You could be the one who changes everything for our 28 million members. Centene is transforming the health of our communities, one person at a time. As a diversified, national organization, you’ll have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Cryptographic Governance Program within Enterprise Privacy and Security Risk Management (EPSRM). Provides subject matter expertise to IT and Cybersecurity capability owners who are responsible for implementing the solutions. Works with capability owners, ensuring that cryptographic controls are effectively implemented to protect sensitive data and ensure compliance with regulatory and contractual obligations. Design, implement and operationalize the Cryptographic Governance Program, including identifying any staffing needs. Analyze monitoring and assessments to identify weaknesses and vulnerabilities; collaborate with capability owners to address root causes. Develop and maintain cryptographic policies and standards aligned with industry and regulatory requirements (e.g., encryption, key lifecycle management, certificate management, etc.). Define and track KPI’s and metrics to assess risk and maturity; communicate findings to leadership and stakeholders. Monitor industry trends and regulatory changes; communicate relevant developments to internal stakeholders. Identify emerging and deprecated cryptographic algorithms, coordinate transition planning with impacted teams. Maintain expertise in relevant frameworks and standards (e.g. NIST 800-53, FIPS 140). Ensure timely remediation of identified weaknesses; assist in removing blockers as needed. Document and maintain governance processes and procedures. Develop and promote an enterprise cryptographic strategy and use cases for both on-premises and cloud environments. Collaborate with capability owners (e.g., security engineering, operations, IT infrastructure, application teams (to ensure solutions meet internal standards. Provide guidance on cryptographic techniques such as hashing, key combinations, and digital signatures to ensure data confidentiality and integrity. Define requirements for encryption tools and platforms (e.g., AWS KMS, Azure Key Vault, HSMs, and TLS infrastructure). Performs other duties as assigned. Complies with all policies and standards.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees