Security Compliance - Technical Program Manager

Weights & Biases Weights & Biases · Data AI · Bellevue, WA +4 · Technology

This role is a Security Compliance Technical Program Manager focused on driving the HITRUST program end-to-end, ensuring alignment with HIPAA Security, Privacy, and Breach Notification Rules. The individual will partner with Product, Engineering, and Security teams to design and implement secure, scalable, and HIPAA-aligned solutions, manage HITRUST assessments, and act as a liaison for external assessors. The role also involves supporting customer assurance activities and mentoring junior team members.

What you'd actually do

  1. Own and drive the HITRUST program end-to-end, ensuring alignment with HIPAA Security, Privacy, and Breach Notification Rules and obligations under Business Associate Agreements (BAAs)
  2. Define, document, and continuously refine the HITRUST control environment, including data flows, system boundaries, and trust zones for systems that store, process, or transmit electronic Protected Health Information (ePHI)
  3. Partner closely with Product, Engineering, Infrastructure, and Security teams to design and implement secure, scalable, and HIPAA-aligned solutions that meet HITRUST CSF requirements
  4. Lead HITRUST (e1/i1/r2) assessment readiness and certification efforts, including risk-based scoping, gap assessments, control maturity evaluations, and cross-functional remediation programs
  5. Act as the primary liaison for HITRUST External Assessors, managing assessment readiness, validated assessment processes, evidence collection, and certification lifecycle

Skills

Required

  • HITRUST program management
  • HIPAA Security, Privacy, and Breach Notification Rules
  • ePHI protection
  • HITRUST CSF requirements
  • HITRUST External Assessor liaison
  • continuous compliance
  • data protection principles
  • documentation (policies, standards, procedures)
  • stakeholder communication

Nice to have

  • HITRUST CCSFP
  • CISSP
  • CISA
  • CISM
  • CRISC
  • cloud-native security controls
  • automation of evidence collection
  • compliance-as-code

What the JD emphasized

  • HITRUST
  • HIPAA