Cybersecurity Supply Chain, Supply Chain Intellectual Property Security
Amazon · Sunnyvale, CA · Systems, Quality, & Security Engineering
About this role
Amazon is hiring a mid-level Supply Chain Manager in the operations function based in Sunnyvale, CA. The posting calls out experience with Security, Encryption, Compliance, Incident Response. Compensation is listed at $131,300–$229,700 per year.
- Role
- Supply Chain Manager
- Function
- operations
- Level
- mid
- Track
- Individual contributor
- Employment
- Full-time
- Location
- Sunnyvale, CA
- Department
- Systems, Quality, & Security Engineering
- Posted
- May 18, 2026
More roles at Amazon
Job description
from Amazon careersOverview: We're seeking a Security Supply Chain Assessor to help protect Amazon's global supply chain through comprehensive security assessments and risk management. This role requires international travel (up to 75%) across APAC, North America, and South America Regions. The Cybersecurity Supply Chain Assessor plays a critical role in evaluating and strengthening the security posture of third-party manufacturing and supplier partners across the global supply chain. This position involves conducting on-site cybersecurity assessments of supplier facilities, verifying adherence to corporate and industry security standards, and identifying risks related to data protection, software provisioning, and hardware production environments. The ideal candidate will have deep technical expertise in cybersecurity controls, a strong understanding of manufacturing and supplier ecosystems, and the ability to collaborate cross-functionally with internal and external stakeholders across multiple time zones and regions. Key job responsibilities Conduct on-site cybersecurity assessments of suppliers and contract manufacturers across APAC, North America, and South America. Evaluate supplier environments against company and industry security standards (e.g., ISO 27001, NIST 800-171, and internal security frameworks). Assess security domains including but not limited to: o Artificial Intelligence Security o Network segmentation and access control o Data encryption and protection mechanisms o Endpoint and server security o Secure…