Company Overview
KLA is a global leader in diversified electronics for the semiconductor manufacturing ecosystem. Virtually every electronic device in the world is produced using our technologies. No laptop smartphone wearable device voice-controlled gadget flexible screen VR device or smart car would have made it into your hands without us. KLA invents systems and solutions for the manufacturing of wafers and reticles integrated circuits packaging printed circuit boards and flat panel displays. The innovative ideas and devices that are advancing humanity all begin with inspiration research and development. KLA focuses more than average on innovation and we invest 15% of sales back into R&D. Our expert teams of physicists engineers data scientists and problem-solvers work together with the worlds leading technology providers to accelerate the delivery of tomorrows electronic devices. Life here is exciting and our teams thrive on tackling really hard problems. There is never a dull moment with us.Group/Division
The Information Technology (IT) group at KLA is involved in every aspect of the global business. ITs mission is to enable business growth and productivity by connecting people process and technology. It focuses not only on enhancing the technology that enables our business to thrive but also on how employees use and are empowered by technology. This integrated approach to customer service creativity and technological excellence enables employee productivity business analytics and process excellence.Job Description/Preferred Qualifications
We are seeking a Security Tools Manager to lead the strategy deployment and operations of endpoint security technologies across the enterprise. This role owns the endpoint security toolset end-to-end from architecture and implementation to daily operations and continuous improvement while managing a team of engineers and partnering closely with SOC IT and infrastructure teams. This role combines hands-on technical leadership with people and program management ensuring endpoints are protected against modern threats while maintaining usability and business productivity.
Endpoint Security & Tools Ownership
Own and manage enterprise endpoint security platforms including EDR/XDR endpoint protection device control DLP and endpoint privilege management agents.
Lead the design deployment configuration and optimization of endpoint security tools across Windows macOS and Linux environments.
Ensure endpoint security tools integrate effectively with SIEM SOAR SOC workflows and identity platforms.
Define endpoint hardening standards baselines and security policies.
Operations & Incident Response
Oversee endpoint-related security incidents investigations and remediation efforts.
Partner with SOC teams to improve detection response and automation related to endpoint threats.
Manage tool health agent performance upgrades and lifecycle management.
Drive root cause analysis and continuous improvement following incidents.
People & Program Management
Lead mentor and develop a team of endpoint security engineers.
Prioritize work manage roadmaps and track delivery of endpoint security initiatives.
Establish operational processes documentation and KPIs for endpoint security tooling.
Manage vendor relationships licensing and renewals.
Strategy & Stakeholder Collaboration
Define the security agents roadmapaligned with Zero Trust and defense-in-depth strategies.
Partner with Cybersecurity IT operations desktop engineering IAM and compliance teams to balance security and user experience.
Evaluate new endpoint security technologies and lead POCs and rollouts.
Preferred Qualifications
Experience integrating endpoint tools with SIEM/SOARplatforms (Elastic Google SecOps etc.).
Familiarity with MDM/MAMsolutions (Intune JAMF Workspace ONE).
Experience in regulated or large enterprise environments.
Certifications such as CISSP GCED GCIA SentinelOne Proofpoint or CyberArk certifications.
Minimum Qualifications
Required Qualifications
Bachelors degree in Computer Science Cybersecurity or related field (or equivalent experience).
10 years of experience in endpoint security or endpoint engineering with 4 years in a lead or management role.
Strong hands-on experience with one or more endpoint security platforms such as:
EDR : SentinelOne CrowdStrike Microsoft Defender for Endpoint Carbon Black
DLP: Forcepoint Proofpoint and Digital Guardian
EPM: CyberArk Beyond Trust
Experience managing enterprise endpoint environments (Windows/macOS; Linux a plus).
Solid understanding of endpoint attack techniques and MITRE ATT&CK.
Interns are eligible for some of the benefits listed. Our pay ranges are determined by role level and location. The range displayed reflects the pay for this position in the primary location identified in this posting. Actual pay depends on several factors including state minimum pay wage rates location job-related skills experience and relevant education level or training. We are committed to complying with all applicable federal and state minimum wage requirements where applicable. If applicable your recruiter can share more about the specific pay range for your preferred location during the hiring process.
KLA is proud to be an Equal Opportunity Employer. We will ensure that qualified individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process to perform essential job functions and to receive other benefits and privileges of employment. Please contact us at or at 1- to request accommodation.
Be aware of potentially fraudulent job postings or suspicious recruiting activity by persons that are currently posing as KLA employees. KLA never asks for any financial compensation to be considered for an interview to become an employee or for equipment. Further KLA does not work with any recruiters or third parties who charge such fees either directly or on behalf of KLA. Please ensure that you have searched KLAs Careers website for legitimate job postings. KLA follows a recruiting process that involves multiple interviews in person or on video conferencing with our hiring managers. If you are concerned that a communication an interview an offer of employment or that an employee is not legitimate please send an email to to confirm the person you are communicating with is an employee. We take your privacy very seriously and confidentially handle your information.
Required Experience:
Manager
Calling the adventurers ready to join a company that's pushing the limits of nanotechnology to keep the digital revolution rolling. At KLA, we're making technology advancements that are bigger—and tinier—than the world has ever seen. Who are we? We research, develop, and manufacture t ... View more