Please Enable Cookies to Continue
Please enable cookies in your browser to experience all the personalized features of this site, including the ability to apply for a job.
Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.
The system cannot access your location for 1 of 2 reasons:
- Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
- Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort
We are seeking a dynamic Sr Systems Engineer with a strong background in Identity and Access Management (IAM) technologies, including Okta, Auth0, and Microsoft EntraID. The ideal candidate will actively engage in the planning, architecture, and execution of IAM systems, serving as a pivotal liaison between the organization and key vendors. This role demands a proactive approach to problem resolution, the ability to lead projects, and a commitment to mentoring technical staff. Collaboration with project managers and technical teams to deliver customer-centric solutions, including the presentation of design and deployment strategies, is essential. This role requires a proactive stance on...
The Vulnerability Management Application Security Lead works within Berkley’s Information Security team, interacting directly with stakeholders to address issues related to remediation of vulnerability scanning and assessment. The Vulnerability Management Analyst’s support activities are focused on helping key stakeholders understand their vulnerability results, providing guidance on the remediation of failing threats, and evaluating false positives.
A Data Architect at Berkley Technology Services is a visionary who designs and implements cutting-edge solutions that drive business operations, analytics, and data engineering forward. They are the crucial link between business and technical teams, translating business needs into actionable technical strategies and ensuring transparency for informed decision-making. By collaborating with other architects, they create comprehensive solutions that propel the entire organization.
In this role, you'll set the standards and best practices that shape our data landscape. You'll evaluate...
The Information Security Software Engineer will be responsible for designing, implementing, and maintaining the organization's information security systems, programs and security as code. They will work closely with architects, developers and business units to ensure the protection of sensitive data and minimize the risk of cyber-attacks.
- Design and implement robust, scalable, and secure APIs Integrations.
- Collaborate with cross-functional teams to define API requirements and ensure seamless integration.
- Maintain and enhance existing APIs to improve...
The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC.This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley...