All active SOC Analyst roles based in United States.
Pick a job to read the details
Tap any role on the left — its description and apply link will open here.
Share this job
About CGC
CGC is a nonprofit investment firm that finances and originates clean energy, water, and resilient infrastructure projects to accelerate clean air, clean water, and affordable energy for communities across America.
We collaborate with the public and private sectors to bridge financing gaps and mobilize private capital into projects that deliver measurable economic and environmental impact at scale. Every dollar we invest is structured to multiply, generating durable returns for people, markets, and the environment.
Over the past decade, CGC has demonstrated the power of public-private investment by helping catalyze economic accelerators nationwide and mobilizing billions of dollars toward affordable clean energy and resilient infrastructure. Our model fills market gaps, unlocks private capital, and proves that economic growth and environmental progress can advance together.
A Career at CGC
A career at the CGC is grounded in impact. Our six core values guide how we invest and how we work together.
Innovation drives creative solutions and continuous improvement.
Mission-Driven Focus keeps long-term impact at the center of every decision.
Partnership shapes how we mobilize capital and build trust-based relationships.
Accountability defines our stewardship and commitment to results.
Collaboration strengthens cross-functional teamwork and shared responsibility.
Transparency ensures open communication and integrity in how we operate.
Our culture is fast-paced, rigorous, and purpose-driven. If you are motivated by solving complex challenges, building new markets, and delivering measurable impact within a collaborative team, CGC offers a platform to do that work with purpose.
Job Summary
Under the supervision of the Vice President of Information Technology, the Senior Analyst, Technology Governance & Controls is responsible for strengthening CGC’s enterprise technology governance framework, internal control environment, and operational risk posture. This role helps ensure that technology-related processes, system access models, vendor relationships, documentation standards, and change practices align with organizational expectations for accountability, audit readiness, and institutional durability.
The Senior Analyst serves as a key internal resource for access governance, control evidence management, policy administration, risk tracking, vendor oversight support, continuity planning coordination, and governance reporting. This position translates governance expectations into practical, repeatable operating disciplines that support secure and efficient business execution.
This role is well suited for a proactive professional who can operate effectively in a growing and evolving organization, bring structure where processes continue to mature, and execute with sound judgment, discretion, and a high degree of ownership. Success in this position requires collaboration, professionalism, strong written communication, and the ability to improve how work gets done through practical use of automation, AI tools, and modern workflow capabilities. This role is central to CGC's enterprise governance maturity, maintaining the frameworks, processes, and controls that allow IT systems, data, and vendors to operate with accountability and discipline.
Key Responsibilities
Required Skills and Abilities
Education and Experience
Compensation and Benefits
CGC is an Equal Opportunity Employer committed to building an inclusive workplace and advancing equitable economic and environmental outcomes nationwide.
We consider all qualified applicants without regard to race, color, religion, sex, national origin, age, disability, veteran status, or any other protected characteristic.
Ready to apply?
Apply to CGC
Share this job
About IonQ:
IonQ, Inc. [NYSE: IONQ] is the world’s leading quantum platform and merchant supplier - delivering integrated quantum solutions across computing, networking, sensing, and security. IonQ’s newest generation of quantum computers, the IonQ Tempo, is the latest in a line of cutting-edge systems that have been helping customers and partners including Amazon Web Services, and AstraZeneca achieve 20x performance results and accelerate innovation in drug discovery, materials science, financial modeling, logistics, cybersecurity, and defense. In 2025, the company achieved 99.99% two-qubit gate fidelity, setting a world record in quantum computing performance.
Headquartered in College Park, Maryland, IonQ has operations in California, Colorado, Massachusetts, Tennessee, Washington, Italy, South Korea, Sweden, Switzerland, Canada, and the United Kingdom. Our quantum computing services are available through all major cloud providers, while we also meet the needs of networking and sensing customers across land, sea, air, and space. IonQ is making quantum platforms more accessible and impactful than ever before.
This Senior IAM Engineer will own the Okta for Government High (FedRAMP High) tenant, which serves as the enterprise Identity Provider and Identity Governance platform for a 1,500+ user organization. The role is the primary technical resource responsible for the build, enhancement, and operation of key functions, including SSO integrations, Identity Governance (OIG), Lifecycle Management, Workflows automation, and Adaptive MFA policy.
In the first three months, you will help develop the core program documentation and workflows. You will collaborate with external teams like IT, Legal and People to integrate into company processes. You will work with our technical security experts to build Identity and Access management processes and procedures.
Responsibilities
Requirements:
Compliance Requirements: this role will be subject to US Federal regulations, therefore:
Preferred Qualifications:
The approximate base salary range for this position is $126,887 - $166,127. The total compensation package includes base, bonus, equity, and a range of benefit options found on our career site.
Location: This role is based out of our College Park, Boulder, CO, or Bothell, WA offices, or can be remote in the US.
Travel: Up to 1 week per quarter
Job ID: 1460
Compensation will vary based on individual factors such as education, qualifications, and experience of the final candidate(s), specific office location, and calibration against relevant market data and internal team equity. Posted base salary figures are subject to change as new market data becomes available. Our benefits include comprehensive medical, dental, and vision plans, matching 401K, unlimited PTO and paid holidays, parental/adoption leave, legal insurance, and a home technology stipend. Details of participation in these benefit plans will be provided when a candidate receives an offer of employment.
At IonQ, we believe in fair treatment, access, opportunity, and advancement for all while striving to identify and eliminate barriers. We empower employees to thrive by fostering a culture of autonomy, productivity, and respect. We are dedicated to creating an environment where individuals can feel welcomed, respected, supported, and valued.
We are committed to equity and justice. We welcome different voices and viewpoints and do not discriminate on the basis of race, religion, ancestry, physical and/or mental disability, medical condition, genetic information, marital status, sex, gender, gender identity, gender expression, transgender status, age, sexual orientation, military or veteran status, or any other basis protected by law. We are proud to be an Equal Employment Opportunity employer.
US Technical Jobs. The position you are applying for will require access to technology that is subject to U.S. export control and government contract restrictions. Employment with IonQ is contingent on either verifying “U.S. Person” (e.g., U.S. citizen, U.S. national, U.S. permanent resident, or lawfully admitted into the U.S. as a refugee or granted asylum) status for export controls and government contracts work, obtaining any necessary license, and/or confirming the availability of a license exception under U.S. export controls. Please note that in the absence of confirming you are a U.S. Person for export control and government contracts work purposes, IonQ may choose not to apply for a license or decline to use a license exception (if available) for you to access export-controlled technology that may require authorization, and similarly, you may not qualify for government contracts work that requires U.S. Persons, and IonQ may decline to proceed with your application on those bases alone. Accordingly, we will have some additional questions regarding your immigration status that will be used for export control and compliance purposes, and the answers will be reviewed by compliance personnel to ensure compliance with federal law.
US Non-Technical Jobs. Due to applicable export control laws and regulations, candidates must be a U.S. citizen or national, U.S. permanent resident (i.e., current Green Card holder), or lawfully admitted into the U.S. as a refugee or granted asylum. Accordingly, we will have some additional questions regarding your immigration status that will be used for export control and compliance purposes, and the answers will be reviewed by compliance personnel to ensure compliance with federal law.
If you are interested in being a part of our team and mission, we encourage you to apply!
Ready to apply?
Apply to IonQ
BitGo is the leading infrastructure provider of digital asset solutions, delivering custody, wallets, staking, trading, financing, and settlement services from regulated cold storage. Since our founding in 2013, we have focused on enabling our clients to securely navigate the digital asset space. With a global presence and multiple Trust companies, BitGo serves thousands of institutions, including many of the industry's top brands, exchanges, and platforms, and millions of retail investors worldwide. As the operational backbone of the digital economy, BitGo handles a significant portion of Bitcoin network transactions and is the largest independent digital asset custodian, and staking provider, in the world. For more information, visit www.bitgo.com.
We are looking for a versatile SOC analyst to join the team and write, tune and respond to alerts covering the entire environment from endpoints to cloud infrastructure. This exciting opportunity empowers you to ensure the right alerts come in and you don’t burn out on false positives. We are a forward thinking organization that leverages AI. Your work would take place during regular business hours. Weekend coverage will be necessary. From time to time evenings as well. The expectation is that we build for 24x7 coverage but you will be asked to step in to assist the team.
Responsibilities:
Qualifications:
If you are interested in this opportunity, please apply with your resume and cover letter. We are an equal opportunity employer and welcome all qualified candidates to apply.
Why Join BitGo?
Disrupting an industry takes vision, innovation, passion, technical chops, drive to deliver, collaboration, and execution. Join a team of great people who strive for excellence and personify our corporate values of ownership, craftsmanship, and open communication. We are looking for new colleagues who bring innovative ways of thinking and problem solving, and who want risks to be part of the team that changes the world’s financial markets.
Here are some of the benefits* of working at BitGo:
Cryptocurrencies are the most disruptive change the financial services industry has seen in years. Join us and you’ll be able to look back and say you were part of the team that transformed investing.
Pay Transparency Notice: Depending upon your leveling and location, the compensation for this role averages between $115,000 - $145,000 USD base salary. Equity, an annual performance bonus and the benefits outlined below are also a part of this role's package.
Ready to apply?
Apply to BitGo
BitGo is the leading infrastructure provider of digital asset solutions, delivering custody, wallets, staking, trading, financing, and settlement services from regulated cold storage. Since our founding in 2013, we have focused on enabling our clients to securely navigate the digital asset space. With a global presence and multiple Trust companies, BitGo serves thousands of institutions, including many of the industry's top brands, exchanges, and platforms, and millions of retail investors worldwide. As the operational backbone of the digital economy, BitGo handles a significant portion of Bitcoin network transactions and is the largest independent digital asset custodian, and staking provider, in the world. For more information, visit www.bitgo.com.
We are looking for a versatile SOC analyst to join the team and write, tune and respond to alerts covering the entire environment from endpoints to cloud infrastructure. This exciting opportunity empowers you to ensure the right alerts come in and you don’t burn out on false positives. We are a forward thinking organization that leverages AI. Your work would take place during regular business hours. Weekend coverage will be necessary. From time to time evenings as well. The expectation is that we build for 24x7 coverage but you will be asked to step in to assist the team.
Responsibilities:
Qualifications:
If you are interested in this opportunity, please apply with your resume and cover letter. We are an equal opportunity employer and welcome all qualified candidates to apply.
Why Join BitGo?
Disrupting an industry takes vision, innovation, passion, technical chops, drive to deliver, collaboration, and execution. Join a team of great people who strive for excellence and personify our corporate values of ownership, craftsmanship, and open communication. We are looking for new colleagues who bring innovative ways of thinking and problem solving, and who want risks to be part of the team that changes the world’s financial markets.
Here are some of the benefits* of working at BitGo:
Cryptocurrencies are the most disruptive change the financial services industry has seen in years. Join us and you’ll be able to look back and say you were part of the team that transformed investing.
Pay Transparency Notice: Depending upon your leveling and location, the compensation for this role averages between $115,000 - $145,000 USD base salary. Equity, an annual performance bonus and the benefits outlined below are also a part of this role's package.
Ready to apply?
Apply to BitGo
Share this job
The Compliance team at MongoDB manages the strategy, execution, and maintenance of our global security certifications and regulatory requirements. We ensure that our cloud database products meet the rigorous security standards required by our customers in the most highly regulated industries worldwide.
We act as the primary interface between external auditors and our internal Product, Engineering, and Legal teams. Our goal is to translate complex regulatory requirements into scalable operational processes, maintaining a compliant and audit-ready posture across our diverse portfolio.
The Program Manager / Senior Analyst is a mid-to-senior level individual contributor role responsible for leading high-stakes audits and specialized compliance workstreams. Unlike the Analyst level, this role takes full ownership of complex international frameworks—such as IRAP and ENS High—and manages the relationship with our Financial Services customers during audit deep-dives. You will lead internal audit cadences and perform gap analyses for new market expansions.
MongoDB is built for change, empowering our customers and our people to innovate at the speed of the market. We have redefined the database for the AI era, enabling innovators to create, transform, and disrupt industries with software. MongoDB’s unified database platform, the most widely available, globally distributed database on the market, helps organizations modernize legacy workloads, embrace innovation, and unleash AI. Our cloud-native platform, MongoDB Atlas, is the only globally distributed, multi-cloud database and is available across AWS, Google Cloud, and Microsoft Azure.
With offices worldwide and over 60,000 customers, including 75% of the Fortune 100 and AI-native startups, relying on MongoDB for their most important applications, we’re powering the next era of software.
Our compass at MongoDB is our Leadership Commitment, guiding how and why we make decisions, show up for each other, and win. It’s what makes us MongoDB.
To drive the personal growth and business impact of our employees, we’re committed to developing a supportive and enriching culture for everyone. From employee affinity groups, to fertility assistance and a generous parental leave policy, we value our employees’ wellbeing and want to support them along every step of their professional and personal journeys. Learn more about what it’s like to work at MongoDB, and help us make an impact on the world!
MongoDB is committed to providing any necessary accommodations for individuals with disabilities within our application and interview process. To request an accommodation due to a disability, please inform your recruiter.
MongoDB, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type and makes all hiring decisions without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
REQ ID: 1273402295
MongoDB’s base salary range for this role is posted below. Compensation at the time of offer is unique to each candidate and based on a variety of factors such as skill set, experience, qualifications, and work location. Salary is one part of MongoDB’s total compensation and benefits package. Other benefits for eligible employees may include: equity, participation in the employee stock purchase program, flexible paid time off, 20 weeks fully-paid gender-neutral parental leave, fertility and adoption assistance, 401(k) plan, mental health counseling, access to transgender-inclusive health insurance coverage, and health benefits offerings. Please note, the base salary range listed below and the benefits in this paragraph are only applicable to U.S.-based candidates.
Ready to apply?
Apply to MongoDB
The Information Security Risk Analyst is the operational engine of the internal risk program. While the Senior IRM Analyst and Risk Director define the strategic roadmap, the Analyst ensures the daily execution of that strategy. They are responsible for the "production line" of risk assessment: taking raw signals from the business, processing them through the established methodology, and outputting actionable risk decisions (Remediation or Acceptance).
The ultimate objective of this role is Reduction of Uncertainty. By managing the program effectively, the IRM Analyst ensures that MongoDB’s leadership has a clear, quantified view of the top risks facing the enterprise. They transform the Risk Register from a static spreadsheet into a dynamic governance tool that drives accountability.
The IRM Analyst must not be afraid to be in the trenches with the Engineering and Product teams. They are the primary face of the "Risk Intake Process," guiding stakeholders through the methodology. They are the gatekeeper of quality, ensuring that no risk enters the register until it has been properly scoped and quantified.
Experience & Education:
MongoDB is built for change, empowering our customers and our people to innovate at the speed of the market. We have redefined the database for the AI era, enabling innovators to create, transform, and disrupt industries with software. MongoDB’s unified database platform, the most widely available, globally distributed database on the market, helps organizations modernize legacy workloads, embrace innovation, and unleash AI. Our cloud-native platform, MongoDB Atlas, is the only globally distributed, multi-cloud database and is available across AWS, Google Cloud, and Microsoft Azure.
With offices worldwide and over 60,000 customers, including 75% of the Fortune 100 and AI-native startups, relying on MongoDB for their most important applications, we’re powering the next era of software.
Our compass at MongoDB is our Leadership Commitment, guiding how and why we make decisions, show up for each other, and win. It’s what makes us MongoDB.
To drive the personal growth and business impact of our employees, we’re committed to developing a supportive and enriching culture for everyone. From employee affinity groups, to fertility assistance and a generous parental leave policy, we value our employees’ wellbeing and want to support them along every step of their professional and personal journeys. Learn more about what it’s like to work at MongoDB, and help us make an impact on the world!
MongoDB is committed to providing any necessary accommodations for individuals with disabilities within our application and interview process. To request an accommodation due to a disability, please inform your recruiter.
MongoDB, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type and makes all hiring decisions without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
Req ID: 1273425625
MongoDB’s base salary range for this role is posted below. Compensation at the time of offer is unique to each candidate and based on a variety of factors such as skill set, experience, qualifications, and work location. Salary is one part of MongoDB’s total compensation and benefits package. Other benefits for eligible employees may include: equity, participation in the employee stock purchase program, flexible paid time off, 20 weeks fully-paid gender-neutral parental leave, fertility and adoption assistance, 401(k) plan, mental health counseling, access to transgender-inclusive health insurance coverage, and health benefits offerings. Please note, the base salary range listed below and the benefits in this paragraph are only applicable to U.S.-based candidates.
Ready to apply?
Apply to MongoDB
The Information Security Risk Team at MongoDB is the operational engine of the internal and third-party risk programs. Situated within the Assurance, Risk, and Compliance (ARC) organization, the team is responsible for the "Reduction of Uncertainty" across the enterprise. We view this team as the "Operational Commander" of the risk function. The team oversees the entire lifecycle of risk identification, assessment, and treatment, ensuring that MongoDB’s leadership has a clear, quantified view of the top risks facing the organization. We are not just a compliance function; we are a "Risk Intelligence" unit that empowers the business to "Think Big" while keeping our eyes wide open to the risks we accept.
As the Senior Information Risk Analyst, you will serve as the subject matter expert and primary executor of our risk function. Reporting directly to the Risk Director, you will be responsible for conducting and owning the lifecycle of internal security assessments (annual + ad-hoc), applying risk methodology, producing risk memos and working with asset/risk owners across the business that powers MongoDB’s growth. This is a pivotal moment for our Risk function as we scale operations to meet the demands of a $100B+ database market while navigating an increasingly rigorous regulatory landscape (DORA, FedRAMP, NIS2).
This role can be based remotely in the United States.
Program Maturity
Operational Execution
Monitoring and Reporting
About MongoDB
MongoDB is built for change, empowering our customers and our people to innovate at the speed of the market. We have redefined the database for the AI era, enabling innovators to create, transform, and disrupt industries with software. MongoDB’s unified database platform, the most widely available, globally distributed database on the market, helps organizations modernize legacy workloads, embrace innovation, and unleash AI. Our cloud-native platform, MongoDB Atlas, is the only globally distributed, multi-cloud database and is available across AWS, Google Cloud, and Microsoft Azure.
With offices worldwide and over 60,000 customers, including 75% of the Fortune 100 and AI-native startups, relying on MongoDB for their most important applications, we’re powering the next era of software.
Our compass at MongoDB is our Leadership Commitment, guiding how and why we make decisions, show up for each other, and win. It’s what makes us MongoDB.
To drive the personal growth and business impact of our employees, we’re committed to developing a supportive and enriching culture for everyone. From employee affinity groups, to fertility assistance and a generous parental leave policy, we value our employees’ wellbeing and want to support them along every step of their professional and personal journeys. Learn more about what it’s like to work at MongoDB, and help us make an impact on the world!
MongoDB is committed to providing any necessary accommodations for individuals with disabilities within our application and interview process. To request an accommodation due to a disability, please inform your recruiter.
MongoDB, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type and makes all hiring decisions without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
Req ID: 1273387742
MongoDB’s base salary range for this role is posted below. Compensation at the time of offer is unique to each candidate and based on a variety of factors such as skill set, experience, qualifications, and work location. Salary is one part of MongoDB’s total compensation and benefits package. Other benefits for eligible employees may include: equity, participation in the employee stock purchase program, flexible paid time off, 20 weeks fully-paid gender-neutral parental leave, fertility and adoption assistance, 401(k) plan, mental health counseling, access to transgender-inclusive health insurance coverage, and health benefits offerings. Please note, the base salary range listed below and the benefits in this paragraph are only applicable to U.S.-based candidates.
Ready to apply?
Apply to MongoDB
Share this job
Empower, Innovate, Impact! At Team A-TEK, we EMPOWER people to drive INNOVATION that IMPACTS mission!
A-TEK operates at the intersection of mission and innovation by applying our deep domain expertise across the federal markets. Embracing our digital-first strategy, A-TEK provides enhanced capabilities in application development, digital transformation, enterprise IT, and scientific services. Our solutions are designed to modernize, automate, secure, protect, and enhance the operations of our federal clients, ensuring they stay ahead in a rapidly evolving digital landscape.
Our work is fueled by a passion to serve our clients’ needs and to protect the safety and welfare of Americans. That passion shapes how we nurture our most valuable asset – Our Employees. A-TEK actively cultivates the talent that drives our success and fosters a creative, challenging, and mission-driven work environment for current and future employees.
As the Cybersecurity Analyst Tier 2, you are responsible for overseeing and managing Tier 2 level threat response in our client’s Security Operations Center. Your role involves working with a team of security analysts and engineers who monitor, detect, analyze, and respond to security incidents and threats in an organization's IT environment at the Tier 2 Level. Additionally, you play a critical role in analyzing and resolving cyber threats or escalating incidents for Tier 3 response as necessary. Technical expertise, and a deep understanding of cybersecurity concepts are essential for success in this role. This role is ONSITE in our SOC located in Rockville, MD. US Citizenship is required for consideration.
Role and Responsibilities
Qualifications:
3-5+ years of experience within a Level Tier 2 cybersecurity environment; experience in a leadership role is preferred.
Bachelor’s in information technology, Computer Science, or a related field; or relevant, commensurate work experience
Robust Certification Portfolio including Security+ and one or more of the following preferred: Network+, CEH, Azure or Cloud Certification, and Splunk Core Certified Power User.
Vulnerability/cyber incident management framework
Experience with advanced technologies such as: Splunk SaaS, Splunk Enterprise Security, Splunk SaaS UBA, Crowdstrike, Tenable, Forescout, zScaler, Bigfix, MaaS-360 (IBM MaaS-360), and Encase for forensic investigations, Fireeye, Cortex XSOAR, Cortex XDR, and Prisma-Access
Prior HHS experience a plus
Compensation: The salary range for this position is $115,000 to $120,000 per year based and is based on experience and certifications levels.
Benefits: Health, dental, and vision insurance; 401(k) with employer match; paid time off; professional development opportunities.
#LI-OnSite
Candidates may use tools (including AI) for proofreading or formatting; however, using any tool to fabricate, exaggerate, or misrepresent qualifications, experience, or work product is not permitted. We may assess application materials for job-related technical depth, internal consistency, and demonstrated hands-on experience, including through follow-up questions, skills assessments, or reference checks.
Misrepresentation or falsification may result in removal from further consideration. Candidates who need a reasonable accommodation in the application or interview process may request one.
A-TEK, Inc. is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or status as a qualified individual with a disability, or Vietnam era or other protected Veteran status. Verification of education may be requested before or during the hiring process.
Ready to apply?
Apply to A-TEK Inc.
Share this job
Empower, Innovate, Impact! At Team A-TEK, we EMPOWER people to drive INNOVATION that IMPACTS mission!
A-TEK operates at the intersection of mission and innovation by applying our deep domain expertise across the federal markets. Embracing our digital-first strategy, A-TEK provides enhanced capabilities in application development, digital transformation, enterprise IT, and scientific services. Our solutions are designed to modernize, automate, secure, protect, and enhance the operations of our federal clients, ensuring they stay ahead in a rapidly evolving digital landscape.
Our work is fueled by a passion to serve our clients’ needs and to protect the safety and welfare of Americans. That passion shapes how we nurture our most valuable asset – Our Employees. A-TEK actively cultivates the talent that drives our success and fosters a creative, challenging, and mission-driven work environment for current and future employees.
As the Cybersecurity Analyst Tier 2, you are responsible for overseeing and managing Tier 2 level threat response in our client’s Security Operations Center. Your role involves working with a team of security analysts and engineers who monitor, detect, analyze, and respond to security incidents and threats in an organization's IT environment at the Tier 2 Level. Additionally, you play a critical role in analyzing and resolving cyber threats or escalating incidents for Tier 3 response as necessary. Technical expertise, and a deep understanding of cybersecurity concepts are essential for success in this role. This role is ONSITE in our SOC located in Rockville, MD. US Citizenship is required for consideration.
This role is full-time and requires the ability to work 6 PM to 6 AM on weekends and 2 fixed shifts during the work week.
Role and Responsibilities
Qualifications:
3-5+ years of experience within a Level Tier 2 cybersecurity environment; experience in a leadership role is preferred.
Bachelor’s in information technology, Computer Science, or a related field; or relevant, commensurate work experience
Robust Certification Portfolio including Security+ and one or more of the following preferred: Network+, CEH, Azure or Cloud Certification, and Splunk Core Certified Power User.
Vulnerability/cyber incident management framework
Experience with advanced technologies such as: Splunk SaaS, Splunk Enterprise Security, Splunk SaaS UBA, Crowdstrike, Tenable, Forescout, zScaler, Bigfix, MaaS-360 (IBM MaaS-360), and Encase for forensic investigations, Fireeye, Cortex XSOAR, Cortex XDR, and Prisma-Access
Prior HHS experience a plus
Compensation: The salary range for this position is $115,000 to $120,000 per year based and is based on experience and certifications levels.
Benefits: Health, dental, and vision insurance; 401(k) with employer match; paid time off; professional development opportunities.
#LI-OnSite
Candidates may use tools (including AI) for proofreading or formatting; however, using any tool to fabricate, exaggerate, or misrepresent qualifications, experience, or work product is not permitted. We may assess application materials for job-related technical depth, internal consistency, and demonstrated hands-on experience, including through follow-up questions, skills assessments, or reference checks.
Misrepresentation or falsification may result in removal from further consideration. Candidates who need a reasonable accommodation in the application or interview process may request one.
A-TEK, Inc. is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or status as a qualified individual with a disability, or Vietnam era or other protected Veteran status. Verification of education may be requested before or during the hiring process.
Ready to apply?
Apply to A-TEK Inc.
Share this job
Empower, Innovate, Impact! At Team A-TEK, we EMPOWER people to drive INNOVATION that IMPACTS mission!
A-TEK operates at the intersection of mission and innovation by applying our deep domain expertise across the federal markets. Embracing our digital-first strategy, A-TEK provides enhanced capabilities in application development, digital transformation, enterprise IT, and scientific services. Our solutions are designed to modernize, automate, secure, protect, and enhance the operations of our federal clients, ensuring they stay ahead in a rapidly evolving digital landscape.
Our work is fueled by a passion to serve our clients’ needs and to protect the safety and welfare of Americans. That passion shapes how we nurture our most valuable asset – Our Employees. A-TEK actively cultivates the talent that drives our success and fosters a creative, challenging, and mission-driven work environment for current and future employees.
As the Cybersecurity Analyst Tier 3, you are responsible for overseeing and managing the daily activities of the Security Operations Center for our federal customer. Your role involves helping to lead a team of security analysts and engineers who monitor, detect, analyze, and respond to security incidents and threats in an organization's IT environment. As a Cybersecurity Analyst T3, you play a critical role in safeguarding the organization's assets, data, and reputation from cyber threats. Leadership skills, technical expertise, and a deep understanding of cybersecurity concepts are essential for success in this role. The physical worksite for this position is located in Rockville, MD. This position requires that ability to obtain and retain a public trust level security clearance. An active CISSP, CISM, or CISA is required for consideration for this position. US Citizenship is required for this role.
Role and Responsibilities
Qualifications:
Preferred Skills and Experience:
Compensation: The salary range for this position is $130,000 to $140,000 per year based and is based on experience and certifications levels.
Benefits: Health, dental, and vision insurance; 401(k) with employer match; paid time off; professional development opportunities.
#LI-OnSite
Candidates may use tools (including AI) for proofreading or formatting; however, using any tool to fabricate, exaggerate, or misrepresent qualifications, experience, or work product is not permitted. We may assess application materials for job-related technical depth, internal consistency, and demonstrated hands-on experience, including through follow-up questions, skills assessments, or reference checks.
Misrepresentation or falsification may result in removal from further consideration. Candidates who need a reasonable accommodation in the application or interview process may request one.
A-TEK, Inc. is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or status as a qualified individual with a disability, or Vietnam era or other protected Veteran status. Verification of education may be requested before or during the hiring process.
Ready to apply?
Apply to A-TEK Inc.
Share this job
Every day, tens of millions of people come to Roblox to explore, create, play, learn, and connect with friends in 3D immersive digital experiences– all created by our global community of developers and creators.
At Roblox, we’re building the tools and platform that empower our community to bring any experience that they can imagine to life. Our vision is to reimagine the way people come together, from anywhere in the world, and on any device. We’re on a mission to connect a billion people with optimism and civility, and looking for amazing talent to help us get there.
A career at Roblox means you’ll be working to shape the future of human interaction, solving unique technical challenges at scale, and helping to create safer, more civil shared experiences for everyone.
This training program is designed to provide a transitioning service member with a comprehensive, hands-on experience in a civilian Security Operations Center. The program will leverage the fellow’s existing military cybersecurity knowledge and translate it to commercial tools, processes, and a corporate environment.
The goal is for the fellow to become a qualified Tier 2 SOC Analyst or Information Security Engineer, capable of in-depth incident investigation, threat hunting, and contributing to overall security posture of the organization and the workforce.
You Will:
You Are:
During SkillBridge participation, Service members continue to receive military compensation and remain covered by their military benefits. You can find more information here.
You may redact age, date of birth, and dates of attendance/graduation from your resume if you prefer.
Roles that are based in an office are onsite Tuesday, Wednesday, and Thursday, with optional presence on Monday and Friday (unless otherwise noted).
Roblox provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. Roblox also provides reasonable accommodations to candidates with qualifying disabilities or religious beliefs during the recruiting process.
For US based roles only, please note the Company may not be able to employ candidates for this role who have United States work authorization related to certain U.S. visa categories, or support future H-1B sponsorship at this time.
Ready to apply?
Apply to Roblox

At Thoropass, we’re redefining how modern companies achieve and maintain compliance. As the audit-first compliance partner, we pair deep audit expertise with advanced technology to deliver unmatched accuracy, efficiency, and confidence at every stage of the compliance journey.
Our mission is to raise the bar for the industry—helping organizations not only meet requirements but demonstrate trust as a competitive advantage. We believe compliance done right enables innovation, accelerates growth, and protects what matters most.
Joining Thoropass means working alongside auditors, engineers, and compliance experts who are setting a new standard for how compliance and audit should work—collaborative, transparent, and built for the real world. Together, we’re shaping the future of enterprise-grade compliance.
These are the behaviors and skills we look for in our people. Living by these values ensures we are building a team that can grow together and deliver the best possible outcomes for each other and our customers.
Thoropass is the audit-first compliance partner for growing and enterprise organizations that expect more from their compliance programs. We combine deep audit expertise with advanced technology to help customers achieve, maintain, and scale compliance with precision and confidence.
Through our integrated platform, customers can manage compliance programs, complete audits, and access complementary services like penetration testing—all supported by our in-house audit firm and team of security and compliance experts.
From SOC 2 and ISO 27001 to PCI, HIPAA, and HITRUST, we deliver high-quality audits and continuous compliance management that scales with our customers’ growth. Our audit-first approach ensures every engagement meets the highest standards of accuracy, independence, and efficiency—whether you’re a scaling SaaS company or an enterprise expanding globally.
Founded in 2019 and headquartered in New York, Thoropass is backed by leading investors including J.P. Morgan, PayPal Ventures, Fin Capital, Centana, Canapi, and Bain Capital. With a global team across 18+ countries, we’re building the future of compliance—one audit at a time.
About the Role
The Director of Product Marketing is a key leadership role responsible for driving the development and execution of product marketing and customer evangelism strategies that fuel the company’s growth. At the core of this role is the mandate to unblock and elevate the story that CISOs and security leaders care about—crystallizing Thoropass’s value proposition in a way that sales can confidently deliver and that translates into measurable improvements in win rates.
You’ll be our expert at the intersection of the industry, competition, and our customers. Your goal is to be a catalyst for all GTM teams—marketing, sales, partners—equipping them with a powerful, repeatable narrative rooted in buyer needs, especially those of CISOs. You will report to the VP of Marketing and immediately manage one direct report, with the opportunity to grow your team. You’ll lead cross-functional projects that drive product awareness, internal enablement, and customer engagement.
We love collaborating and seeing each other succeed—teamwork is everything. We set clear expectations through quarterly OKRs and align our goals to company-level revenue targets. We’re a data-driven team with visibility into performance. In partnership with the VP of Marketing, you will develop quarterly plans and annual strategies, recommending the budget, channels, and resources needed to drive product awareness, adoption, and a compelling CISO-ready narrative that accelerates deal momentum. The marketing team at Thoropass is highly visible across the organization and a core driver of our current and future growth.
Compensation & Benefits
Equal Opportunity
Thoropass provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Even if you feel you don’t meet every requirement, consider applying! Thoropass acknowledges the research which shows that women and people of color are less likely to apply for jobs when they don’t meet all of the stated qualifications. However, we’re looking for authentic innovators to blaze new trails and you just may be the right person for this or another role.
Ready to apply?
Apply to Thoropass
Share this job
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century’s most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril’s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.
Anduril's Detection and Response team is looking for a Security Operations Analyst to be the watchtower for Anduril's critical defense technologies. As a SecOps Analyst on the detection and response team, you'll be responsible for monitoring and responding to adversarial activity while helping incorporate key detection feedback loops with the detection engineering team. As a Senior SecOps Analyst, you will serve as an incident commander alongside other senior analysts. When not responding to threats, you'll be asking questions of our data sets, conducting threat hunting and data normalization operations across the organization to understand user behavior and identify anomalies.
The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations. Highly competitive equity grants are included in the majority of full time offers; and are considered part of Anduril's total compensation package. Additionally, Anduril offers top-tier benefits for full-time employees, including:
At Anduril, we invest in our people. Our comprehensive, competitive benefits package (available at little to no cost to employees) ensures you’re supported in health, recovery, and whatever comes next. For more information, Explore Our Benefits.
Anduril is committed to maintaining the integrity of our Talent acquisition process and the security of our candidates. We've observed a rise in sophisticated phishing and fraudulent schemes where individuals impersonate Anduril representatives, luring job seekers with false interviews or job offers. These scammers often attempt to extract payment or sensitive personal information.
To ensure your safety and help you navigate your job search with confidence, please keep the following critical points in mind:
No Financial Requests: Anduril will never solicit payment or demand personal financial details (such as banking information, credit card numbers, or social security numbers) at any stage of our hiring process. Our legitimate recruitment is entirely free for candidates.
@anduril.com address.Exercise Caution with Unsolicited Outreach: If you receive any communication that appears suspicious, contains grammatical errors, or makes unusual requests, do not engage. Always confirm the sender's email domain is @anduril.com before providing any personal information or clicking on links.
What to Do If You Suspect Fraud: Should you encounter any questionable or fraudulent outreach claiming to be from Anduril, please report it immediately to contact@anduril.com. Your proactive caution is invaluable in protecting your personal information and upholding the security and trustworthiness of our recruitment efforts.
To view Anduril's candidate data privacy policy, please visit https://anduril.com/applicant-privacy-notice/.
By submitting your application, you consent to Anduril Industries using a third-party service provider to conduct pre-employment risk, integrity, and due diligence screening and assessing potential risks as part of your application process. This third-party service provider provides risk-intelligence services that may include analysis of sanctions and watchlists, adverse media, public-record information, and other lawful open-source or commercial data sources. This third-party service provider does not act as a consumer reporting agency. Use of this provider helps to ensure compliance with applicable laws and protect technology, intellectual property, and organizational security.
Ready to apply?
Apply to Anduril Industries
Share this job
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century’s most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril’s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.
Anduril's Detection and Response team is looking for a Security Operations Analyst to be the watchtower for Anduril's critical defense technologies. As a SecOps Analyst on the detection and response team, you'll be responsible for monitoring and responding to adversarial activity while helping incorporate key detection feedback loops with the detection engineering team. As a Senior SecOps Analyst, you will serve as an incident commander alongside other senior analysts. When not responding to threats, you'll be asking questions of our data sets, conducting threat hunting and data normalization operations across the organization to understand user behavior and identify anomalies.
The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations. Highly competitive equity grants are included in the majority of full time offers; and are considered part of Anduril's total compensation package. Additionally, Anduril offers top-tier benefits for full-time employees, including:
At Anduril, we invest in our people. Our comprehensive, competitive benefits package (available at little to no cost to employees) ensures you’re supported in health, recovery, and whatever comes next. For more information, Explore Our Benefits.
Anduril is committed to maintaining the integrity of our Talent acquisition process and the security of our candidates. We've observed a rise in sophisticated phishing and fraudulent schemes where individuals impersonate Anduril representatives, luring job seekers with false interviews or job offers. These scammers often attempt to extract payment or sensitive personal information.
To ensure your safety and help you navigate your job search with confidence, please keep the following critical points in mind:
No Financial Requests: Anduril will never solicit payment or demand personal financial details (such as banking information, credit card numbers, or social security numbers) at any stage of our hiring process. Our legitimate recruitment is entirely free for candidates.
@anduril.com address.Exercise Caution with Unsolicited Outreach: If you receive any communication that appears suspicious, contains grammatical errors, or makes unusual requests, do not engage. Always confirm the sender's email domain is @anduril.com before providing any personal information or clicking on links.
What to Do If You Suspect Fraud: Should you encounter any questionable or fraudulent outreach claiming to be from Anduril, please report it immediately to contact@anduril.com. Your proactive caution is invaluable in protecting your personal information and upholding the security and trustworthiness of our recruitment efforts.
To view Anduril's candidate data privacy policy, please visit https://anduril.com/applicant-privacy-notice/.
By submitting your application, you consent to Anduril Industries using a third-party service provider to conduct pre-employment risk, integrity, and due diligence screening and assessing potential risks as part of your application process. This third-party service provider provides risk-intelligence services that may include analysis of sanctions and watchlists, adverse media, public-record information, and other lawful open-source or commercial data sources. This third-party service provider does not act as a consumer reporting agency. Use of this provider helps to ensure compliance with applicable laws and protect technology, intellectual property, and organizational security.
Ready to apply?
Apply to Anduril Industries
Share this job
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century’s most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril’s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.
Anduril's Detection and Response team is looking for a Security Operations Analyst to be the watchtower for Anduril's critical defense technologies. As a SecOps Analyst on the detection and response team, you'll be responsible for monitoring and responding to adversarial activity while helping incorporate key detection feedback loops with the detection engineering team. As a Senior SecOps Analyst, you will serve as an incident commander alongside other senior analysts. When not responding to threats, you'll be asking questions of our data sets, conducting threat hunting and data normalization operations across the organization to understand user behavior and identify anomalies.
The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations. Highly competitive equity grants are included in the majority of full time offers; and are considered part of Anduril's total compensation package. Additionally, Anduril offers top-tier benefits for full-time employees, including:
At Anduril, we invest in our people. Our comprehensive, competitive benefits package (available at little to no cost to employees) ensures you’re supported in health, recovery, and whatever comes next. For more information, Explore Our Benefits.
Anduril is committed to maintaining the integrity of our Talent acquisition process and the security of our candidates. We've observed a rise in sophisticated phishing and fraudulent schemes where individuals impersonate Anduril representatives, luring job seekers with false interviews or job offers. These scammers often attempt to extract payment or sensitive personal information.
To ensure your safety and help you navigate your job search with confidence, please keep the following critical points in mind:
No Financial Requests: Anduril will never solicit payment or demand personal financial details (such as banking information, credit card numbers, or social security numbers) at any stage of our hiring process. Our legitimate recruitment is entirely free for candidates.
@anduril.com address.Exercise Caution with Unsolicited Outreach: If you receive any communication that appears suspicious, contains grammatical errors, or makes unusual requests, do not engage. Always confirm the sender's email domain is @anduril.com before providing any personal information or clicking on links.
What to Do If You Suspect Fraud: Should you encounter any questionable or fraudulent outreach claiming to be from Anduril, please report it immediately to contact@anduril.com. Your proactive caution is invaluable in protecting your personal information and upholding the security and trustworthiness of our recruitment efforts.
To view Anduril's candidate data privacy policy, please visit https://anduril.com/applicant-privacy-notice/.
By submitting your application, you consent to Anduril Industries using a third-party service provider to conduct pre-employment risk, integrity, and due diligence screening and assessing potential risks as part of your application process. This third-party service provider provides risk-intelligence services that may include analysis of sanctions and watchlists, adverse media, public-record information, and other lawful open-source or commercial data sources. This third-party service provider does not act as a consumer reporting agency. Use of this provider helps to ensure compliance with applicable laws and protect technology, intellectual property, and organizational security.
Ready to apply?
Apply to Anduril Industries
Share this job
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century’s most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril’s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.
Anduril's Detection and Response team is looking for a Security Operations Analyst to be the watchtower for Anduril's critical defense technologies. As a SecOps Analyst on the detection and response team, you'll be responsible for monitoring and responding to adversarial activity while helping incorporate key detection feedback loops with the detection engineering team. As a Senior SecOps Analyst, you will serve as an incident commander alongside other senior analysts. When not responding to threats, you'll be asking questions of our data sets, conducting threat hunting and data normalization operations across the organization to understand user behavior and identify anomalies.
The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations. Highly competitive equity grants are included in the majority of full time offers; and are considered part of Anduril's total compensation package. Additionally, Anduril offers top-tier benefits for full-time employees, including:
At Anduril, we invest in our people. Our comprehensive, competitive benefits package (available at little to no cost to employees) ensures you’re supported in health, recovery, and whatever comes next. For more information, Explore Our Benefits.
Anduril is committed to maintaining the integrity of our Talent acquisition process and the security of our candidates. We've observed a rise in sophisticated phishing and fraudulent schemes where individuals impersonate Anduril representatives, luring job seekers with false interviews or job offers. These scammers often attempt to extract payment or sensitive personal information.
To ensure your safety and help you navigate your job search with confidence, please keep the following critical points in mind:
No Financial Requests: Anduril will never solicit payment or demand personal financial details (such as banking information, credit card numbers, or social security numbers) at any stage of our hiring process. Our legitimate recruitment is entirely free for candidates.
@anduril.com address.Exercise Caution with Unsolicited Outreach: If you receive any communication that appears suspicious, contains grammatical errors, or makes unusual requests, do not engage. Always confirm the sender's email domain is @anduril.com before providing any personal information or clicking on links.
What to Do If You Suspect Fraud: Should you encounter any questionable or fraudulent outreach claiming to be from Anduril, please report it immediately to contact@anduril.com. Your proactive caution is invaluable in protecting your personal information and upholding the security and trustworthiness of our recruitment efforts.
To view Anduril's candidate data privacy policy, please visit https://anduril.com/applicant-privacy-notice/.
By submitting your application, you consent to Anduril Industries using a third-party service provider to conduct pre-employment risk, integrity, and due diligence screening and assessing potential risks as part of your application process. This third-party service provider provides risk-intelligence services that may include analysis of sanctions and watchlists, adverse media, public-record information, and other lawful open-source or commercial data sources. This third-party service provider does not act as a consumer reporting agency. Use of this provider helps to ensure compliance with applicable laws and protect technology, intellectual property, and organizational security.
Ready to apply?
Apply to Anduril Industries
Share this job
Reports to: Senior Director, Adversary Tactics
Location: Remote US
Compensation Range: $200,000.00 to $225,000.00 base plus bonus and equity
What We Do:
Cybercrime is growing, and more businesses are getting hit by threats that used to target only the biggest organizations. That pushes defenders like us to operate at the highest level, and it deepens our need for good people who want to make a meaningful impact.
Founded in 2015 by former NSA cyber operators, Huntress is a remote-first team working to make enterprise-grade cybersecurity accessible to businesses of all sizes. We work closely with security teams and service providers protecting complex environments, often without the time or headcount to handle it all. That’s why we build our technology in-house and back it with a 24/7 human-led Security Operations Center (SOC). As a result, our platform is never disconnected from the experts who manage it, ensuring our customers' protection.
Huntress now secures more than 5M endpoints and 11M identities worldwide. Those numbers keep growing because more businesses rely on us to help carry the load and operate with more confidence. Every day, you can see that commitment in how we stand with our customers and how we show up for each other.
About the Role:
The Huntress Adversary Tactics team has the unique honor to wake up every morning knowing we’re going to make hackers regret targeting our partners and customers. We’re looking for someone who wants to pour their creativity into researching, hunting, and uncovering threats in our customer networks. Competitive candidates have experience building a threat intelligence program utilizing internal and external threat data. Candidates should also have experience creating Threat Intelligence reports, advocating for product enhancements, and public speaking.
Threat Intelligence Analysts aggregate threat data from the previous month and build out reports for our customers. These reports may also be used for marketing and help show the value of what Huntress provides to customers and the community. Threat Intelligence Analysts are also responsible for writing blog posts and marketing materials regarding emerging threat trends. They also work closely with Security and Product Researchers to obtain more context on threat data.
Familiarity with product management, scripting/development, incident response, malware analysis, configuration management, and antivirus technologies is an additional way to differentiate yourself.
As you can imagine, success doesn’t happen in a vacuum. An effective analyst fosters highly collaborative environments between the Product, Marketing, and Security teams to accelerate our mission and secure the 99% of businesses that fall below the enterprise poverty line. This collaboration is needed to produce and prioritize a unified technical vision that ultimately delivers our most impactful features and capabilities.
Are you ready for the challenge?
Responsibilities:
Qualifications:
What We Offer:
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process, but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.
#BI-Remote
Ready to apply?
Apply to HuntressShare this job
Low Earth orbit is open for business. Varda is accelerating the development of commercial space infrastructure, from in-orbit pharmaceutical processing to reliable and economical reentry capsules.
From life-saving pharmaceuticals to more powerful fiber optics, there is a world of products used on Earth today that can only be manufactured in space. Varda is accelerating innovation in the orbital economy by creating both the products and infrastructure needed so space can directly benefit life on Earth. Our mission is to expand the economic bounds of humankind.
Our team is uniquely suited to accomplishing this goal, with leadership and staff comprised of veterans from SpaceX, Blue Origin, major pharmaceutical companies and Silicon Valley. Varda was founded in January 2021 by Will Bruey and Delian Asparouhov with significant backing from world class investors including Khosla Ventures, Lux Capital, Founders Fund, Caffeinated Capital, General Catalyst, and Also Capital.
Varda is headquartered in El Segundo, California, where we have offices and a production facility where our vehicles, equipment, and materials are built, integrated, and tested. Varda also has offices in Washington, DC and Huntsville, AL.
Join Varda, and work to create a bustling in-space ecosystem.
Cybersecurity Analyst
InfoSec Organization • Reports to CISO • On-site
About the Role
We are hiring a Cybersecurity Analyst to own our day-to-day security monitoring function and produce the evidence required to achieve and maintain our cybersecurity certification. This role is the operational core of our cybersecurity organization, responsible for managing alert triage across our cybersecurity tool stack, coordinating with our managed SOC partner, documenting security events, and keeping our monitoring and incident response activities continuously evidenced and ready for review.
This is a hands-on, high-accountability role reporting directly to the CISO. You will work closely with our InfoSec Engineer, Compliance Program Manager, and our managed security operations partner. You will help set up and monitor our security tool stack, which spans endpoint protection, network detection, secure web access, application control, and identity management. You establish the monitoring cadence that keeps our security posture visible and our compliance evidence current.
The Immediate Mission
You will be assisting in getting the organization assessment ready:
What You’ll Own
Security Monitoring and Alert Triage
Incident Response Documentation
Log Management and Audit Evidence
Managed SOC Coordination
Continuous Monitoring and Compliance Platform
Basic Qualifications
Preferred Qualifications
Our current security tool stack and the experience we are looking for:
Compensation
Varda, like all employers, must ensure that its employees working in the United States are lawfully authorized to work in the U.S. Additionally, our employees are exposed to and have access to certain export-controlled items. At present, some of our technology to which employees have access requires a license to be exported to individuals other than “U.S. Persons” as defined in U.S. export regulations. Because our employees are provided access to export-controlled items, our current policy is to only hire “U.S. persons” who are permitted to have access to our technology without an export license.
“US person” means: U.S. citizen, U.S. lawful permanent resident, or protected individual as defined by 8 U.S.C. 1324b(a)(3) (i.e., individual admitted to the U.S. as a refugee or granted asylum in the U.S.)
Learn more about the ITAR here.
Varda Space Industries is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. Candidates and employees are always evaluated based on merit, qualifications, and performance. We will never discriminate on the basis of race, color, gender, national origin, ethnicity, veteran status, disability status, age, sexual orientation, gender identity, martial status, mental or physical disability, or any other legally protected status.
Varda Space Industries, Inc. participates in the U.S. Department of Homeland Security E-Verify program. The E-Verify program is an Internet-based employment eligibility verification system operated by the U.S. Citizenship and Immigration Services. Learn more about the E-Verify program.
E-Verify Notice Right To Work Notice
Ready to apply?
Apply to Varda Space Industries
About Zone & Co:
Zone & Co is on a mission to empower finance professionals to drive strategic growth through seamless, intelligent operations. We build cloud-native software solutions on Oracle NetSuite, automating complex financial processes like billing, accounts payable, reporting, and reconciliation. Our vision is to unlock the full strategic potential of finance by infusing the ERP with the intelligence and automation needed for truly transformative operations. Join our rapidly growing team as we redefine financial efficiency for scaling businesses worldwide.
The Role: We are seeking a meticulous and proactive Security and Privacy Compliance Analyst to help safeguard our organization and our customers' data. Reporting directly to the Director of IT, Security and Compliance, you will play a critical role in maturing our governance, risk, and compliance (GRC) programs. In this position, you will bridge the gap between technical security controls and regulatory requirements, ensuring that Zone & Co's rapidly expanding suite of financial software maintains the highest standards of data protection and privacy.
This role requires a strong foundational knowledge of major security frameworks and privacy regulations, a keen eye for detail in auditing internal processes, and the ability to clearly communicate compliance postures to both internal engineering teams and enterprise customers.
Essential Job Functions:
Responsibilities, Duties, and Tasks:
What You'll Bring (Qualifications and Experience):
At Zone, our benefits are designed to enrich your life beyond the workplace. Recognizing that work is just a fraction of your overall life experience, we are dedicated to providing robust support. As a fully remote company, we prioritize flexibility and balance. Explore our comprehensive list of benefits at Zoneandco.com.
Zone and Co is an Equal Opportunity Employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws. We strongly encourage candidates of all different backgrounds and identities to apply. This is an opportunity for us to bring in a different perspective and we’re eager to further diversify our company. Zone & Co is committed to building an equitable, inclusive, and supportive place for you to do some of the greatest work of your career.
Ready to apply?
Apply to Zone & Co
About the Role:
The GRC Analyst, Federal & Customer Programs is responsible for the hands-on analysis, documentation, and operational execution of the company's security governance, risk, and compliance obligations. This role sits at the intersection of customer contracts, regulatory frameworks, and the company's security control environment — translating external requirements into clear, traceable internal commitments and evaluating how well current capabilities satisfy them. The GRC Analyst reviews incoming contractual security language, maps obligations to applicable frameworks and existing controls, produces compliance matrices and gap analyses, owns the operational risk assessment process, contributes to governance and policy lifecycle activities, and supports audit, assessment, and customer inquiry activities.
A meaningful portion of this role is dedicated to ongoing contract and requirements analysis as new programs are awarded and existing programs evolve. The GRC Analyst serves as the security function's primary reviewer of incoming contractual cybersecurity language and works directly with legal and sourcing on flow-down negotiation and redlines. Candidates who enjoy careful reading of contractual and regulatory text — and who want this to be a substantial part of their day-to-day work — will find this role a strong fit.
This is a detail-oriented, writing-intensive role requiring strong analytical judgment, fluency across multiple compliance frameworks, and the ability to work effectively with legal, sourcing, program management, engineering, and security operations stakeholders.
Key Responsibilities:
Contract & Requirements Analysis
Framework Mapping & Interpretation
Governance, Policy & ISMS Support
Deliverable Writing & Artifact Contribution
Risk Assessment & Treatment
Third-Party & Supply Chain Risk
Audit & Assessment Support
Cross-Functional Collaboration
What Success Looks Like in Year One
Required Qualifications:
Preferred Qualifications:
Spire operates a hybrid work model, and this position will require you to work a minimum of three days per week in the office.
Access to US export-controlled software and/or technology may be required for this role. If needed, Spire will arrange the necessary licenses—this is not something candidates need to have before applying. #LI-DC1
The anticipated base salary range for this position is listed below. Final base salary for this role will be based on the location, skills, experience and qualifications. In addition to base compensation, this role may be eligible for annual equity awards and our employee benefits program, including vacation, sick, and personal time off; optional medical, dental, vision, life, and disability coverage; a 401(K) plan; health and wellness reimbursement program; and participation in Spire’s Employee Stock Purchase Plan.
Global Perks
🛰️ Name Your Satellite Program (NYSP)
🚀 Launch Attendance
🌴 Generous Time Off Policy
🎓 Education Assistance Program
🥰 Employee Assistance Program (EAP)
📈 Employee Stock Purchase Program (ESPP)
👣 Family Leave
💪 Fitness Reimbursement
🧡 Employee Referral Program
🍉 Healthy snacks & beverages in every office
About Spire
We improve life on Earth with data from space.
Spire Global is a space-to-cloud analytics company that owns and operates the largest multi-purpose constellation of satellites. Its proprietary data and algorithms provide the most advanced maritime, aviation, and weather tracking in the world. In addition to its constellation, Spire’s data infrastructure includes a global ground station network and 24/7 operations that provide real-time global coverage of every point on Earth.
Spire is Global and our success draws upon the diverse viewpoints, skills and experiences of our employees. We are proud to be an equal opportunity employer and are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital status, disability, gender identity or veteran status.
To help maintain a safe and secure workplace for Spire employees, all candidates who receive a conditional offer will be required to complete a background check. This may include criminal history and employment verification.
Please take a moment to review Spire's Global Data Privacy Notice for Employees, Contractors, Candidates and Visitors, as well as Spire's Privacy Policy.
Kindly be advised that communication regarding your application may come from @spire.com, @recruiting.spire.com, or from Candidate.fyi (our scheduling tool).
Ready to apply?
Apply to Spire
Share this job
The Mission
Panther is building the future of SOC automation through AI agents that fundamentally change how security teams operate. Our vision is to enable SOC teams to cover 5-10x more data without proportionally scaling headcount by automating the most time-intensive analyst work: alert triage, analysis, and risk validation. We're building intelligent agents that leverage our data pipeline and alerting capabilities to create a SOC team extension that gets smarter over time through collective intelligence.
The Team + Role
You'll build and lead Panther’s agentic team focused on AI-powered SOC analyst solutions that sit at the intersection of security and cutting-edge ML engineering. This is a customer-centric product engineering leadership role where you'll own the execution of our product roadmap, be the bridge between Engineering and Product Management, and you’ll build and lead the team through change alongside our customers, the industry and within the security domain. We're building autonomous security capabilities for alert triage, interactive chat, detection code generation, and text-to-search, all deeply integrated with Panther's ingestion pipeline. This role is ideal for a leader who combines strong people management skills and B2B product engineering experience within the security domain; SOC automation and XDR.
What You'll Need
What You'll Do
We believe in transparency throughout our process — including how we approach AI.
We recognize that AI tools can enhance productivity and support high-quality work. Candidates are welcome to use AI tools for assistance when preparing application materials and completing take-home assignments. If AI use is not permitted for a specific assessment, we will indicate that clearly in the instructions. During live interviews, we ask that candidates not use AI tools to generate or supply real-time answers. This includes reading from AI-generated responses or prompts during conversational, behavioral, or technical discussions. These conversations are designed to understand your individual thinking process, problem-solving approach, and ability to communicate your ideas.
We also use AI tools to support our recruiting processes; hiring decisions are made by our team, not AI.
Reasonable Accommodations
We are committed to providing equal opportunity to all candidates. If you require the use of an AI-based tool or any other assistive technology as a reasonable accommodation for a disability or medical condition, please notify us prior to your interview. We will engage in an interactive process to determine what arrangements are appropriate for your situation. Accommodation requests are handled individually and in accordance with applicable law.
Panther makes security teams smarter and faster than attackers.
We're building the AI SOC platform that modern security teams need. Our Detection-as-Code approach, cloud-native architecture, and powerful security data lake help teams detect and respond to threats at scale. Security teams at leading companies use Panther to protect their organizations without the overhead and costs of legacy SIEM solutions.
Founded by security practitioners who lived the pain of protecting large organizations, we've raised $140M from Coatue, Lightspeed, ICONIQ Growth, Snowflake Ventures, and others. We're a global, remote-first company serving customers worldwide.
Our culture is built on flexibility, transparency, and collaboration. We operate by three core values: Create Customer Love, Be an Owner, and Take Care of the Team. We believe diverse perspectives make us better, and that building great security technology should also mean building a rewarding place to work.
The Perks
Panther Labs is an Equal Opportunity Employer. The Company prohibits discrimination and harassment on the basis of: race, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding), gender, gender identity, gender expression, sexual orientation, marital status, age, religious creed, physical disability, mental disability, genetic information, military or veteran status, or any other status protected by law. All employment decisions are decided on the basis of qualifications, merit, and business need.
The annual cash compensation target: $180,000-$250,000 depending on experience
Ready to apply?
Apply to Panther
Share this job
Radiant Security is building the most advanced AI SOC platform, featuring unbounded alert triage, investigation, and response for security teams at scale. Our platform ingests alerts from across an organization's entire security stack (SIEM, EDR, identity, cloud) and uses AI to triage, investigate, and surface what actually matters. We're replacing alert fatigue with clear signal, so analysts can focus on real threats.
We're a small, fast-moving team. We ship continuously, stay close to customers, and hold ourselves to a high standard. Our product touches the daily workflows of security teams, and decisions we make have a direct impact on how quickly threats get resolved.
Join us and boost your career with hands-on AI experience.
We're looking for a Senior PM to own Radiant's analyst-facing product — the case management, triage, and workflow surface that security teams use every day. You'll be responsible for understanding what those users actually struggle with, translating that into the right product investments, and driving them to delivery.
This is a strategy and execution role. You'll spend meaningful time with customers, develop a sharp point of view on where the product needs to go, and partner with design and engineering to get there quickly.
Nice to have
Ready to apply?
Apply to RadiantSecurity
Share this job
Radiant Security is building the most advanced AI SOC platform, featuring unbounded alert triage, investigation, and response for security teams at scale. Our platform ingests alerts from across an organization's entire security stack (SIEM, EDR, identity, cloud) and uses AI to triage, investigate, and surface what actually matters. We're replacing alert fatigue with clear signal, so analysts can focus on real threats.
We're a small, fast-moving team. We ship continuously, stay close to customers, and hold ourselves to a high standard. Our product touches the daily workflows of security teams, and decisions we make have a direct impact on how quickly threats get resolved.
Join us and boost your career with hands-on AI experience.
Cybersecurity generates more signal than any human team can process. The AI Engineer's job is to change that.
In this role, you'll build the agentic systems that turn overwhelming alert volume into clear, confident decisions — pipelines where AI agents collaborate, reason, and escalate the way the best analysts do, but at machine speed and scale. This isn't prompt experimentation in a notebook. You'll own the full lifecycle of production pipelines: the retrieval systems that surface the right context, the routing logic that sends data where it needs to go, the DAG that encodes the decision structure of a real security problem, and the agents themselves that reason over it all.
Every layer is yours. Every improvement is measurable. And the problems you're solving — faster triage, fewer missed threats, less analyst burnout — are ones that matter.
We’re a startup and we make decisions quickly. Our process is designed to give you the best glimpse of our team and allow us to evaluate your technical and culture fit.
Application Review > Recruiter Screening > Hiring Manager Interview > Technical Interviews > Virtual Onsite
Ready to apply?
Apply to RadiantSecurity
Share this job
Who We Are
Cross River builds the infrastructure behind the world’s most innovative financial products. Our technology and capital solutions power payments, cards, lending, and digital asset capabilities that move money safely, instantly, and inclusively — trusted by leading fintechs, enterprises, and disruptors across the globe.
Our mission is simple: to build the financial infrastructure that expands access and opportunity for all. Guided by a culture of collaboration, curiosity, and purpose, Cross River has been named one of American Banker’s Best Places to Work in Fintech year after year. Whether you’re designing code, solving regulatory puzzles, or developing strategy, you’ll join a team where innovation and integrity drive everything we do — and where your work helps shape the future of finance.
What We're Looking For
We are looking for an Information Security Analyst to help ensure demonstrable adherence to applicable IT governance requirements across multiple ITSM and information security processes. You will work effectively and efficiently with cybersecurity, engineering, product, and IT operations teams at various levels of the organization. The ideal candidate is self-motivated, solutions-oriented, detail-focused, and an independent thinker. You possess a strong understanding of the software development lifecycle (SDLC), change management, and IT risk management. You can quickly grasp complex technical concepts and can make them easily understandable in discussions, presentations, and high-quality documentation.
Responsibilities:
Qualifications:
Must Have:
Preferred:
#LI-AC1 #LI-Hybrid
Salary Range: $70,000.00 - $90,000.00
Cross River is an Equal Opportunity Employer. Cross River does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit, and business need.
By submitting your application, you give Cross River permission to email, call, or text you using the contact details provided. We will only contact you with job related information.
Ready to apply?
Apply to Cross River
Share this job
AssetWatch serves global manufacturers by powering manufacturing uptime through the delivery of an unparalleled condition monitoring experience, with a passion to care about the assets our customers care for every day. We are a devoted and capable team that includes world-renowned engineers and distinguished business leaders united by a common goal – To build the future of predictive maintenance. As we enter the next phase of rapid growth, we are seeking people to help lead the journey.
We are seeking an experienced and technically capable IT Systems Analyst to join the AssetWatch IT operations team. This role goes beyond reactive help desk work — you will contribute to system health, support process improvements, assist with security and compliance efforts, and help the team run smoothly as the business grows. If you thrive in a hands-on environment where you’re solving today’s problems and building better systems for tomorrow, this role is for you.
This role is Remote (United States)
What You’ll Do:
Technical Support & Escalation
Endpoint & Systems Management
Security & Compliance Support
Process Improvement & Automation
Qualifications
Preferred Qualifications
#LI-REMOTE
What We Offer:
AssetWatch is a remote-first company that puts people at the center of everything we do. We want our team members to thrive - that’s why we offer a range of benefits and perks designed to support your well-being, growth, and work-life balance.
We have a distributed team that works remotely across locations in the United States and Ontario, Canada. Collaboration within core working hours is required.
Ready to apply?
Apply to AssetWatch, Inc.Share this job
Reports to: VP, Brand
Location: Remote
Compensation Range: $210,000 to $225,000 base, plus bonus, and equity
What We Do:
Cybercrime is growing, and more businesses are getting hit by threats that used to target only the biggest organizations. That pushes defenders like us to operate at the highest level, and it deepens our need for good people who want to make a meaningful impact.
Founded in 2015 by former NSA cyber operators, Huntress is a remote-first team working to make enterprise-grade cybersecurity accessible to businesses of all sizes. We work closely with security teams and service providers protecting complex environments, often without the time or headcount to handle it all. That’s why we build our technology in-house and back it with a 24/7 human-led Security Operations Center (SOC). As a result, our platform is never disconnected from the experts who manage it, ensuring our customers' protection.
Huntress now secures more than 5M endpoints and 11M identities worldwide. Those numbers keep growing because more businesses rely on us to help carry the load and operate with more confidence. Every day, you can see that commitment in how we stand with our customers and how we show up for each other.
What You’ll Do:
Huntress is growing fast—and we need a bold, media-savvy communications leader to match that momentum. As Senior Director of PR & Communications, you'll develop and execute a comprehensive communications strategy that aligns with our business objectives and establishes Huntress as the defining voice in cybersecurity. You'll craft narratives that showcase our security DNA, our human-plus-AI innovation, and the expertise of our team and community—leveraging both traditional and emerging media to grow the business and shape how the market perceives Huntress.
This is a highly visible, strategic role with direct partnership across the C-suite. We're looking for a narrative driver with a prominent voice and bold vision—someone who leads from the front as a player-coach, doing the work alongside a thriving team of PR and communications professionals and a network of global agencies. Together, you'll run an industry-leading PR program that amplifies breaking news, threat research, and adversary tactics—while driving awareness for the Huntress brand, the Huntress Agentic Security Platform, and the industry-defining expertise of our top cybersecurity leaders and researchers, and fostering key relationships with press, analysts, influencers, and the media and investment communities.
Responsibilities:
What You Bring To The Team:
What We Offer:
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.
#BI-Remote
Ready to apply?
Apply to HuntressReports to: Director, Analytics
Location: Remote US
Compensation Range: $180,000 to $195,000 base plus bonus and equity
What We Do:
Cybercrime is growing, and more businesses are getting hit by threats that used to target only the biggest organizations. That pushes defenders like us to operate at the highest level, and it deepens our need for good people who want to make a meaningful impact.
Founded in 2015 by former NSA cyber operators, Huntress is a remote-first team working to make enterprise-grade cybersecurity accessible to businesses of all sizes. We work closely with security teams and service providers protecting complex environments, often without the time or headcount to handle it all. That’s why we build our technology in-house and back it with a 24/7 human-led Security Operations Center (SOC). As a result, our platform is never disconnected from the experts who manage it, ensuring our customers' protection.
Huntress now secures more than 5M endpoints and 11M identities worldwide. Those numbers keep growing because more businesses rely on us to help carry the load and operate with more confidence. Every day, you can see that commitment in how we stand with our customers and how we show up for each other.
What You’ll Do:
As a Principal Analyst embedded within a fast-moving Marketing and GTM organization, you will serve as the connective tissue between data and strategy — translating complex, ambiguous business questions into sharp insights that shape how the company grows. In this role, you won't wait for the brief to arrive; you'll originate the ideas worth pursuing, pressure-test assumptions, and deliver recommendations that drive real marketing efficiency and measurable growth.
Expect to work at the intersection of data, strategy, and storytelling — collaborating closely with Marketing, Sales, and cross-functional GTM partners on everything from campaign performance and pipeline attribution to customer segmentation and market opportunity sizing. The best person for this role doesn't just answer hard questions — they know which questions are worth asking in the first place. If you thrive on turning complexity into clarity, generating ideas that move the needle, and influencing decisions at the highest level, this is the role for you.
Responsibilities:
What You Bring To The Team:
What We Offer:
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.
#BI-Remote
Ready to apply?
Apply to HuntressReports to: Senior Director, People Operations
Location: Remote US
Compensation Range: $100,000 to $120,000 base plus bonus and equity
What We Do:
Cybercrime is growing, and more businesses are getting hit by threats that used to target only the biggest organizations. That pushes defenders like us to operate at the highest level, and it deepens our need for good people who want to make a meaningful impact.
Founded in 2015 by former NSA cyber operators, Huntress is a remote-first team working to make enterprise-grade cybersecurity accessible to businesses of all sizes. We work closely with security teams and service providers protecting complex environments, often without the time or headcount to handle it all. That’s why we build our technology in-house and back it with a 24/7 human-led Security Operations Center (SOC). As a result, our platform is never disconnected from the experts who manage it, ensuring our customers' protection.
Huntress now secures more than 5M endpoints and 11M identities worldwide. Those numbers keep growing because more businesses rely on us to help carry the load and operate with more confidence. Every day, you can see that commitment in how we stand with our customers and how we show up for each other.
What You’ll Do:
Huntress is expanding our People Operations team with the addition of a new Compensation Analyst. This is a pivotal, data-focused role within the People team, responsible for owning, executing, and continuously updating our company's compensation strategies.
You will play a crucial role in preparing the organization for continued growth and expansion, ensuring that our compensation practices are robust, transparent, and sustainable as we scale. The analyst will leverage their expertise to analyze market trends, model scenarios, and implement programs that directly support our goal of remaining highly competitive within the industry and attracting and retaining top talent. By owning the end-to-end compensation life cycle, our compensation analyst will ensure that our pay structure is not only internally equitable but also strategically aligned with the future success of the business.
Responsibilities:
What You Bring To The Team:
What We Offer:
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.
#BI-Remote
Ready to apply?
Apply to HuntressShare this job
Are you an experienced Security Data and Risk Analyst that wants to develop and create awareness around security-relevant key performance and key risk indicators? At Ivanti, we work passionately and authentically, striving to win together and make a real impact for our customers and each other. Join us to elevate your career and help deliver innovative solutions in a dynamic, empowering environment.
Why this role matters
As the Security Data and Risk Analyst, you will generate enterprise visibility, awareness and understanding of major risk and security issues in a comprehensive and easily consumed manner to support the corporate objectives and especially the reduction of risk. You will be a leader in our Information Security Group which is a global team of experienced professionals dedicated to ensuring the security of Ivanti’s products, corporate and production networks, environments, and of course, its data
What you’ll do:
What you will bring:
Why Ivanti?
What drives us
Ivanti’s mission is to elevate human potential within organizations by managing, protecting and automating technology for continuous innovation.
It is through diverse and inclusive hiring, decision-making, and commitment to our employees and partners that we will continue to build and deliver world-class solutions for our customers.
To learn more about Ivanti’s Mission and Core Values.
Inclusion at Ivanti
Ivanti is proud to be an Equal Opportunity Employer. We’re committed to building a diverse team and fostering an inclusive environment where everyone belongs. We welcome applicants from all backgrounds and walks of life.
Need adjustments during the process? Reach out to talent@ivanti.com we’re happy to help.
#LI-DW1
Ready to apply?
Apply to IvantiAbout Zone & Co:
Zone & Co is on a mission to empower finance professionals to drive strategic growth through seamless, intelligent operations. We build cloud-native software solutions on Oracle NetSuite, automating complex financial processes like billing, accounts payable, reporting, and reconciliation. Our vision is to unlock the full strategic potential of finance by infusing the ERP with the intelligence and automation needed for truly transformative operations. Join our rapidly growing team as we redefine financial efficiency for scaling businesses worldwide.
The Role: We are seeking a meticulous and proactive Security and Privacy Compliance Analyst to help safeguard our organization and our customers' data. Reporting directly to the Director of IT, Security and Compliance, you will play a critical role in maturing our governance, risk, and compliance (GRC) programs. In this position, you will bridge the gap between technical security controls and regulatory requirements, ensuring that Zone & Co's rapidly expanding suite of financial software maintains the highest standards of data protection and privacy.
This role requires a strong foundational knowledge of major security frameworks and privacy regulations, a keen eye for detail in auditing internal processes, and the ability to clearly communicate compliance postures to both internal engineering teams and enterprise customers.
Essential Job Functions:
Responsibilities, Duties, and Tasks:
What You'll Bring (Qualifications and Experience):
At Zone, our benefits are designed to enrich your life beyond the workplace. Recognizing that work is just a fraction of your overall life experience, we are dedicated to providing robust support. As a fully remote company, we prioritize flexibility and balance. Explore our comprehensive list of benefits at Zoneandco.com.
Zone and Co is an Equal Opportunity Employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws. We strongly encourage candidates of all different backgrounds and identities to apply. This is an opportunity for us to bring in a different perspective and we’re eager to further diversify our company. Zone & Co is committed to building an equitable, inclusive, and supportive place for you to do some of the greatest work of your career.
Ready to apply?
Apply to Zone & Co
About Zone & Co:
Zone & Co is on a mission to empower finance professionals to drive strategic growth through seamless, intelligent operations. We build cloud-native software solutions on Oracle NetSuite, automating complex financial processes like billing, accounts payable, reporting, and reconciliation. Our vision is to unlock the full strategic potential of finance by infusing the ERP with the intelligence and automation needed for truly transformative operations. Join our rapidly growing team as we redefine financial efficiency for scaling businesses worldwide.
The Role: We are seeking a meticulous and proactive Security and Privacy Compliance Analyst to help safeguard our organization and our customers' data. Reporting directly to the Director of IT, Security and Compliance, you will play a critical role in maturing our governance, risk, and compliance (GRC) programs. In this position, you will bridge the gap between technical security controls and regulatory requirements, ensuring that Zone & Co's rapidly expanding suite of financial software maintains the highest standards of data protection and privacy.
This role requires a strong foundational knowledge of major security frameworks and privacy regulations, a keen eye for detail in auditing internal processes, and the ability to clearly communicate compliance postures to both internal engineering teams and enterprise customers.
Essential Job Functions:
Responsibilities, Duties, and Tasks:
What You'll Bring (Qualifications and Experience):
At Zone, our benefits are designed to enrich your life beyond the workplace. Recognizing that work is just a fraction of your overall life experience, we are dedicated to providing robust support. As a fully remote company, we prioritize flexibility and balance. Explore our comprehensive list of benefits at Zoneandco.com.
Zone and Co is an Equal Opportunity Employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws. We strongly encourage candidates of all different backgrounds and identities to apply. This is an opportunity for us to bring in a different perspective and we’re eager to further diversify our company. Zone & Co is committed to building an equitable, inclusive, and supportive place for you to do some of the greatest work of your career.
Ready to apply?
Apply to Zone & Co
Vercel gives developers the tools and cloud infrastructure to build, scale, and secure a faster, more personalized web. As the team behind v0, Next.js, and AI SDK, Vercel helps customers like Ramp, Supreme, PayPal, and Under Armour build for the AI-native web.
Our mission is to enable the world to ship the best products. That starts with creating a place where everyone can do their best work. Whether you're building on our platform, supporting our customers, or shaping our story: You can just ship things.
We are looking for a Staff GRC Analyst to join our Governance, Risk, and Compliance (GRC) team. You will have the opportunity to enhance our global compliance posture and further our commitment to managing enterprise risk. Your role will be instrumental in ensuring that our company operates in accordance with security requirements and embodies an environment where it’s everyone’s responsibility. This role will help shape the next iteration of the GRC program and further embed compliance requirements into the business.
Think you may not have all the skills and are hesitant to apply? There is no “perfect” candidate and encourage you to apply if you think that you can bring value to our team and are passionate and committed to upholding the highest standards of compliance and ethics.
If you’re based within a pre-determined commuting distance of one of our offices (SF, NY, London, or Berlin), the role includes in-office anchor days on Monday, Tuesday, and Friday, even if the role is listed as remote. For location-specific details, please connect with our recruiting team.
The San Francisco, CA base pay range for this role is $180,000.00 - $270,000.00. Actual salary will be based on job-related skills, experience, and location. Compensation outside of San Francisco may be adjusted based on employee location. The total compensation package may include benefits, equity-based compensation, and eligibility for a company bonus or variable pay program depending on the role. Your recruiter can share more details during the hiring process.
Vercel is committed to fostering and empowering an inclusive community within our organization. We do not discriminate on the basis of race, religion, color, gender expression or identity, sexual orientation, national origin, citizenship, age, marital status, veteran status, disability status, or any other characteristic protected by law. Vercel encourages everyone to apply for our available positions, even if they don't necessarily check every box on the job description.
Ready to apply?
Apply to VercelShare this job
Reports to: Manager, Security Operations Center
Location: Remote West Coast US
Compensation Range: $190,000 - $225,000 plus bonus and equity
What We Do:
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.
Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.
We protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.
What You’ll Do:
Huntress is looking for a Principal Security Operations Center Analyst based in the United States to join our quickly growing team. In this role, you will triage, investigate, respond to, and remediate intrusions daily. You’ll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyberattacks. This person will also mentor junior team members, allowing them to grow individually and as a team.
The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. With the chance to work on various incidents alongside a skilled team, you’ll have the opportunity to accelerate your career and skills, too.
Responsibilities:
What You Bring To The Team:
Preferred Qualifications:
What We Offer:
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non-accommodation requests to this inbox will not receive a response.
Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.
#BI-Remote
Ready to apply?
Apply to HuntressSkeletons, lasers, tattoo buses — the Torq brand grabs attention like nothing else in cybersecurity. And we're growing like crazy, backed by Series D funding, 200% employee growth, and 300% revenue growth. Fueling Torq's momentum is our game-changing AI SOC platform, backed by a team and culture that makes Torq one of Forbes' Best Startup Employers in America, and a Business Insider 'startup to bet your career on'.
Life at Torq is all gas, no brakes. We're a team of relentless, collaborative go-getters pushing the boundaries of what's possible for security automation. Every role is an essential driver of Torq's success as the AI-native autonomous SecOps platform of choice for security teams across the Fortune 500.
Job Description: Director of Analyst Relations
The Opportunity
Torq is redefining the AI SOC category. As the Director of Analyst Relations, you will be the chief architect of our reputation among the industry’s most critical influencers.
Your mission is to ensure that every relevant analyst at every major firm understands who Torq is, how our tech is unique, and why enterprises prefer Torq to transform how they understand and manage risk. This is a high-stakes role for a strategist who can translate the technical power and combination of Agentic AI and automation into a market-defining narrative.
What You’ll Do
The Ideal Profile
Why Torq?
We build AI for a living, and we encourage candidates to use it to prep, research, and sharpen their best work. But we're hiring humans, not chatbots. We want the real you. Use AI to tighten your resume, prep for interviews, research Torq, and outline ideas for written responses. Show up as yourself for live interviews, final assessments (the voice, logic, and reasoning need to be yours), and anywhere we're evaluating how you think — not how you prompt.
Excited about our vision and ready to make an impact as we grow? We'd love to see what you can bring to the team.
Ready to apply?
Apply to Torq
Share this job
ABOUT LVT
LVT is redefining how businesses operate in the physical world, moving beyond traditional security solutions to deliver AI-driven, actionable intelligence that makes sites smarter, safer, and more secure. Since pioneering our first mobile, solar-powered units, our commitment to scrappy, hands-on innovation has made us an established leader and one of the fastest-growing companies in intelligent site technology. We are building the next generation of solutions—from our physical units in the field to a powerful Agentic AI platform—that allows our customers to gain unprecedented visibility and control over safety, compliance, and operations. This is your chance to join a cutting-edge team that isn't just watching the world change, but actively building the technology that is changing it.
We’re a team that’s focused on growth and innovation, and we’re proud that our crew, products, and leadership are being recognized for it.
ABOUT THIS ROLE
LVT is actively seeking a highly motivated and detail-oriented Information Security Analyst (GRC) to join our growing Information Security team. This role will report directly to the Information Security Manager (GRC). This position is designed for an individual eager to delve deeply into the operational aspects of Governance, Risk, and Compliance, directly supporting LVT’s steadfast commitment to security excellence and regulatory adherence as the business continues its innovative scaling.
LVT values managing risk in alignment with our customer’s and stakeholder’s expected levels. We design, implement, and monitor controls that reduce real risk. The Information Security Analyst (GRC) will work with Management to operate key GRC processes. The primary focus of this hands-on position will be answering customer security questionnaires, performing risk assessments and internal audits, developing and maintaining policies, being a liaison for our external auditors, and helping to identify, manage, and reduce risk across our environment.
ROLE RESPONSIBILITIES
OUR IDEAL CANDIDATE
BENEFITS
We believe you do your best work when your whole life is supported. We invest in our crew’s health, families, and financial futures with a benefits package designed to support you inside and outside the office. Full-time benefits include, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits (401k match up to 4%), and flexible PTO.
LVT IS PROUD TO BE AN EQUAL OPPORTUNITY EMPLOYER. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. All candidates must pass a drug screening and background check upon employment. Some roles may also require passing a federal background check and fingerprinting. Must be authorized to work in the U.S. If reasonable accommodation is needed to participate in the job application or interview process, and/or to perform essential job functions, please reach out to your recruiter.
Ready to apply?
Apply to LVT
Share this job
At OneStudyTeam (a Reify Health company), we specialize in speeding up clinical trials and increasing the chance of new therapies being approved with the ultimate goal of improving patient outcomes. Our cloud-based platform, StudyTeam, brings research site workflows online and enables sites, sponsors, and other key stakeholders to work together more effectively. StudyTeam is trusted by the largest global biopharmaceutical companies, used in over 6,000 research sites, and is available in over 100 countries. Join us in our mission to advance clinical research and improve patient care.
One mission. One team. That’s OneStudyTeam.
We are seeking a Senior Security Compliance Analyst with expertise in Governance, Risk, and Compliance (GRC) to support and enhance our security and compliance programs within the healthcare industry. This role is critical in ensuring adherence to industry regulations, responding to customer audits, and maintaining compliance with ISO 27001, HIPAA, and other security frameworks.
The ideal candidate will be a detail-oriented compliance expert who can navigate complex regulatory environments, assist with internal/external audits, and drive continuous improvement in security governance. The ideal candidate must be able to operate independently while delivering on the following duties.
The expected salary range for this role is $125,000 - $175,000 USD per year for full time team members.
We value diversity and believe the unique contributions each of us brings drives our success. We do not discriminate on the basis of race, sex, religion, color, national origin, gender identity, age, marital status, veteran status, or disability status.
Note: OneStudyTeam is unable to sponsor work visas at this time. If you are a non-U.S. resident applicant, please note that OneStudyTeam works with a Professional Employer Organization.
As a condition of employment, you will abide by all organizational security and privacy policies.
This organization participates in E-Verify (E-Verify's Right to Work guidance can be found here).
Mandatory Employer Disclosures:
Notice to Illinois applicants: Applicants are not obligated to disclose expunged juvenile records or adjudication, arrest, or conviction.
Notice to Connecticut applicants: OneStudyTeam may require applicants to submit to a urinalysis drug test in connection with an application for employment.
Notice to Arizona, Georgia, Indiana, and North Dakota applicants: OneStudyTeam complies with applicable laws prohibiting smoking in and around places of employment.
Notice to Massachusetts applicants: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Notice to Rhode Island applicants: OneStudyTeam complies with Rhode Island law prohibiting smoking in enclosed areas within places of employment. OneStudyTeam is also subject to is subject to Chapters 29–38 of Title 28 of the Rhode Island General Laws.
Notice to Maryland applicants: UNDER MARYLAND LAW, AN EMPLOYER MAY NOT REQUIRE OR DEMAND, AS A CONDITION OF EMPLOYMENT, PROSPECTIVE EMPLOYMENT, OR CONTINUED EMPLOYMENT, THAT AN INDIVIDUAL SUBMIT TO OR TAKE A LIE DETECTOR OR SIMILAR TEST. AN EMPLOYER WHO VIOLATES THIS LAW IS GUILTY OF A MISDEMEANOR AND SUBJECT TO A FINE NOT EXCEEDING $100.
Ready to apply?
Apply to OneStudyTeam
Today, there's more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We realized a new perimeter was needed, one that is built in the cloud and follows and protects data wherever it goes, so we started Netskope to redefine Cloud, Network and Data Security.
Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo. Our core values are openness, honesty, and transparency, and we purposely developed our open desk layouts and large meeting spaces to support and promote partnerships, collaboration, and teamwork. From catered lunches and office celebrations to employee recognition events and social professional groups such as the Awesome Women of Netskope (AWON), we strive to keep work fun, supportive and interactive. Visit us at Netskope Careers. Please follow us on LinkedIn and Twitter@Netskope.
About the Role
We are hiring a Principal Product Manager to lead product strategy for AI-powered agentic security operations at Netskope. This role sits at the intersection of applied AI and security operations where you will own the vision and roadmap for autonomous AI agents that investigate threats, perform security operations tasks, and orchestrate incident response across the Netskope Security Platform. The ideal candidate combines deep security operations domain expertise with genuine fluency in how modern AI agent systems work.
Responsibilities
Qualifications
Mandatory:
Desirable:
Skills
Education & Travel
Benefits
#LI-SC1
Compensation:
At Netskope, salary is one component of our competitive total rewards package. The salary range for this position is as listed below. This is a national range. For purposes of complying with applicable laws, the range applies to candidates in California, Colorado, Illinois, Maryland, New York, Washington, and other states.
The successful candidate’s starting pay will also be determined based on job-related skills, experience, qualifications, location, and market conditions.
For all sales roles, the posted salary range is the On Target Earnings (OTE) range for the role, which is the sum of base salary and target commission amount at 100% goal achievement.
In addition to salary, candidates may be eligible for other forms of compensation such as participation in a bonus plan (for non-sales roles) and a stock award program. Candidates may also be eligible for a comprehensive health plan and other benefits that can be reviewed at Netskope Benefits site.
Netskope is committed to implementing equal employment opportunities for all employees and applicants for employment. Netskope does not discriminate in employment opportunities or practices based on religion, race, color, sex, marital or veteran statues, age, national origin, ancestry, physical or mental disability, medical condition, sexual orientation, gender identity/expression, genetic information, pregnancy (including childbirth, lactation and related medical conditions), or any other characteristic protected by the laws or regulations of any jurisdiction in which we operate.
Netskope respects your privacy and is committed to protecting the personal information you share with us, please refer to Netskope's Privacy Policy for more details.
The application window for this position is expected to close within 50 days. You may apply by filling out the below information, or visiting our Netskope Careers site.
Ready to apply?
Apply to Netskope
Skeletons, lasers, tattoo buses — the Torq brand grabs attention like nothing else in cybersecurity. And we're growing like crazy, backed by Series D funding, 200% employee growth, and 300% revenue growth. Fueling Torq's momentum is our game-changing AI SOC platform, backed by a team and culture that makes Torq one of Forbes' Best Startup Employers in America, and a Business Insider 'startup to bet your career on'.
Life at Torq is all gas, no brakes. We're a team of relentless, collaborative go-getters pushing the boundaries of what's possible for security automation. Every role is an essential driver of Torq's success as the AI-native autonomous SecOps platform of choice for security teams across the Fortune 500.
SOLUTIONS ARCHITECT
We’re looking for a Solutions Architect to join our Global Solutions Architecture team. This is a senior, customer-facing architecture role for someone with deep experience in security operations, AI/LLMs, and agentic workflow design. In this role, you’ll work directly with customers to design advanced solutions on Torq while also helping define the implementation patterns, architecture standards, and reusable frameworks that scale across the company. You’ll spend significant time both building customer solutions and creating reusable design standards, reference architectures, and solution frameworks that raise the bar across the organization. We’re specifically looking for someone who stays ahead of the curve on rapidly evolving AI technologies and can translate emerging advances into practical, safe, and high-value implementation patterns for real-world security teams.
This is a remote role, based in the United States.
What Will You Do:
What Should You Bring to the Table:
Preferred Qualifications:
As an equal opportunity employer, we are committed to a team defined and empowered by diversity. We consider qualified applicants without regard to race, religion, color, national origin, gender, sexual orientation age, marital status, veteran status or disability status.
By submitting your application, you acknowledge that Torq will process your personal data in accordance with Torq’s Privacy Policy.
We build AI for a living, and we encourage candidates to use it to prep, research, and sharpen their best work. But we're hiring humans, not chatbots. We want the real you. Use AI to tighten your resume, prep for interviews, research Torq, and outline ideas for written responses. Show up as yourself for live interviews, final assessments (the voice, logic, and reasoning need to be yours), and anywhere we're evaluating how you think — not how you prompt.
Excited about our vision and ready to make an impact as we grow? We'd love to see what you can bring to the team.
Ready to apply?
Apply to Torq
Share this job
Security Operations Analyst
About Blumira and Our Culture
Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind from knowing they never have to go it alone. Every business needs strong security and deserves tools built for them, not just the largest enterprises. In helping them, we help their customers, and, overall, make the Internet a safer place.
Our team is passionate about putting resilience in reach for every organization and team, keeping the business running smoothly and helping teams build their own expertise through daily security practice. To realize our vision, we're looking for inquisitive and driven teammates, like you! Be part of a friendly and supportive team that embraces who you are and offers you the opportunity to help build and scale the Ann Arbor tech security scene and to learn and grow with experienced SaaS security leaders. You will have the ability to make a big impact in the initial build of Blumira’s Customer Experience (CX) organization and take Blumira to the next level!
About the Opportunity
This is a multi-functional role for someone who’s passionate about helping others to protect their organization’s security to the fullest extent possible. Security Operations Analysts work closely with our customers to make sure they know their security is in good hands with Blumira, through performing Security Information and Event Management (SIEM) duties, security analysis, and technical support.
Key Responsibilities
Required Key Skills and Qualifications
Bonus
Perks and Benefits
Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Please note that this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time, with or without notice.
This role requires sustained computer use and may involve extended periods of sedentary work.
This position may require occasional travel. The frequency and duration of travel will vary depending on business needs.
Blumira is an inclusive employer. We are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and teammates without regard to race, color, creed, sex, sexual orientation, gender identity or expression, age, religion, national origin, citizenship status, disability, ancestry, marital status, veteran status, medical condition or any protected category prohibited by local, state or federal laws.
Ready to apply?
Apply to BlumiraShare this job
Threat Labs’ mission is to keep our customers safe from cybersecurity attacks. We do this by advancing the art and science of detection: turning threat intelligence and threat research into practical, high‑quality detections that power the Sumo Logic SIEM platform and strengthen the broader security community.
We’re looking for a staff‑level threat researcher who thrives at the intersection of data and adversary tradecraft. In this role, you’ll use your practitioner experience to uncover attacker behaviors, test them in realistic environments, and turn those insights into detection content that directly improves customer outcomes. You’ll explore and exploit a variety of security technologies, with an emphasis on cloud and AI environments, to build, validate, and tune detections that reflect the latest attack techniques. In addition to applying existing research, you’ll have opportunities to conduct original investigations, from malware analysis to infrastructure tracking and honeypot monitoring, designed to uncover novel insights that shape future detection strategies.
You’re a seasoned security professional who’s evolved from responding to incidents to preventing them. You have a deep curiosity for how attackers operate and a passion for translating that insight into practical detections that measurably improve defenses. You thrive in a hands‑on environment: experimenting in the lab, analyzing data, and validating results. Collaboration and sharing come naturally to you: working with peers across Threat Labs and product teams, you enjoy turning research into real detections and community knowledge that protect customers everywhere.
Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness—combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. For more information, visit www.sumologic.com.
Sumo Logic Privacy Policy. Employees will be responsible for complying with applicable federal privacy laws and regulations, as well as organizational policies related to data protection.
The expected annual base salary range for this position is $162,000 - $190,000. Compensation varies based on a variety of factors which include (but aren’t limited to) role level, skills and competencies, qualifications, knowledge, location, and experience. In addition to base pay, certain roles are eligible to participate in our bonus or commission plans, as well as our benefits offerings.
Must be authorized to work in the United States at time of hire and for duration of employment. At this time, we are not able to offer nonimmigrant visa sponsorship for this position.
Ready to apply?
Apply to Sumo LogicCookies & analytics
This site uses cookies from third-party services to deliver its features and to analyze traffic.