What you'll do...
This role requires someone who has a wide breadth of knowledge across the technology stack and is able to work in a dynamic environment, and influence technologist across the globe to solve security issues. Someone with depth of experience in data platforms, cloud and mobile technologies, and experience in code deployment. This role will be filled with someone that likes a challenge, has the ability to research and apply solutions, with a passion for growing the business securely preserving confidentiality, integrity, and availability.
What you'll do:
- Become a member of an elite technical assessment team. Providing leadership across a senior team of Information Security professionals daily to build tools, processes, and a deep understanding of security controls to determine the risk of vulnerabilities across the company.
- Utilize threat intelligence combined with vulnerability information along with company knowledge to prioritize remediation of risks for the enterprise.
- Lead in modeling the security controls deployed across the enterprise from code deployment, platforms, cloud and network determining exposure, prevention, and protection.
- Assess the risk posed across a wide range of technologies, working with solution owners in prioritizing risk, understanding exploitability and impact to the business.
- Develop risk mitigation strategies technical vulnerabilities across the enterprise through deployment solutions, secure coding, access management practices, platform and cloud-based vulnerability prevention mechanisms and strategies.
- Use your knowledge of applicable technology stacks, code development/deployment practices, platform knowledge, and implemented controls to automate risk prioritization and mitigation.
- Partner with technologists and leaders to develop process improvement roadmaps.
What you'll bring:
- A highly experienced career technologist who is well-versed in the technology stack and the security controls found in each level.
- Holds a technology degree with 7+ years or equivalent experience in cybersecurity, infrastructure, networking, risk management, information assurance, information technology, or computer science.
- Eager to explore new platforms and technologies to help the business grow securely.
- Someone who enjoys exercising your experience to develop solutions that will enable better insight of the enterprise, identifying gaps and areas of improvement.
- Naturally inquisitive with a passion for learning and understanding the extensive breadth of technology.
- A quick learner who can partner with other technologists and leaders to deliver solutions securely at the speed of business.
- An advanced working knowledge and experience of security controls in virtual and non-virtual environments
- An innovative, logical, and inquisitive mind with a desire to make a difference.
- Familiarity with regulatory concepts (for example, NIST, SOX, PCI, HIPAA)
- Industry knowledge of vulnerability identification and risk factor analysis (Physical, Technical, Governance)
- A curious and continual learning mindset across security technologies, trends, threats, and exploits
- Practical understanding of technical and nontechnical risk response options.
- A passion for global responsibility
- Familiarity with common development and query languages (python, Java, SQL etc.)
- Experience in building and administrating solutions within the tech stack; Development knowledge, CI/CD, libraries, utilities (modern knowledge); strong communications (verbally and written), enjoys a challenge, organized, team player, ability to learn needs to be able to lead and follow and know when to do either.
- Industry certifications such as: (CISSP, CCNA, CISA, CCNP, CCSP, CISM, Security+, GPEN) are a PLUS!
Benefits: Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include 401(k) match, stock purchase plan, paid maternity and parental leave, PTO, multiple health plans, and much more.
The above information has been designed to indicate the general nature and level of work performed in the role. It is not designed to contain or be interpreted as a comprehensive inventory of all responsibilities and qualifications required of employees assigned to this job. The full Job Description can be made available as part of the hiring process.
You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable.
For information about PTO, see
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms.
For information about benefits and eligibility, see
The annual salary range for this position is $110,000.00-$220,000.00 Additional compensation includes annual or quarterly performance bonuses. Additional compensation for certain positions may also include: - Stock
Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 4years’ experience in cybersecurity risk or related area at a technology, retail, or data-driven company. Option 2: 6 years’ experience in cybersecurity risk or related area at a technology, retail, or data-driven company.
Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
805 Se Moberly Ln, Bentonville, AR 72712, United States of America