New Career Bootcamp

The Cure for Career Confusion

  • Career Clarity Coaching
    • First Coaching Session Preparation
    • New Client Orientation & Welcome Document
    • Research Job & Career Ideas
      • Job Idea Evaluation Workbook
      • 100 – Overview of Job & Career Idea Research
      • 110 – How to Use the Job Search Profiles
      • 120 – How To Research Job & Career Ideas (Initial Strategies)
      • 140 – Salary Research Tools
      • 150 – Explore Industry Ideas
      • 160 – Research Other Peoples’ Career Transitions to Job Titles that Appeal to You
      • 170 – How to Research Job Titles at Companies that Appeal to You
      • 180 – Informational Interviews
    • How to Choose the Right New Career
      • Create a Career Vision Summary
      • Reduce Dimensionality
      • Don’t Trust Your Gut (Without Testing It)
      • Beware of the Giant Spreadsheet
      • Attain Distance
      • Conduct a Risk Analysis
      • Integrated Thinking
      • Accept Uncertainty
      • Ikigai Career Map
      • Marshall Goldsmith Strategy to Evaluate Job & Career Ideas
    • Do You Need To Be Passionate About Your Job?
    • Training Programs for Technology Jobs & Careers
    • Resumes, Job Search, Interviewing & More
  • Quick Question Coaching
  • Job Search Breakthrough
    • Job Search Strategies Overview
    • Weekly Job-Search Campaign Tools & Planner
    • How Long Will It Take You To Land A New Job?
    • Agency Recruiters
      • How to Find Recruiters in Your Target Niche
    • Enhance Your Job Search with LinkedIn’s Home Page
    • The Simple Social Media Job Search Strategy
  • Online Job Search
    • Module 1: Introduction & Overview
    • Module 2: Top Strategies To Find Relevant, Advertised Job Openings
      • (2.1 – Part 1) Use The Best Job Boards To Find Advertised Job Openings
      • (2.1 – Part 2) Best Startup Job Boards
      • (2.3) Clever Way To Use LinkedIn To Find Appealing Companies That Might Have Job Boards
      • (2.4) How To Set Up Job Search Alerts To Stop Wasting Your Time
      • (2.5) Is It A Waste Of Time To Apply If You’re Not Perfectly Qualified?
      • (2.6) What is the Best Time to Submit Your Application Online?
      • (2.7) How Many Jobs a Week Should You Apply to?
      • (2.8) Should You Post Your Resume on Job Boards?
    • Module 3: Tips & Tricks For Submitting Your Resume & Cover Letter For More Success
      • (3.1) 4 Ways To Quickly Tailor Your Resume To Win More Interviews
      • (3.2.1) Write A Blockbuster Cover Letter That Positions You For A Career Change
      • (3.2.2) Handling Salary Info in a Cover Letter
      • (3.3) Best Practices For Submitting Your Resume & Cover Letter
      • (3.3.1) What to do if You’re Applying Online and There’s a Salary Box
      • (3.4) Should You Follow Up With Human Resources?
    • Module 4: Get Insider Help To Win Job Interviews
      • (4.1) Why Company Employees Will Help You (Even If They Don’t Know You)
      • (4.2) How To Find Helpful Company Insiders To Maximize Your Success
      • (4.3) Unknown Ways To Use LinkedIn To Find Helpful Insiders
      • (4.4) How To Choose The Best Company Insiders To Talk To
      • (4.5) The Most Effective Ways To Contact Company Insiders You Don’t Know
      • (4.6) Do This To Ensure A Successful Conversation With Company Insiders
      • (4.7) Best Questions To Ask Company Insiders To Get The Information & Help You Want
      • (4.8) Steal These Sample Thank You Notes
    • Module 5: Fly by HR & Get to the Real Decision Maker
      • (5.1) Identify the REAL Decision Maker
      • (5.2) Access Nearly Any Hiring Manager’s LinkedIn Profile
      • (5.3) Get Nearly Any Hiring Manager’s Contact Information
      • (5.4) The Interview Magnet Letter Formula
      • (5.5) Interview Magnet Samples
      • (5.6) Get Your Interview Magnet Letter Into The Hands of the Hiring Manager
    • Implementation Coaching
  • Hidden Job Search
    • Module 1: Welcome to Hidden Job Search Breakthrough!
      • (1.1) Why You Must Search for Unadvertised Job Openings
      • (1.3) Mindset For Success
    • Module 2: Hidden Job Search Strategy Overview
      • (2.1) Super Strategy Overview
      • (2.2) Action Steps & Program Table of Contents
      • (2.3) Discover The Two Types of Hidden Job Searches
    • Module 3: Identify Many Companies That Could Hire You
      • (3.1) Define Your Target Market
      • (3.2) How Many Potential Employers Is Enough?
      • (3.3) The Best Ways to Build A List Of Potential Employers
      • (3.5) Job Search Organization
      • (3.6) Classify Potential Employers
    • Module 4: The “Customized” Strategy
      • (4.1) Select The Best Companies To Target
      • (4.2) How To Easily Identify Hiring Managers And Insider Connections
      • (4.3) Best Research Strategies To Win More Job Interviews
      • (4.4) How To Use Informational Interviews To Increase Your Success
      • (4.5) Top Strategies To Comfortably Contact Hiring Managers
      • (4.6) Discover How To ‘Keep In Touch’ So Hiring Managers Yearn For You
    • Module 5: The “Universal” Strategy
      • (5.1) Select Potential Employers To Target
      • (5.2) Top Strategies To Easily Identify People Who Might Want To Hire You Today
      • (5.3) The Universal Job Magnet Letter Formula (With Samples)
      • (5.4) Best Ways To Quickly And Easily Contact People Who Can Hire You
    • Module 6: Best Ways To Find People Who Can Hire You… Or Help You Get A Job
      • (6.1) 6 Quick Ways To Identify People Who Could Hire You
      • (6.2) Best Practices for Using Advanced Searches On LinkedIn To Find People Who Could Hire You
      • (6.3) Unknown Strategies To Find Insider Connections On LinkedIn
      • (6.4) Networking Strategies
      • (6.5) Little Known Strategies To Access Nearly Anyone’s LinkedIn Profile
      • (6.6) Hush Hush Ways To Get Nearly Anyone’s Contact Information Fast
    • Implementation Coaching
  • Job Search Networking
    • Introduction
    • 6 Myths & Facts About Networking
    • Personal Job Search Networking Training Modules
      • Module 1: How to Begin
      • Module 2: Be Effective – Prioritize Your Networking List
      • Module 3: 5 Key Strategies for Success Job Search Networking
      • Module 4: 7 Sample Networking Request Letters
      • Module 5: How to Create Your Elevator Pitch (With Samples)
      • Module 6: Creating Your Personal Marketing Plan
      • Module 7: What to Say (and Avoid) in Networking Conversations
      • Module 8: Sample Thank You Note For Networking Help
      • Module 9: Keep in Touch and the Law of Sevens
      • Module 10: The One+ Strategy
    • Event Networking
      • Find Networking Events Worth Going To
      • Make the Most of Networking Events
    • Networking Business Cards & Samples
  • Interview Breakthrough
    • Welcome to Interview Breakthrough!
    • (1.1) Action Steps and Program Table of Contents
    • Module 2: Mindset for Success
      • (2.1) The Art of Turning Interviews Into Enjoyable Conversations
      • (2.2) The Four Hot Buttons of Every Hiring Manager
      • (2.3) Turn Lemons Into Lemonade
      • (2.4) Dealing with Rejection
    • Module 3: Prepare to Win Job Offers
      • (3.1) Background Research
      • (3.2) What Salary Are You Worth?
      • (3.3) Get Insider Help To Win Offers
        • (3.3.1) Why Company Employees Will Help You (Even If They Don’t Know You)
        • (3.3.2) How To Find Helpful Company Insiders
        • (3.3.3) Use LinkedIn To Find Helpful Insiders
        • (3.3.4) Choose The Best Company Insiders To Talk To
        • (3.3.5) The Most Effective Ways To Contact Company Insiders You Don’t Know
        • (3.3.6) Do This To Ensure A Successful Conversation With Company Insiders
        • (3.3.7) Best Questions To Ask Company Insiders To Get The Information & Help You Want
        • (3.3.8) Sample Thank You Notes
      • (3.4) Make a Strong First Impression
    • Module 4: Get the Salary You Deserve
      • (4.1) Salary Research
      • (4.2) Here’s YOUR Salary Discussion Strategy
      • (4.3) What to Say When They Want to Know Your Salary History & Requirements
        • (4.3.1) Handling Salary Info in a Cover Letter
        • (4.3.2) Handling Online Salary Boxes
        • (4.3.3) Handling Salary Discussion DURING an Interview
    • Module 5: Interview Questions & Answers
      • (5.1) Handle Job Interview Questions With Ease
      • (5.2) Interview Question & Answer Guide
      • (5.3) Prepare for These Potential Interview Questions
      • (5.4) Tell Me About You…
      • (5.5) Questions YOU Can Ask at a Job Interview
    • How to Give a Killer Presentation
    • Module 6: Interview Strategies That Win Job Offers
      • (6.0) Participate (and look good) in Skype Interviews
      • (6.1) Ace Your Phone Interviews
      • (6.2) Align Your Experience With The Position
      • (6.3) Discover What the Interviewer REALLY Wants
      • (6.4) Eliminate the Interviewer’s Doubts About You
      • (6.5) How to Prove You Can Do a Job You Haven’t Done (Webinar)
      • (6.6) Handling Salary Discussions DURING Interviews
      • (6.7) How to Close Your Interview
      • (6.8) Essential Do’s and Dont’s
    • Module 7: Seal the Deal (What to do after the Interview)
      • (7.1) How Did You Do?
      • (7.2) Keep In Touch For More Success
      • (7.3) Send This Instead of A Thank You Note
      • (7.4) 90-Day Plan
      • (7.5) Top Tips for Handling References Professionally During Your Job Search
    • Module 8: Handling Job Offers Successfully
      • (8.1) How to Stall a Job Offer
      • (8.2) Job Offer Evaluation Checklist
      • (8.3) Signs That a Company Is a Bad Apple
      • (8.4) Avoid a Mess – Checkout Your New Boss
      • (8.5) Handling Salary Negotiations
      • (8.6) Should You Let an Executive Recruiter Negotiate Your New Salary?
      • (8.7) Ready to Accept a Job Offer? Read These Documents Carefully First
      • (8.8) Accept a Job Offer the Right Way
      • (8.9) Using an Outside Offer to Get a Raise
    • Module 9: How to Choose the Right Job Offer
      • (9.1) Create a Career Vision Summary
      • (9.2) Reduce Dimensionality
      • (9.3) Don’t Trust Your Gut (Without Testing It)
      • (9.4) Beware of the Giant Spreadsheet
      • (9.5) Attain Distance
      • (9.6) Conduct a Risk Analysis
      • (9.7) Integrated Thinking
      • (9.8) Accept Uncertainty
    • Module 10: Interview Correspondence
      • (10.1) Sample Letter Withdrawing From Consideration
      • (10.2) Sample Letter Accepting a Job Offer
      • (10.3) Sample Letter Declining a Job Offer Because of a Low Salary
      • (10.4) Sample Letter Declining a Job Offer Because You Don’t Want the Job
      • (10.5) Sample Letter to Write When You Don’t Get a Job Offer But You Want a Second Chance at Getting It
      • (10.6) Sample Letters Thanking a Reference
      • (10.7) Sample Job Resignation Letter
    • Implemetation Coaching
  • Gift Certificates
  • Contact

Security Engineer | Security Analyst

Here are sample job advertisements for these types of roles:


Principal Security Engineer – Strategy

Indeed
 
Salary

$161,000 – $199,000 a year (2021)

Job Type
Full-time

Your Job

As a Principal Information Security Engineer you will present your technical expertise balanced with common sense and an understanding of the Indeed enterprise. While you will always encourage your fellow team members, your customers, and Indeed’s clients to do “the right thing” based on data from the tools and processes you build that support the established policies and standards, you recognize that issues, risks and solutions are colored in shades of grey.
You provide just a part of security to the enterprise that depends on tight coordination and constant communication with other parts of the security organization and, most often, with other parts of Indeed.
A Security Engineer is a life-long learner. You may be an expert in one domain, but always seeking clarity in others. You tinker at home in security domains that may have nothing to do with your role, but you share that expertise with your team and your customers.

Responsibilities
  • Serve as the lead technical advisor to the Director of Security Strategy & Planning
  • Facilitate the implementation of Security controls.
  • Participate in the development and review of the cybersecurity and privacy program, including policies, standards, and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
  • Develop, report, and monitor cybersecurity measures of performance (e.g., Key Performance Indicators, Key Risk Indicators)
  • Develop and deliver ongoing cybersecurity and privacy education and training for organizational personnel, in collaboration with the Security Awareness program
  • Maintain currency with recommended cybersecurity and privacy practices, techniques, and technologies
  • Contribute to Indeed’s knowledge through documentation, awareness content, and other inter- and intra-team activities.
  • Stay up-to-date with trends in the information security community including new vulnerabilities, methodologies, and products.
  • Provide technical consultation to Risk Management and Compliance processes, including (but not limited to) providing technical input to risk assessments as needed, and identifying compensating countermeasures to reduce risk and exposure to threats.
  • Contribute to development of Business Impact Analysis (BIA), plans for Supply Chain Risk Management, and Data Protection Impact Assessments (DPIA)

Who You Are

  • 10+ years experience as a Security Engineer or Architect in a dynamic and responsive enterprise-level security function, in a rapidly growing and changing technical environment
  • Documented evidence of professional competence, as demonstrated by industry recognized certifications such as OSCP, OSCE, CISSP, or CISM, or other evidence of successful performance
  • 5+ yrs. experience in open source development environments and on-premises and cloud based infrastructure platforms
  • Experience at least five (5) security domains such as: Incident Response, Application Security, Infrastructure Security, Endpoint Security and Response, Detection Engineering, Network Security, Cloud Security, Compliance, Governance, Cryptography, IAM, Privacy, Risk Management, Threat Intelligence, Offensive Security/PenTesting, or Red Teams.
  • Solid understanding of, and experience with, a mature Security program, including identification and implementation of controls frameworks
  • Demonstrated interest and engagement with the larger security community
  • Demonstrated understanding of Risk Management and Compliance frameworks
  • Demonstrated experience developing and delivering written and verbal Security awareness content

Who we are

We are builders, we are integrators. We create and optimize solutions for a rapidly growing business on a global scale. We work with distributed infrastructure, petabytes of data, and billions of transactions with no limitations on your creativity.

Our Mission

As the world’s number 1 job site*, our mission is to help people get jobs. We strive to cultivate an inclusive and accessible workplace where all people feel comfortable being themselves. We’re looking to grow our teams with more people who share our enthusiasm for innovation and creating the best experience for job seekers. *comScore Total Visits, March 2019

Salary Range Disclaimer

The base salary range represents the low and high end of the Indeed salary range for this position. Actual salaries will vary and may be above or below the range based on factors including but not limited to location, experience, and performance. The range listed is just one component of Indeed’s total compensation package for employees. Other rewards may include quarterly bonuses, Restricted Stock Units (RSUs), an open Paid Time Off policy, and many region-specific benefits.

Salary Range Transparency

US Remote 161,000 – 199,000 USD per year

Equal Opportunities and Accommodations Statement

Indeed is deeply committed to building a workplace and global community where inclusion is not only valued, but prioritized. We’re proud to be an equal opportunity employer, seeking to create a welcoming and diverse environment. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, family status, marital status, sexual orientation, national origin, genetics, neuro-diversity, disability, age, or veteran status, or any other non-merit based or legally protected grounds.
 

Security Analyst

Optiver US
Austin, TX

Optiver’s Cyber Security team defines and drives the firm’s approach to information security: setting standards, implementing defenses, training users, and responding to incidents. Our cross-disciplinary approach allows us to make the best choices in the context of all our systems and processes, finding optimal solutions for the needs of the business while achieving an effective security posture.

We are looking for candidates with a technical background, who are driven to solving security problems, with strong attention to detail, and who have a willingness to learn and adapt.

What you’ll do:

  • Monitor and react to security events
  • Define and implement security policies, procedures, and technologies
  • Track general developments in computer security, and plan the firm’s response
  • Provide security expertise and advice to other teams within the company
  • Define best practices cybersecurity training for employees
  • Collaborate with other operations, development, and trading teams to solve business challenges
  • Work at a technology-driven company where you can make an immediate impact

What you’ll need:

  • Bachelor’s Degree
  • Broad understanding of and deep interest in computer security
  • Maintain good cybersecurity practices in your own personal life
  • Good communication skills, and the ability to explain security best practices to a non-technical audience
  • General understanding of computers, networks, operating systems, applications, and the web
  • An engineering mindset when approaching new problems
  • Willingness and aptitude for learning new skills and adapting to new technologies
  • Proficiency with programming or scripting a plus
  • Knowledge of finance or trading is not required
  • Legal authorization to work in the U.S. is required; we will not sponsor individuals for employment authorization for this job opening

Who we are:

Optiver is a leading proprietary trading firm using technology to provide the most up-to-date and competitive prices in financial products around the world. Put simply, we improve the markets. Achieving this requires excellence in everything we do. That’s not merely an aspiration, but our reason for being.

We’re seeking people who up the ante with nerve, with guts and, most importantly, with heart. We’re looking for the bold. Does that describe you? Then opt in.


Cyber Security Analyst (Remote Opportunity)

Data Innovations, LLC
 
6 reviews
Colchester, VT•Remote

Full Job Description

The Data Innovations Cybersecurity Analyst has a passion for cybersecurity and will collaborate with development to ensure security risks are identified, analyzed and mitigated within the Data Innovations product portfolio. In addition, this is a key role in helping to establish a cybersecurity governance program, collaborating with stakeholders across all business units. This role will also participate in the strategic planning and implementation of the cybersecurity program for Data Innovations including helping to achieve compliance with SOC2, ISO 27001 or other standards as needed.

Essential Functions and Responsibilities:

  • Responsible for planning, organizing, and executing vulnerability scanning across all products.
  • Collaborate with development to drive progress towards a model of continuous integration and continuous delivery of vulnerability scanning.
  • Report all vulnerability findings to development and collaborate with engineers to provide guidance on remediation or mitigation of the findings.
  • Establish metrics and Key Performance Indicators (KPIs) and lead regular security reporting.
  • Work closely with the Director of Software Quality Assurance to define and implement process and security program improvements.
  • Assist in the creation and maintenance of the application Threat Models.
  • Participate in vendor and tooling selection evaluation and provide recommendations to management for scanning solutions as well as Manual Penetration Testing providers.
  • Implement selected tooling and coordinate Manual Penetration Testing with the vendors across the products.
  • Review security documentation and product architecture documents to determine security status of products and applications including Cloud products.
  • Perform security audit and compliance tasks for all applications.
  • Assist in the response and completion of security questionnaires from customers.

 

Requirements

Knowledge, Skills, and Abilities:

  • Understanding of security best practices, standards, and compliance initiatives
  • Strong critical thinking and analytical skills
  • Experience with cloud computing
  • At least 1 year of experience with Threat Modeling.
  • 2 years of experience with vulnerability scanning, remediation and mitigation.
  • 2 years of experience with commercially available and open-source vulnerability scanning tools
  • Excellent communication skills and ability to work with individuals and teams across departments.
  • Experience in regulated industry preferred
  • Cybersecurity or information security certificates preferred

Education and/or Experience

  • Bachelor’s Degree in Computer Science or Information Technology, or related discipline OR at a combination of education and related working experience from which comparable knowledge and skills can be acquired.

Sr. Staff Security Engineer

The Walt Disney Company (Corporate)
The Sr. Staff Identity Architect will be responsible for the complete architecture & engineering components of the entire Identity Management Domain, with a focus on consumer Identity while also supporting Workforce Identity. In this role, they will provide architecture direction, design and implementation consultation as well as security controls and policy criteria and establishment. Key areas of focus will include Authentication & Authorization, Federation, Privileged Access Management, provisioning & governance of identity and identity data. The role will be responsible for documenting, designing and maintaining IAM architecture and how all functions, technologies, and services fit together. They will also be responsible for leading cross organizational and department interactions on engineering and architecture use cases that both impact IAM as well as where IAM will impact other services and technologies. This role will also be responsible for identifying, evaluating and participating in decision making around new and emerging technologies and directional changes in the IAM space and how they will be leveraged and impact TWDC both in the consumer as well as workforce areas. .
This role will also be directly responsible for engaging and partnering with multiple groups across TWDC to advance the CIP strategy.

Responsibilities:

  • Partner and establish a practice around consumer Identity Security Architecture and a strategy to achieve it.
  • Engage in BU architecture and engineering design and reviews of both technical and process design and implementations
  • Define and drive policy definitions and enhancements, as well as risk identification and remediation direction for identified identity security gaps
  • Set direction and establish a broad companywide reference architecture with a security focus that aligns to the consumer identity business and technical strategy as well as adapts to growing industry changes
  • Provide subject matter expertise and consultative services across the technology and business environments in the practices and design requirements around IAM
  • Provide technical leadership and oversight to the broader Identity architecture and other architecture teams


Basic Qualifications:

  • Minimum 10 years in information security organizations
  • 5+ years of success architecting & designing Identity platforms and services within large organizations with a focus on Consumer Identity / Consumer Data Protection
  • Proven technical knowledge to expand and mature services while delivering sustained success
  • Proven record of delivering business critical projects within challenging time frames, multiple stake holder groups and competing priorities
  • Broad and detailed understanding of IAM both as it relates to consumers as well as workforce
  • Understanding of overall security landscape including concepts around governance, compliance, security controls
  • Detailed understanding of IAM concepts such as AuthN/AuthZ, federation, access management etc.
  • Experience in areas such as device management & protection, data management, process and control frameworks
  • Training: CISSP or equivalent


Required Education

  • BA/BS in business or computer science or appropriate work experience


Preferred Education

  • Masters in Computer Science/Cyber Security or appropriate work experience

Principal Security Engineer – Identity and Access

Amazon.com Services LLC
 
 
  • BS in Computer Science or related field, or equivalent work experience
  • 10 + years of experience in identifying security issues and risks, and developing mitigation plans
  • 4+ years of experience in network, system, or software architecture; design, implementation, support, and evaluation of security-focused tools and services
  • 4+ years of scripting or programming experience in Ruby, Python, Shell/BASH scripting, Java, C/C++, C*, Perl, or other languages
  • 2+ years of threat modelling, pen testing, and / or performing vulnerability assessments.
  • 2+ years of experience in identity and access management (IAM).
  • Strong information security risk-based prioritization abilities.

Amazon Customer Service is one of the largest customer service organizations in the world. Our tens of thousands of Customer Service Associates around the globe provide world-class support to customers 24 hours a day, 7 days a week, and in over 15 languages (and growing).
The Customer Service Identity and Access Management (CSIAM) team is looking for a motivated and highly-skilled Principal Security Engineer, who exhibits a passion for security, and a desire to innovate to protect customer data and Customer Service applications and capabilities. Customer Service is core to our brand, and we are in the critical path of virtually every initiative across all of Amazon. CS Security is responsible for driving innovative enhancements that raise the bar for how customers, Customer Service Associates, and Amazonian interact with Customer Support resources, systems, and data. This team dives deep into security technologies such as new threat detection technologies, access control systems, endpoint security, and the security of new services and business models. The objective of this program is to define the innovative preventative, detective, and monitoring mechanisms to enable security at scale.
This role is the primary Identity and Access Management security engineer responsible for the security vision and thought leadership for the CSIAM organization. The successful candidate is one who has a combination of troubleshooting, technical, and communication skills, to enable the design and delivery of multi-year plans, product and software development to enable innovative and custom solutions for Authentication and Authorization across the World Wide Customer Service suite of tools. A Security Engineer at Amazon is expected to be strong in multiple domains and provide solutions to complex business problems and apply appropriate technologies while following security engineering best practices. You are expected to mentor more junior engineers; identify and prioritize organizational needs; and ensure that delivered solutions successfully raise the security bar.
The successful candidate will foster constructive dialogue and collaboratively seek resolution when confronted with discordant views. Engineers in this role participate fully in the planning of the CS Security team’s work and constantly seek opportunities for process improvement.

  • Strong creative thinking and analytical skills to proactively identify security needs across the Customer Service organization
  • Strong social skills for building partnerships and rapport to communicate and mitigate risks.
  • Strong information security risk-based prioritization abilities.
  • Experience collaborating with agile software development teams to integrate security requirements with the software development lifecycle
  • Have experience generating automated metrics to measure service and program effectiveness and consistency
  • Have excellent written and verbal communication skills with the ability to present complex technical information in a clear and concise manner to a variety of audiences
  • Demonstrable teamwork skills and resourcefulness
  • Possess self-drive to keep moving things forward even in the face of ambiguity and imperfect knowledge (avoid “analysis paralysis”)
  • Strong sense of ownership, urgency, and drive
  • Sharp analytical abilities and proven design skills
  • Be a good human who enjoys working working with a fun team

Amazon is committed to a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. For individuals with disabilities who would like to request an accommodation, please visit https://www.amazon.jobs/en/disability/us

Member Login

You are not currently logged in.








» Lost your Password?

Copyright © 2025 · Epik Theme on Genesis Framework · WordPress · Log in