Arcadia is dedicated to happier, healthier days for all. We transform diverse data into a unified fabric for health. Our platform delivers actionable insights for our customers to advance care and research, drive strategic growth, and achieve financial success. For more information, visit arcadia.io.
Why This Role Is Important to Arcadia
We are looking for an experienced and highly skilled individual to lead our Cloud Security Engineering team. This role involves not only safeguarding clients’ data and our company’s computer networks and systems but also playing a key role in shaping our security strategy, mentoring junior team members, and leading complex security projects.
The ideal candidate combines information security expertise with aligned technical capabilities to assess, design, and implement controls across a cloud-based infrastructure. This role will support ongoing compliance efforts and certification/recertification of industry-best security frameworks, including ISO 27001, HITRUST, and SOC-2, while also operating and implementing new technical controls to meet Arcadia’s evolving products and security challenges.
What Success Looks Like
In 3 months
- Complete company orientation and specific cybersecurity training
- Familiarize yourself with the company's security infrastructure, policies, and procedures
- Developing competency around day-to-day upkeep of EDR, AV, firewall services, and other security services
- Beginning planning and execution of longer-term project-based work around security tooling and monitoring
- Lead and complete critical security projects, such as enhancing security architecture, improving incident response plans, or implementing new security tools
- Participate in incident response drills or simulations to understand the practical aspects of identifying, responding to, and mitigating security incidents
In 6 months
- Start exploring automation for routine security tasks using scripting languages like Python
- Take on more responsibility in incident response activities
- Begin contributing ideas to security strategies and improvements
- Review the vulnerability landscape and understand general threats and where they lie within the environment
- Begin actively analyzing threat intelligence and contributing to threat reports
In 12 months
- Start independently conducting threat analyses and vulnerability assessments
- Establish personal and professional goals for the next phase of your career with the company