×
Register Here to Apply for Jobs or Post Jobs. X

Lead Security Engineer, GovCloud

Job in San Francisco, San Francisco County, California, 94199, USA
Listing for: Salesforce, Inc.
Full Time position
Listed on 2026-01-15
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Job Description & How to Apply Below
* To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
* Job Category Software Engineering Job Details
**** About Salesforce
**** Salesforce is the #1 AI CRM, where humans with agents drive customer success together. Here, ambition meets action. Tech meets trust. And innovation isn’t a buzzword — it’s a way of life. The world of work as we know it is changing and we're looking for Trailblazers who are passionate about bettering business and the world through AI, driving innovation, and keeping Salesforce's core values at the heart of it all.
** About the team
** Salesforce is looking to hire a Lead Security Engineer for Government Cloud Services. We prioritize security and data protection to ensure the confidentiality, integrity, and availability of our systems and information. As we continue to expand our operations, we are seeking a skilled and experienced Lead Security Analyst to join our dynamic team and play a pivotal role in safeguarding our organization against evolving cyber threats.
As the Lead Security Engineer, you will be responsible for driving the overall security posture of our organization. You will work closely with cross-functional teams to assess risks, implement security measures, monitor security systems, and respond to security incidents. Your expertise in security frameworks, technologies, and best practices will be critical in developing and executing strategies to protect our critical assets and infrastructure.

** What you will be doing:
*** Apply security policies to meet security objectives of the system.
* Assess adequate access controls based on principles of least privilege and need-to-know.
* Assess all the configuration management (change configuration/release management) processes.
* Assess the effectiveness of security controls.
* Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
* Develop and implement comprehensive security policies, procedures, and guidelines to ensure the protection of company assets and compliance with applicable regulations.
* Conduct (or coordinate with third party partners) regular security risk assessments, vulnerability assessments, and penetration tests to identify potential weaknesses in systems, networks, and applications and coordinate remediation of findings. Drive related mitigations.
* Collaborate with stakeholders to design and implement security controls, including firewalls, intrusion detection systems, access controls, and encryption technologies.
* Conduct analysis of logs and events, identify gaps for deeper analysis as needed, and coordinate with Detection and Response teams on detection and alerting betterment efforts and uplift.
* Stay up-to-date with the latest security trends, vulnerabilities, and threat intelligence, and provide recommendations to proactively address emerging risks.
* Liaison with Incident Response teams on incidents and response efforts, recommend and/or instigate remediation actions to prevent future occurrences.
* Develop and deliver security awareness and training programs to educate employees on security best practices and promote a culture of security across the organization.
* Collaborate with external vendors, partners, and auditors to ensure compliance with security standards and regulations. Further, implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
* Maintain documentation of security procedures, incident response plans, and security incident reports.
** What you should have:
*** Experience with using cloud infrastructure as code (IaC), including Terraform, Cloud Formation, or Azure Resource Manager to deploy secure cloud infrastructure, and using version control based on Git
* Professional certifications such as CISSP, CISM, CEH, or similar are highly desirable.
* Proven experience (5+ years) in a security analyst role, with a focus on information security, incident response, and vulnerability management.
* Must be…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary