxy technology especially on envoy and web assembly
  • Experience in designing large distributed system and web services in the cloud
  • Deep knowledge in GCP platform is a plus
  • Familiar with major CSP LLM foundation models is a plus
  • The candidate should be a good problem solver
  • Master's degree in computer science or equivalent or equivalent military experience required

We define the industry, instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $0 - $0/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .

All your information will be kept confidential according to EEO guidelines.

Show more
Today
BOA

Bank Of America Credit Officer II - Covered United States, California, San Francisco

Limitless High-tech career opportunities - Expoint
Manages the credit process for a portfolio of clients. Negotiates credit documentation. Leads the credit and risk approval processes. Builds relationships with existing and prospective clients. Mentors and supports associates....
Description:

Job Description:

Job Description:

The Credit Officer II (CO II) is a highly skilled resource, providing expert level advisory guidance in the most complex, integrated debt capital solutions for commercial banking clients. Products include lines of credit, term loans, real estate loans, and syndicated loans. The CO II manages all of the ancillary credit exposure to clients. The CO II maintains knowledge of other BofA products including Investment Banking and Treasury Management that have credit exposure, and leverages product expertise to deliver the best possible and optimally integrated strategic solution for the client or prospect. This role reports to the Commercial Credit Manager or Executive and will be aligned to an Underwriting Team that supports the market.

Responsibilities:

  • Manages the credit process for a portfolio of clients

  • Negotiates credit documentation

  • Leads the credit and risk approval processes

  • Builds relationships with existing and prospective clients

  • Mentors and supports associates

  • Provides capital structure solutions

Skills:

  • Client Solutions Advisory

  • Financial Analysis

  • Loan Structuring

  • Risk Management

  • Underwriting

  • Account Management

  • Credit Documentation Requirements

  • Credit and Risk Assessment

  • Decision Making

  • Issue Management

  • Analytical Thinking

  • Coaching

  • Collaboration

  • Critical Thinking

  • Customer and Client Focus

Required Qualifications:

  • 10+ years of solid Commercial Banking Experience

  • Experience in financial analysis, structuring, underwriting and portfolio management

  • Analytical/technical skills, including financial accounting, modeling and loan structuring

  • Strong communication skills; ability to communicate vertically, horizontally, and externally

  • Industry knowledge across multiple sectors

BA/BS Degree Desired

1st shift (United States of America)

Show more
Today
BOA

Bank Of America Enterprise Lending Officer - San Diego United States, California, San Diego

Limitless High-tech career opportunities - Expoint
Provides exceptional client care by providing advice oriented solutions with Consumer Lending and Core Banking products. Engages in community development, outside sales activities, and external networking to responsibly grow client...
Description:


This job is responsible for providing Consumer Lending advice to new-to-bank clients and external business development. Key responsibilities include applying mortgage lending principles and familiarity of Realtor, Builder, and Community contacts local to the market. Job expectations include having successful track-records of delivering lending services to clients by demonstrating an understanding of credit, lending guidelines, and the mortgage process.
This position is subject to SAFE Act registration requirements. Pursuant to the SAFE Act requirements, all employees engaged in residential loan mortgage originations must register with the federal registry system and remain in good standing. Since this position requires SAFE Act registration, employees are required to register and to submit to the required SAFE Act background check and registration process. Failure to obtain and/or maintain SAFE Act registration may result in disciplinary action up to and including termination.

Responsibilities:

  • Provides exceptional client care by providing advice oriented solutions with Consumer Lending and Core Banking products
  • Engages in community development, outside sales activities, and external networking to responsibly grow client and market share
  • Understands lending processes and credit guidelines to best develop solutions for each client's needs
  • Manages daily client and loan pipelines with astute organization, follow up, and high degree of collaboration with loan fulfillment partners
  • Leverages digital solutions, providing clients with a choice in preferred service pathways
  • Maintains and adheres to all federal and state regulations and bank operational requirements, delivering compliant client advice conversations and fulfilling financial goals

Skills:

  • Business Development
  • Client Management
  • Customer and Client Focus
  • Prospecting
  • Risk Management
  • Account Management
  • Client Solutions Advisory
  • Credit and Risk Assessment
  • Pipeline Management
  • Referral Identification
  • Attention to Detail
  • Credit Documentation Requirements
  • Issue Management
  • Networking
  • Relationship Building


• Has 3+ years of experience in a loan origination role with a focus on generating self-sourced purchase business through a verifiable, established network of referral sources
• Demonstrated understanding of effectively managing a pipeline in order to deliver an exceptional client experience
• Has a strong knowledge of loan products Conventional, Jumbo and Government.
• Demonstrated ability to understand, analyze, and document income, assets and liabilities properly in order to qualify clients for specific loan products
• Demonstrated understanding of processing, underwriting and/or closing procedures
• Has a working knowledge of federal regulations governing real estate lending
• Ability to source clients independently and not rely on enterprise referrals with demonstrated success in generating business from external Centers of Influence real estate professionals, builders, and other external referral partners in a compliant manner as well as within bank policy.
• An ability to work independently
• Is a strong communicator, both written and verbal
• Is self-motivated and highly organized
• Can prioritize multiple competing tasks
• Uses appropriate interpersonal styles, communication methods and approaches to gain clients and keep them informed during the loan process
• Demonstrated understanding of the connection of the level of service provided being directly correlated to driving sales volume
• Can be flexible to work weekends and or extended hours as needed to serve clients
Desired Skills and Experience


• Familiarity with FHA and HUD guidelines
• Strong computer skills including MS applications and previous experience utilizing laptop technology for communication purposes including accessing rate, credit and loan status information
• Solid time management skills and the ability to organize, prioritize and perform multiple tasks simultaneously
• The ability to analyze and comprehend complex financial data and provide financial alternatives
• Professional and effective interpersonal skills
• An ability to take ownership, accountability and can demonstrate integrity
• Adaptability and can demonstrate flexibility
• A positive attitude
• Effective communication styles

The following laws or regulations restrict or prohibit the hiring of individuals with certain specified criminal history for the position Credit Solutions Advisor II: FDIC, Safe Act/Loan Originators

High School Diploma / GED / Secondary School or equivalent

1st shift (United States of America)

Show more
Today
PA

Palo Alto Consulting Director Cloud Security Proactive Services Unit - United States, California

Limitless High-tech career opportunities - Expoint
Serve as a key contributor to the development, maturation, and innovation of Unit 42’s cloud security consulting services. Lead and deliver complex cloud security assessments covering architecture, configuration, identity, monitoring,...
Description:

Being the cybersecurity partner of choice, protecting our digital way of life.

Your Impact

  • Serve as a key contributor to the development, maturation, and innovation of Unit 42’s cloud security consulting services.

  • Lead and deliver complex cloud security assessments covering architecture, configuration, identity, monitoring, and threat detection across AWS, Azure, GCP, and hybrid/multi-cloud environments.

  • Evaluate cloud network architectures, including perimeter protections, VPC/VNet segmentation, API gateways, ingress/egress controls, and cloud-native security services.

  • Analyze cloud logging, telemetry, and monitoring coverage; identify gaps in detection and alerting; and provide actionable recommendations to improve visibility, SIEM/XDR integration, and threat-hunting effectiveness.

  • Assess cloud identity and access management (IAM) design, including federation, least privilege models, role delegation, conditional access, privilege escalation paths, and MFA enforcement across cloud providers.

  • Utilize cloud-native CLIs, SDKs, and APIs to perform deep technical validation of configurations, controls, and security posture.

  • Assess multi-cloud and hybrid-cloud deployments by reviewing interoperability, dependencies, and security impacts between cloud services and on-prem infrastructure.

  • Develop strategic cloud security roadmaps that align technical recommendations with a client’s broader business objectives, resource constraints, and long-term security transformation initiatives.

  • Integrate Palo Alto Networks cloud platforms (Prisma Cloud, Prisma SASE, Cortex XSIAM, and Precision AI) into consulting engagements to drive differentiated value and help customers enhance their security posture.

  • Engage with prospective clients in a pre-sales capacity to uncover cloud security pain points, evaluate architectural weaknesses, and position Unit 42 solutions to key outcomes.

  • Support delivery teams in overcoming technical objections and effectively tying cloud security recommendations to business risk, operational impact, and customer strategic goals.

  • Build and maintain long-term executive relationships, serving as a trusted strategic advisor for cloud security and Zero Trust transformation initiatives.

  • Lead the development and delivery of cloud security enablement content to elevate consulting capabilities across Unit 42.

  • Partner with Palo Alto Networks product development teams to provide structured feedback on features, customer patterns, and cloud security trends that influence the roadmap and delivery experience.

Your Experience

  • 4+ years of experience performing cloud security advisement and risk assessments based upon industry-accepted standards

  • 6+ years of professional services and consulting experience and 3+ years of Director (or and equivalent Senior Manager) experience leading consulting delivery teams is highly preferred

  • Experience managing a diverse team of business and technical consultants

  • Cloud Security-related certifications preferred

  • Hands-on experience with a cloud hosting provider (AWS, Azure, GCP, etc).

  • Deep experience within the cloud native application protection platform (CNAPP) technology or advisory/consulting space.

  • Strong fluency in the application of Virtual Machines, SaaS, IaaS, PaaS, FaaS and other public cloud technical infrastructure concepts.

  • Possess a deep technical knowledge in Cloud Platforms and the dependencies around such an environment (WAF, SSO, Cloud Threats, API Security, Cloud Security Posture Management)

  • Former experience with cloud migrations (cloud to cloud, or on-prem to cloud)

  • Knowledge of the technical nuances related to SD-WAN and SASE solutions and their application to Cloud Environment access solutions.

  • 10+ years in developing, strengthening and expanding client relationships

  • Knowledge of how to integrate command-line interfaces or scripting tools as a part of a risk assessment or remediation in cloud environments is a plus.

  • Rich understanding of how Enterprise’s use and struggle using infrastructure as code and continuous integration tools such as Ansible, Chef, Jenkins, Kubernetes, Packer, Pulumi, Puppet, Saltstack and Terraform or CSP tools such as CloudFormation, Resource Manager or Deployment Manager.

  • Ability to scope new opportunities with prospective clients, including drafting statements of work and proposals

  • Ability to perform travel requirements as needed to meet business demands (on average 25%)

  • Bachelor’s Degree in Information Security, Computer Science, Digital Forensics, Cyber Security OR equivalent years of professional experience to meet job requirements and expectations

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $183000/YR - $252000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .

All your information will be kept confidential according to EEO guidelines.

Show more
Today
PA

Palo Alto Senior Product Marketing Manager - Data Security Platform United States, California

Limitless High-tech career opportunities - Expoint
Apply your data security knowledge to translate product capabilities into simple, compelling messages and tools that resonate with customers, with a clear understanding of the target markets and buyer personas....
Description:

Being the cybersecurity partner of choice, protecting our digital way of life.

Your Career

As a Product Marketing Manager at Palo Alto Networks, you will play a key role in planning and executing the product marketing strategy for our data security offerings. You will be the expert, voice, and go-to-market driver for Palo Alto Networks’ data security capabilities. You will drive positioning, messaging, content creation, and sales enablement for the product line that you are responsible for. You will work closely with stakeholders from product management, sales, field marketing, and technology partners to develop and execute your strategy and advance our mission.

Your Impact

  • Apply your data security knowledge to translate product capabilities into simple, compelling messages and tools that resonate with customers, with a clear understanding of the target markets and buyer personas

  • Work closely with Product Management to build a shared market and product vision, and a cooperative relationship that forms the foundation of all product marketing activities

  • Author compelling, high-quality content, both at a business and a technical level, in a variety of formats including print, web, social media, and video. You like to write and present

  • Launch products and collaborate with field teams to execute marketing campaigns; be a subject matter expert and a go-to resource for the sales and field marketing teams

  • Effectively work at building and executing plans that cross different functional groups, including product management, business development, and sales

  • Represent the company in customer engagements and at events, to evangelize our point of view

  • Track the data security market and competitive landscape in collaboration with product, marketing, and sales leadership

Your Experience

  • 5+ years of product marketing experience ideally with 3+ years in data security or adjacent cybersecurity solutions..

  • An understanding of data security technologies, market trends, competitive landscape, and customer requirements is desirable

  • Outstanding verbal and written communication skills

  • Comfortable with creating and delivering presentations in a range of environments, from industry conferences to customer briefings

  • Demonstrated record of working cross-functionally to drive sales, demand generation, and overall organization and business success

  • Experience and innovative energy to champion successful market and competitive disruption initiatives

  • Bachelor’s degree required, Technical degree or equivalent background or equivalent military experience is desirable

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $131,000 - $212,500/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .

All your information will be kept confidential according to EEO guidelines.

Show more
Today
BOA

Bank Of America Identity Access management IAM Mainframe Security United States, Massachusetts, Boston

Limitless High-tech career opportunities - Expoint
Implement and maintain security administration and access policies using RACF, ACF2, or Top Secret. Enforce least privilege and role-based access control (RBAC). Ensure multi-factor authentication for privileged users. Ensure that...
Description:

LOB Overview:

Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.

Role Description:

The Mainframe Security Administration Manager leads a team of analysts responsible for managing secure access to mainframe systems. This role requires a blend of technical acumen in mainframe security mechanisms (RACF, ACF2, Top Secret), strong governance expertise including knowledge of industry standards, and leadership of team members as a key stakeholder within Information Security and the broader IT organization.

Access Control Management

  • Implement and maintain security administration and access policies using RACF, ACF2, or Top Secret.

  • Enforce least privilege and role-based access control (RBAC).

  • Ensure multi-factor authentication for privileged users.

  • Ensure that privileged access and encryption policies are enforced.

Compliance & Auditing

  • Align security administration and access controls with regulatory frameworks (SOX, UCAL and PWC applications).

  • Maintain detailed logs and audit trails for all access request and administrators provisioning activities.

  • Utilize tools such as Vanguard Resource Administrator (VRA) for forensic analysis and Report Analyzer for reporting.

Security Governance

  • Monitor for unauthorized access and potential data leakage.

  • Conduct regular access reviews and security assessments.

  • Integrate with Identity and Access Management (IAM) systems for centralized governance.

Team Management

  • Lead and mentor a team of mainframe security analysts.

  • Ensure team proficiency in RACF, Top Secret, and z/OS environments, including by participating in learning opportunities and communicating with vendors

  • Promote automation of repetitive provisioning tasks to enhance efficiency.

  • Oversee ticketing systems integrated with IAM workflows for request tracking, Quality Assurance validation for efficiency and remediation.

Training & Development

  • Provide ongoing training on evolving security threats and compliance requirements, process changes.

  • Set Global Information Security goals and encourage professional certifications (e.g., CISSP, Certified RACF and Vanguard Specialist).

Operational Best Practices

  • Ensure 24/7 monitoring of access provisioning activities.

  • Establish and maintain incident response protocols for access-related events.

  • Design scalable provisioning processes to support organizational growth.

Required Qualifications:

  • 10+ years of progressive experience in Identity and Access Management, with a strong focus on access provisioning across enterprise environments.

  • 10+ Years of experience in RACF, ACF2 and zOS systems

  • Drives Mainframe Modernization and work in close partnership with the CTO Mainframe team to provide SME security leadership.

  • Deep technical expertise in Mainframe RACF, Vanguard and Microsoft Azure AWS, Databases DB2 and VMSecure and enterprise storage platforms.

  • Proven ability to design, implement, and manage access provisioning solutions that enforce least privileged access and align with regulatory and internal compliance requirements.

  • Strong understanding of IAM governance frameworks, platforms (e.g., ForgeRock Single Sign- On SSO, Adaptive Authentication) role-based access control (RBAC), group policy management, and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.

  • Experience with automated provisioning/de-provisioning workflows, including integration with HR systems to demonstrated proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.

  • Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud.

  • Ability to conduct access reviews, entitlement audits, and risk assessments to identify and remediate access-related vulnerabilities.

  • Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.

  • Bachelor’s degree in computer science, Information Security, or a related field; advanced degree or certifications (e.g., CISSP, CISM, Microsoft Certified: Identity and Access Administrator Associate) preferred.

  • BS/BA Engineering degree or equivalent experience

Desired Skills:

  • Understanding or have experience with agile and lean philosophies.

  • Strong critical thinking and problem-solving skills with clear communication

  • Ability to collaborate with different roles to achieve common goals.

  • Ability to think critically and question the status quo.

  • Understand how to identify software security vulnerabilities and recognize and communicate their associated impact to the business.

  • Demonstrate awareness of secure software design principles such as least privilege, defense in depth, or designing secure user interfaces

1st shift (United States of America)

Show more
Today
EY

EY Chief Information Security Officer CISO - US Government & Pu... United States, Virginia, Arlington

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
Description:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Clearance: The ability to obtain and maintain top secret required
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
Limitless High-tech career opportunities - Expoint
Collaborate with product managers, cybersecurity researchers, AI application researchers and infrastructure software engineers. Design and build an innovative and solid products to ensure our customers can use AI service securely....
Description:

Being the cybersecurity partner of choice, protecting our digital way of life.

Your Impact

  • Collaborate with product managers, cybersecurity researchers, AI application researchers and infrastructure software engineers
  • Design and build an innovative and solid products to ensure our customers can use AI service securely
  • Participate in all phases of the product development cycle, from definition, design, through implementation and test
  • Implement real-time security services to customers
  • Work with PLM on new feature requirement
  • Work with QA and DevOps on new release deployment

Your Experience

  • Solid golang/python programming skills
  • Solid knowledge on HTTP 1.1/HTTP2 protocols and gRPC
  • Profound knowledge on web service proxy technology especially on envoy and web assembly
  • Experience in designing large distributed system and web services in the cloud
  • Deep knowledge in GCP platform is a plus
  • Familiar with major CSP LLM foundation models is a plus
  • The candidate should be a good problem solver
  • Master's degree in computer science or equivalent or equivalent military experience required

We define the industry, instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.

Compensation Disclosure

The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $0 - $0/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .

All your information will be kept confidential according to EEO guidelines.

Show more
As an Information Security Officer at Expoint, you will play a central role in the protection of Expoint’s digital assets and information systems. You will be responsible for designing, implementing and managing data security procedures, such as enforcing user access controls and maintaining data encryption standards. You will also develop security policies and procedures that support organizational objectives and comply with regulatory requirements. Your main responsibility will be to ensure the safe and secure use of Expoint’s networks and systems. You will monitor security systems and networks for suspicious activity, and implement changes to existing policies and procedures to ensure the highest levels of security are maintained. You will need to be able to quickly identify and alert the correct authorities to potential security risks. Furthermore, you will provide technical advice to other departments on security measures such as password security, risk assessment, encryption, malware protection, and firewalls. You will also manage the implementation and enforcement of updates to security controls. You should have strong networking, security and system engineering skills, and possess a thorough knowledge of data privacy regulations and industry best practices. An IT-related bachelor’s degree or equivalent experience is required. Additionally, you should have excellent problem-solving and communication skills to effectively collaborate with colleagues. If you are interested in making a lasting impact in the tech industry through Expoint’s Information Security Officer role, we invite you to apply today. Help us ensure the security of our system and make our platform a safe, secure, and reliable place for tech professionals.