Ulta Beauty, Inc.other related Employment listings - Bolingbrook, IL at Geebo

Ulta Beauty, Inc.

Overview:
Live the experience.
From professional empowerment to continual learning opportunities.
From ongoing investment in new and emerging technologies to a career of self-determination.
At Ulta Beauty, our tech team is critical to our scalability--and is recognized that way.
We've been defined as a mature start-up.
A place where interdepartmental exposure, open doors, and genuine collaboration is ubiquitous.
Where challenges come fast and furious, requiring agility, mental dexterity, and creativity.
Where our passion for better solutions drives us and is core to who we are.
We're engineering for the future of retail, and it's no-holds-barred.
But for those motivated by continual change and ambiguity, by superior leadership, by whip smart colleagues who will press you daily for your very best, you'll find that virtually nothing's impossible at Ulta Beauty.
:
THE IMPACT YOU CAN HAVE:
The IT Cloud Security Architect serves as an expert resource for security and compliance applying best practice frameworks and technologies to develop actionable security blueprints, models, designs, standards, and guidelines to ensure enterprise information technology architecture is consistent with industry requirements and Ulta's security posture.
The architect will collaborate with all business units and leadership teams and will foster a security-minded culture in application development teams.
YOU'LL ACCOMPLISH THESE GOALS BY:
Information Security:
Owns the governance, selection, design, justification, implementation, and management strategies to maintain the security, confidentiality, integrity, availability, accountability, and relevant compliance of cloud supported systems, data flows, databases, and applications.
Relationship Management:
The Architect collaborates with other members of the team (including onshore and offshore consultants), to ensure successful delivery of enterprise products and improve our information security posture.
They work closely with key stakeholders and maintain high quality standards while operating in a highly dynamic and fast paced environment.
Architectural Design and Application Support:
Designs and/or facilitates secure cloud architectures for high availability, scalability, and maintainability.
Advises on CI/CD pipeline configuration and use, infrastructure/security/detection-as-code functionality at scale in multiple workstreams.
PRINCIPLAL DUTIES &
Responsibilities:
Proven experience securing Google Cloud Platform (GCP), Microsoft Azure, and applications deployed to these platforms.
Expert knowledge in cloud related tools including CNAPP (Prisma Cloud), CSPM, Terraform, CI/CD Pipelines, Secret detection, and vaulting tools.
Experience with configuring, deploying, and monitoring serverless services, service mesh, Data lakes, MLOps, secret management, and Encryption techniquesExcellent technical and non-technical documentation skills including security standards, policies, guidelines, and procedures, change documentation, enterprise end-user communications, technical knowledge articles, infrastructure diagrams, and process charts.
Deeply articulate in security risks associated with SaaS services, their integration with legacy on-premises systems, and commonly associated security solutions.
Experience performing enterprise security risk assessments, selecting appropriate technical controls, liaising with business partners through the project lifecycle, and complete risk-acceptance handling of residual risks.
:
ESSENTIALS FOR SUCCESS:
8
years of progressive career experience focusing on GCP Cloud Security and Application Security Architecture.
5
years development experience with solid programming abilities including Powershell, Python, YAML, WebService API's.
Knowledge of IT security best practice controls across multiple technologies and processesHighly motivated, proactive and ability to work independently.
Excellent interpersonal skills and the ability to interact well with internal and external stakeholders, and technical and non-technical business partners.
Flexibility of providing support during odd hours, weekends, and peak seasonsAble to prioritize and execute tasks in a high-pressure environment.
Proven record of accomplishment of delivering high quality solutions on time and on schedule.
PREFERRED
Qualifications:
Bachelor's degree in computer science, a related field, or applicable work experienceInfosec certifications such as ISC2 (CISSP or CCSP) or ISACA (i.
e.
:
CRISC, CISA, CISM, etc.
)Technical infosec certifications such as Google Certified Security Engineer, Google Certified Professional Cloud Architect About:
At Ulta Beauty (NASDAQ:
ULTA), the possibilities are beautiful.
Ulta Beauty is the largest North American beauty retailer and the premier beauty destination for cosmetics, fragrance, skin care products, hair care products and salon services.
We bring possibilities to life through the power of beauty each and every day in our stores and online with more than 25,000 products from approximately 500 well-established and emerging beauty brands across all categories and price points, including Ulta Beauty's own private label.
Ulta Beauty also offers a full-service salon in every store featuring--hair, skin, brow, and make-up services.
We will consider for employment all qualified applicants, including those with arrest records, conviction records, or other criminal histories, in a manner consistent with the requirements of any applicable state and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the San Francisco Fair Chance Ordinance, and the New York City Fair Chance Act.
About the Company:
Ulta Beauty, Inc.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.