Sr Cyber Governance, Risk, and Compliance Analyst
Listed on 2025-12-23
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
Position SummaryA Governance, Risk, and Compliance (GRC) Senior Analyst is a Cybersecurity professional responsible for the maintenance and support of Cybersecurity’s many programs (including risk management, compliance, and vulnerability management) that meets the parameters prescribed by the Office of the CISO for the organization.
Primary ResponsibilitiesAn individual contributor in the Cybersecurity department that is chartered with supporting the company’s Cybersecurity program. Responsible for assisting with management and monitoring the company’s security risks, security compliance guidelines and controls, security awareness training, vulnerability management and development / dissemination of best-practice standards, policies and procedures. The individual will work with various functions throughout the enterprise to evaluate the design and effectiveness of the control environment and maintain the security posture of the program.
- Responsible for upholding F5’s Business Code of Ethics and for promptly reporting violations of the Code or other company policies.
- Assist with audit, risk management, and compliance program
- Support and improve security, risk management, and control framework, including Secure Software Development Lifecycle and Data Security Posture Management
- Monitor internal compliance against information security governance frameworks by conducting routine testing and internal control reviews as well as enterprise security risk assessments
- Identify and communicate control gaps, evaluate management remediation action plans, and provide ongoing monitoring of resolution
- Execute annual assessment program including customer and external compliance assessments (ISO 27001/17/18, IT SOX, SOC 2, FedRAMP, HIPPA and PCI-DSS) and required vulnerability assessment, including remediation activities
- Maintain awareness of external regulations and industry standards for new or modified requirements (FedRAMP, GDPR, PCI-DSS, CCPA, NIST 800-53, ISO 27001, etc.)
- Perform assessments of supporting third parties to evaluate current security posture and monitor ongoing adherence to F5’s information security requirements
- Assist with management of the security assessment program
- Lead and improve supporting of security assessments, including third-party security assessment and customer security questionnaires.
- May assist with performing legal security reviews of contracts on request of Legal department.
- May work with external vendors to perform assessments (i.e., pen testing, assessments) as directed.
- Develop knowledge pertaining to Threat Model Assessments
- Assist with management of the vulnerability management program
- Review and analyze highly complex remediation of findings.
- Monitor, notify and/or assist with remediation steps for identified vulnerabilities.
- Engage with stakeholders to address outstanding vulnerabilities.
- May assist with reporting on status of program to Cybersecurity Leadership or other management teams.
- Performs other related duties as assigned.
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
Knowledge,Skills and Abilities
- Expert familiarity with systems and network infrastructure security technologies, including application/OS hardening techniques, network protocols, network & application firewalls, intrusion detection systems.
- Expert hands‑on familiarity with security risk‑assessment tools & techniques (vulnerability testing, penetration testing, social engineering, etc)
- Excellent…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).