Security Operations Center Manager
Posted 1 day ago
Job Viewed
Job Description
Your Impact You will lead our security operations team as they increase the use of automation and adopt the use of AI. While doing so you will ensure a high bar of monitoring and detection securing mission critical software and services. We need a high-energy security professional to help expand and mature our security operations. What You’ll Do Location: Work from home as much as you want, live nearby any of our awesome US R&D Hubs (Seattle, San Francisco, Scottsdale, Atlanta, or Boston) so you can easily collab in-person when it’s helpful and be an active part of our vibrant Axon culture. Reports to: Director of Security Operations and Engineering Direct Reports: 7-8 Lead and manage the SOC team, including security engineers and analysts, fostering a collaborative and innovative environment. Oversee the design, deployment, and maintenance of SOC tools and technologies, ensuring they are optimized for performance and scalability. Develop and implement strategies for building new detection rules, use cases, and automation workflows to enhance threat detection and response capabilities. Coordinate and lead incident response efforts, ensuring timely and effective resolution of security incidents. Collaborate with other departments and stakeholders to align SOC initiatives with business objectives and ensure seamless integration of security processes. Set and guide the team towards ever evolving capabilities with a clear vision for the long term of the SOC. Measure and report the maturity and success of the SOC through metrics and analytical assessment. What You Bring Minimum of 5 years of experience in a security operations or incident response role, with at least 2 years in a leadership or management position. You have an engineering background building solutions to solve security problems. Substantial experience with building and implementing detection rules, use cases, and automation workflows. Proficiency in scripting and automation languages such as Python, PowerShell, or similar. Strong communication and interpersonal skills, with the ability to effectively lead and motivate a team. Strong knowledge of security technologies, including SIEM, IDS/IPS, firewalls, endpoint protection, threat intelligence platforms and automation technologies. Experience working for a SaaS company within AWS or Azure. Benefits that Benefit You Competitive salary and 401k with employer match Discretionary paid time off Paid parental leave for all Medical, Dental, Vision plans Fitness Programs Emotional & Mental Wellness support Learning & Development programs And yes, we have snacks in our offices. Benefits listed herein may vary depending on the nature of your employment and the location where you work. The Pay: Axon is a total compensation company, meaning compensation is made up of base pay, bonus, and stock awards. The starting base pay for this role is between USD 104,475 in the lowest geographic market and USD 167,160 in the highest geographic market. The actual base pay is dependent upon many factors, such as: level, function, training, transferable skills, work experience, business needs, geographic market, and often a combination of all these factors. Our benefits offer an array of options to help support you physically, financially and emotionally through the big milestones and in your everyday life. To see more details on our benefits offerings please visit . #J-18808-Ljbffr
Cyber Google Security Operations - Manager

Posted 15 days ago
Job Viewed
Job Description
As a Google SecOps Manager, you will deliver important solutions for high-visibility projects. Your advanced SOC engineering skills and strong knowledge of Google SecOps tools, threat detection engineering, and automation development are essential. These skills will help build solutions that satisfy customers and support Deloitte's business goals.
Leverage your technical expertise to develop, implement, and optimize Google SecOps threat detection and automation solutions. Consistently show a commitment to high-quality, outcome-focused engineering. As a technical leader and mentor, collaborate closely with cross-functional teams. Share best practices and guide less experienced engineers in using modern Google SecOps methods. Your work will help ensure secure, reliable, and efficient SOC solutions for the business and its users.
Recruiting for this role ends on 8/31/2025 Work You'll Do
+ Lead a team to design and build secure, scalable Google SecOps architectures. Implement SIEM and SOAR platforms that meet security policies and regulations, such as GDPR and PCI-DSS.
+ Lead end-to-end deployment of log ingestion pipelines. Use data fabric technologies and API integrations, such as Bindplane and Cloud Feeds.
+ Collaborate with SOC analysts and threat detection engineers to prioritize, develop, and adjust threat detection rules in Google SecOps. Detect malicious behavior and adversaries in enterprise environments.
+ Translate SOC processes to automation playbooks within SOAR to alleviate alert fatigue and scale alert triage and response.
+ Lead and mentor junior team members in SOC engineering (SIEM + SOAR) and process development.
+ Develop and manage custom integrations between third-party platforms, security tools, and Google SecOps. Support automated data ingestion, alert enrichment, and response.
+ Architect and build strong case management solutions in Google SecOps SOAR. Ensure these solutions support operational metrics. Optimize the analyst experience.
The Team Our Enterprise Security offering embeds security in all aspects of digital transformation by securing a client's technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products. Required Qualifications
+ Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (or equivalent work experience).
+ 9+ years of experience in security operations, threat detection engineering, or enterprise IT security.
+ Has deep hands-on experience with Google Cloud's SecOps tool stack and architecture. Has special experience with SIEM and SOAR (formerly Google Chronicle and SIEMplify).
+ Strong knowledge of security principles and frameworks such as MITRE ATT&CK and Killchain.
+ Proficient scripting skills in Python for automation and integration development.
+ Scripting skills in Gostash or Logstash for log normalization / parsing.
+ Familiarity with ETL (Extract, Transform, Load) pipelines and associated concepts (e.g. Cribl, Bindplane, NXLog, Kafka)
+ Experience in Virus Total, Mandiant products and solutions, or Google Threat Intelligence.
+ Experience with multiple SIEM or SOAR tools, such as Splunk or XSOAR.
+ Limited immigration sponsorship may be available
+ Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve
Preferred Qualifications
+ Certifications such as: Google Cloud Professional Architect, Google Cloud Professional Security Engineer, Certified Cloud Security Professional.
+ Stay current on cyber security threats, vulnerabilities, and compliance trends to enhance organizational security posture.
+ Ability to facilitate discussions on scope and build requirements with internal and external parties to deliver against expectations.
+ Familiarity with Threat Hunting and Cyber Threat Intelligence fundamentals.
+ Proficiency in data fabric technologies (Bindplane, Cribl).
+ Foundational knowledge in infrastructure and networking fundamentals, such as IP networking, VPNs, DNS, load balancing, and firewalling concepts.
+ Familiarity with Cloud infrastructure broadly, exposure to multi-cloud environments (AWS, Azure).
+ Familiarity with AI frameworks like MCP and ADK for agentic workflow development or integration is required. This applies to SecOps tools such as SIEM, SOAR, GTI, and ASM.
Information for applicants with a need for accommodation: wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $124,700 - $229,500
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Senior Security Operations Engineer
Posted today
Job Viewed
Job Description
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
**Responsibilities**
The primary responsibilities of this role include:
+ **Security Incident Response** Independently analyzes prioritized attempted or successful efforts to compromise systems security; recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps; provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.
+ **Identification and Detection of Control Failures** Designs solutions to address identified control issues (e.g., network, identity, high security), taking intended and unintended consequences into account. Operationalizes and scales a program and solution appropriately. Identifies high priority opportunities and makes data-driven recommendations for efficiencies to improve security posture (e.g., streamline processes, automate). Assists team with technical acumen as needed.
+ **Automation** Recommends automation to improve effectiveness and efficiencies of security operations; supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions; improves solutions over time.
+ **Monitoring and Detection** Builds new detection capabilities; researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.
+ **Threat Intelligence and Analysis** Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry.
+ **Data-Driven Analysis** Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.
+ **Penetration Testing** Understands how weaponized code can be used in operations; determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations.
+ **Other** Embody our Culture ( & Values ( Qualifications:**
+ 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response
+ OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
+ 3+ years of experience in technical disciplines outside security space, including general software development, networking, database management, and full-stack development.
**Other Requirements:**
+ Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to, the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Master's Degree
+ OR Doctorate in Statistics, Mathematics, Computer Science
+ OR related field
+ OR 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
+ CISSP CISA CISM SANS GCIA GCIH OSCP Security+ Demonstrated coding skills in one or more popular languages and platforms such as: C#, C++, Ruby, Python, and others
+ Experience testing web services, identifying and remediating OWASP top 10 security flaws, and understanding large complex systems.
+ Networking/Identity Isolation, Active Directory, operational security and Linux skills
Security Operations Engineering IC4 - The typical base pay range for this role across the U.S. is USD $117,200 - $29,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD 153,600 - 250,200 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: will accept applications for the role until July 17, 2025.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Senior Security Operations Engineer
Posted 3 days ago
Job Viewed
Job Description
Microsoft is seeking a **Senior Security Operations Engineer** ?to join the Digital Security & Resilience (DSR) organization as we undergo the journey to ensure that the right virtualization services are released with the right security mindset. Our goal is to ensure access to the right resources at the right time, protected every step of the way?
With your experience in engineering, along with an understanding of Endpoint Security Vulnerability management (TVM, Antimalware, Website security), Enterprise infrastructure and overall Service Health, you will champion our own security-centric digital transformation. Your experience will support thousands of employees in improving Microsoft's high standard of security?
A proficient candidate will have experience in a team environment, experience running enterprise scale services and platforms, technical depth in cloud platforms, agile development practices, and experience in designing & tuning telemetry. In addition, this position requires an individual who can develop and maintain highly resilient and scalable services through partnership with other teams?
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
- Adhere to modern engineering practices, enacting change to services through software engineering, unit testing, debugging, refactoring, code reviews and maintaining build/deployment pipelines?
- Identify?opportunities and drive the implementation of automation to improve service health, manageability,?reliability,?and telemetry?
- Own, triage, investigate and resolve service issues with an emphasis on broad?communication, learning & teaching throughout the process?
- Author functional and technical documentation. Communicate on a?deep?technical level with product engineering, project management and operations teams to improve. and?optimize?products, improve infrastructure, and evolve services?
- Remain current on new technologies, methods and procedures including, but not limited to, coding practices such as Test-Driven Development, Continuous Integration, and Continuous Deployment?
- Translate business requirements into technical specifications and help manage priorities,?deliverables,?and timelines?
You will be a service owner and will be responsible for all stages of the Software Development Lifecycle.
**Qualifications**
**Required/Minimum Qualifications:**
+ Bachelor's Degree in Statistics, Mathematics, Computer Science or related field OR 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.
+ 5+ years technical engineering experience with programming, scripting language such PowerShell or Python, data engineering using sql and kql.
+ Ability to obtain and maintain a US Security Clearance.
**Other Requirements**
+ **Citizenship & Citizenship Verification** : This position requires verification of U.S citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customers and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport.
+ **Citizenship & Citizenship Verification** : This role will require access to information that is controlled for export under U.S. export control regulations, potentially under the International Traffic in Arms Regulations or the Export Administration Regulations?As a condition of employment, the successful candidate will be required to provide proof of citizenship, for assessment of eligibility to access the export-controlled information. To meet this legal requirement, citizenship will be verified via a valid passport.
+ **Cloud Screening** : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Experience working on large scale services,?components,?or feature areas?
+ Demonstrated understanding of monitoring, alerting, and observability philosophies and best practices?
+ Knowledge of Endpoint Security and Microsoft Defender for Endpoint
+ Collaborating?first and foremost; ability to exercise cross-team co-operation and influence?
+ Understanding of the frameworks such as MITRE ATT&CK, and NIST
+ Experience working with **PySpark** or **Pandas**
+ Experience working with any of the data platforms: Azure Data Factory, Azure Synapse Analytics, Databricks, Fabric.
+ 5+ years of experience working in Azure, AWS or GCP clouds?
+ 5+ years of experience with writing tools, automation, and enhancements to deliver and manage services in production?
+ 5+ years of experience troubleshooting/debugging?
+ 2+ years of working with services, responsible for gathering requirements, building, shipping, and operating a service.
+ 2+ years of DevOps experience with a security first mindset.
+ 2+ years of data analysis and visualization.
Security Operations Engineering IC4 - The typical base pay range for this role across the U.S. is USD $117,200 - $29,200 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD 153,600 - 250,200 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: will accept applications for the role until July 22, 2025
**#MSRC #EndpointSecurity #Cybersecurity #VulnerabilityManagement #IAMProtect #SRE #SOE #MSFTSecurity**
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Principal Security Operations Engineer
Posted 4 days ago
Job Viewed
Job Description
We are looking for a Principal Security Operations Engineer to join our Azure Security Monitoring team, which is responsible for building large scale microservices that collect and process terabytes of data every day to protect and keep Microsoft Azure secure. In this role, you will help in designing and building critical infrastructure which will focus on protecting and securing the compute resources in Azure and play a pivotal role in shaping the future of security at Microsoft. If you have an interest for data, coding, and cybersecurity and are interested in leveraging large volumes of data to draw deep insights designed to improve protecting customers against cyber-attacks, then apply today to join this dynamic team!
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
Other
+ Embody our culture and values
**Responsibilities**
Design, develop and maintain high scale services that form the backbone of Security Monitoring.
Execute security controls, defenses, and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate?company email, data, e-commerce, and web-based systems.
Research attempted or successful efforts to compromise systems security?
Collaborate with partners, internal and external to Microsoft Security organization, to design and build features that enable in protecting and securing Microsoft 1P products and services.
Work in a culture of continuous learning, adaptation, reflection, and growth.
Mentoring peers to ensure engineering best practices and code is held at a high-quality bar.
Championing a 'can do' attitude across the org.
**Qualifications**
**Required Qualifications**
+ Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
+ OR 7+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.
+ 5+ years of experience programming in C++/C# or Python or Scala or similar technologies.
**Additional Qualifications**
+ Master's Degree or Doctorate Statistics, Mathematics, Computer Science or related field
+ OR 10+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
+ SANS GCIA GCIH OSCP Security+ 2+ years of experience in applying AI/ML techniques to cybersecurity challenges, such as threat detection, anomaly detection, and malware analysis
Security Operations Engineering IC5 - The typical base pay range for this role across the U.S. is USD $139,900 - $74,800 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this role in those locations is USD 188,000 - 304,200 per year.
Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here: will accept applications for the role until July 26th, 2025.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Principal Engineer Security Operations

Posted 15 days ago
Job Viewed
Job Description
Responsibilities:
+ Lead the operational and technical aspects of the Security Operations Center (SOC) and Threat Intelligence
+ Architect and oversee the integration of SOC, Detection Engineering, and Threat Intelligence processes
+ Design and manage SOC infrastructure, ensuring scalability and robustness
+ Manage and triage complex or escalated security incidents
+ Develop and implement advanced detection and response strategies across diverse environments, including cloud, on-premises, and OT.
+ Conduct threat analysis and develop actionable intelligence to preemptively mitigate risks
+ Collaborate with cross-functional teams to enhance incident response protocols and improve security posture
+ Stay abreast of emerging threats, technologies, and best practices to continuously refine our cyber defense strategy
Experience:
+ Experience overseeing a world class managed service
+ Extensive experience in managing SOC operations and leading threat intelligence initiatives
+ Deep expertise in incident triage and complex incident management
+ Proven ability to design and implement SOC infrastructure and integrate detection engineering workflows
+ Strong understanding of cloud security principles and technologies (AWS, Azure, GCP)
+ Proficiency in threat intelligence platforms and methodologies
+ Experience with advanced security tools and frameworks, such as MITRE ATT&CK
+ Solid understanding of automation and scripting for security operations (Python, PowerShell, etc.)
+ Excellent communication and leadership skills, with the ability to collaborate effectively across teams
+ Commitment to staying current with the latest cybersecurity trends and technologies
+ Experience with forensic data collection and analysis concepts and technologies
Preferred Qualifications:
+ Exposure to Crowdstrike Falcon & LogScale, Splunk, Proofpoint, Palo Alto, Zscaler, Microsoft Defender/Purview
+ Certifications such as GIAC, GRTP, GDAT, or similar
+ Exposure to forensic collection and analysis tools (EnCase, Magnet AXIOM, FTK Imager, or similar)
If you are a proactive and visionary leader with a passion for cyber defense, we invite you to apply and drive our mission to fortify our organization's security posture.
**Fortive Corporation Overview**
Fortive's essential technology makes the world stronger, safer, and smarter. We accelerate transformation across a broad range of applications including environmental, health and safety compliance, industrial condition monitoring, next-generation product design, and healthcare safety solutions.
We are a global industrial technology innovator with a startup spirit. Our forward-looking companies lead the way in software-powered workflow solutions, data-driven intelligence, AI-powered automation, and other disruptive technologies. We're a force for progress, working alongside our customers and partners to solve challenges on a global scale, from workplace safety in the most demanding conditions to groundbreaking sustainability solutions.
We are a diverse team 17,000 strong, united by a dynamic, inclusive culture and energized by limitless learning and growth. We use the proven Fortive Business System (FBS) to accelerate our positive impact.
At Fortive, we believe in you. We believe in your potential-your ability to learn, grow, and make a difference.
At Fortive, we believe in us. We believe in the power of people working together to solve problems no one could solve alone.
At Fortive, we believe in growth. We're honest about what's working and what isn't, and we never stop improving and innovating.
Fortive: For you, for us, for growth.
Ready to move your career forward? Find out more at careers.fortive.com.
We Are an Equal Opportunity Employer. Fortive Corporation and all Fortive Companies are proud to be equal opportunity employers. We value and encourage diversity and solicit applications from all qualified applicants without regard to race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity or expression, or other characteristics protected by law. Fortive and all Fortive Companies are also committed to providing reasonable accommodations for applicants with disabilities. Individuals who need a reasonable accommodation because of a disability for any part of the employment application process, please contact us at
**Bonus or Equity**
This position is also eligible for bonus as part of the total compensation package.
**Pay Range**
The salary range for this position (in local currency) is 111,500.00 - 207,100.00
**Is this role subject to ITAR?**
The essential duties of this position require adherence to U.S. Government export control regulations. Accordingly, candidates must either be U.S. Persons (i.e., U.S. citizens, U.S. lawful permanent residents, or protected individuals as defined by 8 U.S.C. 1324b(a)(3)) or be prepared to collaborate with the company in securing the necessary U.S. government export authorizations. While the company encourages all interested applicants to apply, please be aware that ongoing employment is dependent upon obtaining the appropriate government export authorizations.
This position is also eligible for bonus as part of the total compensation package.
The salary range for this position (in local currency) is 111,500.00 - 207,100.00
We are an Equal Opportunity Employer
Fortive Corporation and all Fortive Companies are proud to be equal opportunity employers. We value and encourage diversity and solicit applications from all qualified applicants without regard to race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity or expression, or other characteristics protected by law. Fortive and all Fortive Companies are also committed to providing reasonable accommodations for applicants with disabilities. Individuals who need a reasonable accommodation because of a disability for any part of the employment application process, please contact us at
Product Security Operations Engineer

Posted 15 days ago
Job Viewed
Job Description
**Seattle, Washington, United States**
**Software and Services**
**Summary**
Posted: **Jun 02, 2025**
Weekly Hours: **40**
Role Number: **200607302**
You'll be a part of the Apple Product Security team at the forefront of Apple's security response capabilities, impacting the breadth of Apple's ecosystem by working on immediate risks to Apple's customers. Our mission is to safeguard our users by helping keep billions of devices secure. As a Product Security Operations Engineer, you'll be at the heart of Apple's software security response efforts, acting as the critical liaison and community advocate between the world's most talented security researchers and Apple.
**Description**
You will be instrumental in protecting our users from emerging threats across the entire Apple ecosystem, including iOS, iPadOS, macOS, watchOS, tvOS, visionOS and more. You'll foster a positive, productive, and collaborative relationship with our global security research community by communicating with researchers over email, at conferences, and through direct conversations. Your work will directly translate groundbreaking security research into tangible protections for millions of users worldwide, helping ensure Apple products remain the gold standard for security.
To be successful in this role, you will need to exercise technical agility. Staying up to speed on new, cutting edge security research and how it applies to our products. Competitive candidates will demonstrate strong drive to solve hard problems, sound judgement under pressure, meticulous attention to detail, and exceptional communication skills. You will need to coordinate between many stakeholders, set expectations for deliverables from many different teams, and take ownership of security initiatives.
**Minimum Qualifications**
+ Deep passion and commitment to protecting the security and privacy of Apple's users.
+ A strong foundational understanding of operating system security principles, common vulnerability classes, and attack techniques. You should be able to quickly grasp the essence of a security report and its potential impact.
+ Proven ability to distill complex technical information into clear, concise, and accurate written communication for diverse audiences.
+ Demonstrated ability to manage numerous parallel activities, drive projects to completion independently, and coordinate effectively across diverse internal and external stakeholders.
**Preferred Qualifications**
+ Experience in front-line security analysis, incident response, vulnerability management, or a similar security operations role.
+ Experience engaging credibly and technically with external security researchers, with a focus on fostering collaborative security discussions.
+ Curiosity about or foundational knowledge of Apple-specific security technologies, architectures, and common attack techniques.
+ Experience with one or more general-purpose programming or scripting languages (e.g., Python, Bash, Swift).
+ Minimum of 2-3 years of relevant professional experience in a technical role, or demonstrated equivalent practical experience and passion. BS in computer science or a related technical field.
**Pay & Benefits**
At Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $134,800 and $245,800, and your base pay will depend on your skills, qualifications, experience, and location.
Apple employees also have the opportunity to become an Apple shareholder through participation in Apple's discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple's Employee Stock Purchase Plan. You'll also receive benefits including: Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses - including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation.Learn more about Apple Benefits. ( Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program.
Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics.Learn more about your EEO rights as an applicant ( .
Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics.Learn more about your EEO rights as an applicant ( .
Apple will not discriminate or retaliate against applicants who inquire about, disclose, or discuss their compensation.
Apple participates in the E-Verify program in certain locations as required by law.Learn more about the E-Verify program ( .
Apple is committed to working with and providing reasonable accommodation to applicants with physical and mental disabilities. Reasonable Accommodation and Drug Free Workplace policy Learn more .
Apple is a drug-free workplace. Reasonable Accommodation and Drug Free Workplace policy Learn more .
Apple will consider for employment all qualified applicants with criminal histories in a manner consistent with applicable law. If you're applying for a position in San Francisco, review the San Francisco Fair Chance Ordinance guidelines applicable in your area.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Be The First To Know
About the latest Manager cybersecurity identity lifecycle and authentication services Jobs in Maltby !
Cyber Google Security Operations - Consultant

Posted 15 days ago
Job Viewed
Job Description
Position Summary
As a Google SecOps Consultant, you will play a critical hands-on role in delivering high-impact solutions across multiple high-visibility projects. Your SOC engineering skills and advancing skills in Google SecOps tools, threat detection engineering, and automation development will be essential in building solutions that delight customers and drive measurable value for Deloitte's business objectives.
You will be part of a team that leverages your technical expertise to develop, implement, and optimize Google SecOps threat detection and automation solutions, consistently demonstrating a commitment to high-quality, outcome-focused engineering. Your contributions will help ensure the secure, reliable, and efficient delivery of SOC solutions that meet the needs of both the business and its users.
Recruiting for this role ends on 8/31/2025
The Team
Our Enterprise Security offering embeds security in all aspects of digital transformation by securing a client's technical backbone while enabling secure digital transformation. Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security, and security for emerging technologies and connected products.
Key Responsibilities:
+ Design and implement secure, scalable, and resilient Google SecOps architectures for deploying SIEM and SOAR platforms that comply with enterprise security policies and regulatory requirements (e.g. GDPR, PCI-DSS).
+ Work on end-to-end deployment of log ingestion pipelines using a variety of data fabric technologies and API integrations (e.g. Bindplane + Cloud Feeds).
+ Collaborate with SOC analysts and threat detection engineers to prioritize, develop, and tune threat detection content (rules) within Google SecOps to detect malicious behavior and adversaries within enterprise environments.
+ Translate SOC processes to automation playbooks within SOAR to alleviate alert fatigue and scale alert triage and response.
+ Develop and facilitate custom integrations between third-party platforms and security tooling and Google SecOps to support automated data ingestion, alert enrichment, and response.
+ Support the developments of case management solutions within Google SecOps SOAR to ensure strong operational metrics support and optimization of the analyst experience.
+ Stay current on cyber security threats, vulnerabilities, and compliance trends to enhance organizational security posture.
Required Qualifications:
+ Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (or equivalent work experience).
+ 2+ years of experience in security operations, threat detection engineering, or enterprise IT security.
+ Strong knowledge of security principles and frameworks such as MITRE ATT&CK and Killchain.
+ Proficient scripting skills in Python for automation and integration development.
+ Scripting skills in Gostash or Logstash for log normalization / parsing.
+ Familiarity with ETL (Extract, Transform, Load) pipelines and associated concepts (e.g. Cribl, Bindplane, NXLog, Kafka)
+ Limited immigration sponsorship may be available
+ Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve
Preferred Qualifications:
+ Familiarity with Threat Hunting and Cyber Threat Intelligence fundamentals.
+ Familiarity or experience with Google Cloud's SecOps tool stack and architecture (specifically SIEM and SOAR, FKA Google Chronicle and SIEMplify, respectively).
+ Familiarity in data fabric technologies (Bindplane, Cribl)
+ Foundational knowledge in infrastructure and networking fundamentals, such as IP networking, VPNs, DNS, load balancing, and firewalling concepts.
+ Familiarity with Cloud infrastructure broadly, exposure to multi-cloud environments (AWS, Azure)
+ Experience with SIEM and / or SOAR tools (e.g. Splunk, XSOAR).
+ Experience in Virus Total / Mandiant products and solutions, or Google Threat Intelligence.
+ Familiarity with AI frameworks such as MCP and ADK for agentic workflow development / integration specific to SecOps tooling (e.g. SIEM, SOAR, GTI, ASM)
Information for applicants with a need for accommodation: wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $80,400 - $148,000
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Head of Security Operations (Seattle)
Posted 2 days ago
Job Viewed
Job Description
This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.
As a leader on cyber security in the company, the SecOps team manager will collaborate with our Organisational Learning and Development team to develop playbooks and facilitate SecOps training across Canonical. They will operate in a wider security organisation, run a high performing security team and improve Canonical's security posture. They will lead initiatives to integrate the team's insights into Canonical's broader software development process.
While this is a management position, we expect managers to be expert practitioners, able to lead by example, contribute at the highest level, and assess work based on their own professional experience and skill. Candidates should have deep, hands-on expertise with a range of open source and proprietary security tooling and practices, which they can integrate into a holistic next generation security solution across the breadth of Canonical's interests.
The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
This role reports to the CISO.
What you will do in this role:
- Hire and mentor a team of outstanding technical security professionals
- Define Canonical's SecOps security standards and playbooks
- Own and drive the architecture and design of the SOC
- Analyse and improve Canonical's security architecture
- Evaluate, select and implement new security tools and practices
- Identify, contain and guide the remediation of security threats and cyber attacks
- Grow the presence and thought leadership of Canonical SecOps practice
- Contribute to open source threat intelligence initiatives
- Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
- Develop Canonical SecOps learning and development materials
- Publish blog posts, whitepapers and conference presentations
- Identify, implement and track SecOps KPIs
- Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
- Work with Security leadership to present information and influence change
- Proven track record of mitigating with advanced threat actors and nation state threats
- Expert technical understanding of SOCs from the ground up
- In depth knowledge of SOC architecture and design including strategies for logging, firewalls, network segmentation, honeypots etc
- Someone who understands how the SOC works not just how to use it
- Expert in Linux security
- Ability to define, implement, automate and measure effective incident response playbooks
- Knowledge of security architecture and market-leading security tools
- Experience contributing to, and consuming, threat intelligence feeds
- Experience in security risk management frameworks such as NIST CSF
- An exceptional academic track record from both high school and university
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Confidence to report security performance metrics with accountability for accuracy and completeness
- Experience in offensive or defensive security teams with hands-on ability
- Experience with open source security tools
- Experience with security standards such as ISO 27001
- Experience with security posture management of corporate endpoitns
- Seniority level Director
- Employment type Full-time
- Job function Other, Information Technology, and Management
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Get notified about new Head of Security jobs in Seattle, WA .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrNetwork and Security Operations Senior Manager
Posted 4 days ago
Job Viewed
Job Description
At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.
The Boeing Company is currently seeking a **Network and Security Operations Senior Manager** to join the Network Infrastructure Services & Data Centers (NIS & DC) team in either Seattle, WA; Berkeley, MO; Huntington Beach, CA; North Charleston, SC; Ridley Park, PA; Miami, FL; Huntsville, AL; or Seal Beach, CA.
The selected candidate should have a strong background in Network & Security Operations. In this challenging and exciting role, you will lead a global team of leaders and skilled individual contributors. It is essential for the Senior Manager to foster a culture of Operational Excellence and a commitment to achieving 5 nines reliability, along with Quality Assurance to ensure deployments meet the highest standards. You will collaborate closely with the Executive Director of Network Infrastructure Services & Data Centers and a peer group of Senior Managers overseeing Design, Architecture, Automation, Program Management, and other critical functions.
We are looking for a visionary leader with bold thinking and exceptional leadership skills to drive our newly formed team, ensuring superlative experience for all internal customers. This leader will collaborate closely with peers to proactively address issues before they lead to outages.
If you want to leverage innovative technologies, tackle complex challenges, and make a significant impact in a fast-paced environment, we invite you to apply. Join us in our mission to enhance and advance global network operations at Boeing and help shape the future of connectivity!
**Position Responsibilities:**
+ Lead a global team consisting of leaders, senior network designers, senior network analysts, and network experts to ensure the network and security operations achieve a reliability target of 5 nines
+ Drive a team of experts dedicated to identifying and resolving network issues before they lead to customer-impacting outages
+ Manage a Quality Assurance team to ensure that all network equipment locations worldwide are maintained to the highest level of operational standards
+ Work closely with peers and the Executive Director of Network Infrastructure Services & Data Center to develop and implement the vision and strategy for the Network Operations & Security team
+ Collaborate with the Network Automation, Tools, and Compliance teams to address and resolve issues proactively or immediately after they occur
+ Constantly identify opportunities for automation and work with the Tools & Automation team to develop and deploy the automation
+ Encourage a culture of challenging the status quo and actively bring forward new ideas to enhance the overall effectiveness of NIS & DC
**Basic Qualifications (Required Skills/Experience):**
+ 10+ years of experience in managing and/or leading network operations in a complex environment
+ 10+ years of experience with Cisco and Arista networking, load balancing, firewalls, and related technologies for robust network solutions
+ 5+ years of experience improving network availability towards 99.999% availability
+ 5+ years of experience managing direct reports
**Preferred Qualifications (Desired Skills/Experience):**
+ Bachelor's degree or higher
+ 10+ years of experience with network design, architecture, protocols, and/or operations for effective network management and implementation
+ Experience driving a culture of can-do attitude and innovation
**Drug Free Workplace:**
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies _._
**Pay & Benefits:**
At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities.
The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work.
The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary pay range: $174,250 - $251,850
Applications for this position will be accepted until **Jul. 24, 2025**
**Export Control Requirements:** This position must meet export control compliance requirements. To meet export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. §120.15 is required. "U.S. Person" includes U.S. Citizen, lawful permanent resident, refugee, or asylee.
**Export Control Details:** US based job, US Person required
**Relocation**
Relocation assistance is not a negotiable benefit for this position.
**Visa Sponsorship**
Employer will not sponsor applicants for employment visa status.
**Shift**
This position is for 1st shift
**Equal Opportunity Employer:**
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.