About the job
Join the Global Product and Tech: CISO team at LivePerson! Our international security team, consisting of 20 dedicated professionals across North America and EMEA, is on the lookout for driven individuals eager to influence security initiatives and foster innovation.
If you thrive on building something from the ground up, identify growth opportunities daily alongside our evolving technology, and establish partnerships that enhance our business, we want to hear from you. You should view feedback as a learning opportunity and believe in data-driven decision-making. Your well-being and that of your colleagues is a priority.
In this position, you'll have the chance to:
- Design, implement, and maintain robust security measures to safeguard LivePerson's computer systems, networks, and information.
- Assess and articulate security requirements for our systems, adhering to industry best practices and regulations.
- Develop comprehensive security plans for our on-premise and cloud-based computer systems.
- Collaborate with various teams to identify, remediate, and mitigate security vulnerabilities within our cloud systems, software, and processes.
- Draft clear guidelines and procedures for our security protocols.
- Configure and troubleshoot issues with security tools and services.
- Create technical solutions to enhance system security and automate repetitive security tasks.
- Act as a key resource for Security Analysts and external security partners regarding complex security challenges.
- Ensure the security of all IT and operational areas, maintaining the integrity, confidentiality, and availability of our data.
- Document, monitor, and report on various security systems and processes to ensure data and system security.
- Assist in selecting optimal security tools in collaboration with other teams to fulfill company requirements.
- Test, enhance, and maintain our security solutions to adhere to the highest security standards.
- Work closely with IT and System teams to bolster the security of our cloud and infrastructure tools, following established security guidelines and best practices.
- Analyze system data to detect unusual or potentially harmful activities.
- Be available for urgent security incidents outside of regular working hours (on-call rotation).

