Contribute to cybersecurity operations by designing, developing, and recommending secure technical solutions—including policies, standards, applications, systems, architectures, and infrastructure—that are both operationally viable and efficient.
Ensure the appropriate implementation of security products and technologies to protect organizational systems and data, supporting the achievement of business objectives.
Assist in the design and enhancement of cybersecurity toolsets to enable automated discovery, remediation, and alerting of network and device vulnerabilities, thereby strengthening the organization's security posture.
Conduct analysis of emerging technologies and architect secure solutions to support their implementation.
Contribute to the design and implementation of a risk-based cybersecurity program aligned with regulatory standards and industry-leading practices.
Perform threat identification, analysis, and mitigation using advanced security controls and toolsets.
Support the evolution of the company’s cyber threat and vulnerability management program to ensure consistent detection, response, and monitoring of cybersecurity threats and vulnerabilities.
Assess business-related threats and deploy appropriate countermeasures.
Collaborate with business units, application development teams, and third-party vendors to meet cybersecurity program requirements while enabling business operations.
Apply deep technical expertise to protect the organization from cyber threats, including knowledge of firewalls, IDS/IPS, DLP, endpoint protection, log aggregation, and other advanced security technologies.
Participate in cross-functional coordination to achieve security goals and support detailed implementation plans for cybersecurity initiatives.
Provide subject matter expertise on security projects to ensure timely, cost-effective, and operationally supported implementation of cybersecurity improvements, with validation methods to measure effectiveness.
Assist management in developing strategies, policies, and standards to safeguard company information and technology assets.
Identify, triage, and support remediation of vulnerabilities in web and mobile applications, particularly within ADC products.
Requirements
Bachelor’s degree in Business, Engineering, Computer Science, or a related discipline such as Threat and Risk Management.
Minimum of 2 years of experience with implementing and evaluating industry standards, including ISO 27001/27002, SOC 2, HITRUST, FedRAMP, and ISO 22301 (Business Continuity).
Strong organizational skills and attention to detail.
Experience using JIRA for project and issue tracking.
Technical knowledge of common web and mobile application security vulnerabilities, with the ability to identify, triage, and support remediation efforts—particularly in ADC products.
Preferred Security+ certification or equivalent technical cybersecurity certification.
Benefits
Career development with an international company where you can grow the career you dream of.
Employees can qualify for free medical coverage in our Health Investment Plan (HIP) PPO medical plan in the next calendar year
An excellent retirement savings plan with high employer contribution
Tuition reimbursement, the Freedom 2 Save student debt program and FreeU education benefit - an affordable and convenient path to getting a bachelor’s degree.
A company recognized as a great place to work in dozens of countries around the world and named one of the most admired companies in the world by Fortune.
A company that is recognized as one of the best big companies to work for as well as a best place to work for diversity, working mothers, female executives, and scientists.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.