Cyber Security & Risk

What you can expect
The Manager of Enterprise Security will lead the design, implementation, and continuous improvement of enterprise security programs that protect the organization’s data, networks, endpoints, cloud environments, and identities.
This role requires a balance of technical depth, strategic thinking, and strong leadership skills to manage cross-functional security initiatives. A key to success in this position is the ability to foster empathy, agency, and partnership across teams—enabling effective communication, collaboration, and program execution within a complex enterprise environment.
About the Team
The Enterprise Security team drives the design, implementation, and management of security programs across data, network, endpoint, cloud, and identity domains. They collaborate with technology, compliance, and business teams to integrate security into processes and projects, ensure regulatory compliance, and protect the organization’s systems and information at scale.
Responsibilities
Developing and managing enterprise security programs across data, network, endpoint, cloud, and identity domains, while leading secure architecture design to ensure scalable and compliant frameworks. Acting as a trusted advisor to technology, compliance, and business teams to embed security into processes and projects.
Overseeing Data Loss Prevention (DLP) technologies, data classification, and encryption strategies to ensure the confidentiality and integrity of sensitive data in line with regulatory and organizational requirements. Designing and implementing security controls that enable the safe, compliant, and responsible use of AI technologies.
Managing network-based access controls and next-generation security technologies (including SASE and firewall architectures), while leading endpoint security initiatives such as EDR and endpoint protection platforms. Ensuring consistent patching, hardening, and monitoring standards across devices.
Overseeing Cloud Security Posture Management (CSPM) solutions to maintain visibility and compliance across multi-cloud environments. Collaborating with cloud engineering teams to enforce security best practices across IaaS, PaaS, and SaaS platforms.
Driving implementation of IAM frameworks, including multi-factor authentication (MFA), privileged access management (PAM), and role-based access controls. Partnering with HR, IT, and business units to ensure seamless identity lifecycle management.
Managing cross-functional security programs to align with business objectives and measurable outcomes. Building and leading a high-performing team, and communicate security strategies, risks, and priorities to both technical and non-technical stakeholders.
What we’re looking for
Have a Bachelor’s degree in Computer Science, Information Security, or a related field.
Bring 7+ years of experience in cybersecurity, including at least 3 years in a leadership or management role.
Demonstrate expertise in secure architecture design and implementation.
Have hands-on experience with: DLP and data protection solutions; Cloud Security Posture Management (CSPM) tools; Endpoint Security and EDR platforms; Network Access Controls and SASE-based security.
Have a good understand of IAM principles and technologies.
Hold professional certifications (e.g., CISSP, CISM, CCSP, CEH), which would be a bonus.
Salary Range or On Target Earnings:
Minimum:
$124 000,00Maximum:
$271 200,00In addition to the base salary and/or OTE listed Zoom has a Total Direct Compensation philosophy that takes into consideration; base salary, bonus and equity value.
Note: Starting pay will be based on a number of factors and commensurate with qualifications & experience.
We also have a location based compensation structure; there may be a different range for candidates in this and other locations
At Zoom, we offer a window of at least 5 days for you to apply because we believe in giving you every opportunity. Below is the potential closing date, just in case you want to mark it on your calendar. We look forward to receiving your application!
Anticipated Position Close Date:
Ways of Working
Our structured hybrid approach is centered around our offices and remote work environments. The work style of each role, Hybrid, Remote, or In-Person is indicated in the job description/posting.
Benefits
As part of our award-winning workplace culture and commitment to delivering happiness, our benefits program offers a variety of perks, benefits, and options to help employees maintain their physical, mental, emotional, and financial health; support work-life balance; and contribute to their community in meaningful ways. Click Learn for more information.
About Us
Zoomies help people stay connected so they can get more done together. We set out to build the best collaboration platform for the enterprise, and today help people communicate better with products like Zoom Contact Center, Zoom Phone, Zoom Events, Zoom Apps, Zoom Rooms, and Zoom Webinars.
We’re problem-solvers, working at a fast pace to design solutions with our customers and users in mind. Find room to grow with opportunities to stretch your skills and advance your career in a collaborative, growth-focused environment.
Our Commitment
At Zoom, we believe great work happens when people feel supported and empowered. We’re committed to fair hiring practices that ensure every candidate is evaluated based on skills, experience, and potential. If you require an accommodation during the hiring process, let us know—we’re here to support you at every step.
If you need assistance navigating the interview process due to a medical disability, please submit an Accommodations Request Form and someone from our team will reach out soon. This form is solely for applicants who require an accommodation due to a qualifying medical disability. Non-accommodation-related requests, such as application follow-ups or technical issues, will not be addressed.
Fraudulent Employment Offers
Zoom is aware of scams that involve fake Zoom job listings posted on third-party sites. Responding applicants are contacted primarily over email, InMail and/or chat applications by people impersonating Zoom employees. Eventually a fake offer letter is sent in exchange for personal identification information as part of a fake new-hire screening process.
Please be advised that these offers, communications and impersonations are illegitimate and fraudulent. All communication with Zoom employees come from a “@zoom.us” email address. Zoom job applicants complete an interview process including in-person (on Zoom) meetings and phone calls. Our process also requires you to create an account with our applicant tracking system, Workday.
Zoom will never ask for your personally identifying information during the interview process or ask you to pay money or purchase equipment. If you have received a message from Zoom that appears suspicious, please contact us here.
Zoom uses cookies and similar technologies as described in our cookie statement. You can manage your cookie settings or exercise your rights related to cookies through our Cookies Settings.