Director, Information Security

ExecutiveITNephrology
From $218K/yr(estimated)

Description

<div class="content-intro"><p><strong>Company Overview</strong></p> <p>Join us for an enriching journey with Outset, a trailblazing medical device company that is revolutionizing the field of dialysis. Our focus is to create one high performing team, obsessed with progress, in an atmosphere that is brimming with transformative opportunities. The heart of our mission is pioneering a groundbreaking technology that redefines the landscape of dialysis, streamlining complexity and cost, because patients deserve “better” now, not some day.  </p> <p>At Outset we’re revolutionizing an industry and changing lives. We’re impacting what the future of dialysis looks like by creating a first-of-its-kind technology in order to reduce the cost and complexity of dialysis. FDA cleared for use across care settings, from the hospital to the clinic to the home, the Tablo® Hemodialysis System harnesses modern technology for a new holistic approach to dialysis care. We’re giving providers time back to focus on patient care. And we’re giving patients the power to take control of their life and get back to enjoying the things they love.</p></div><p><strong><span data-contrast="none">Position Overview: </span></strong><span data-ccp-props="{"201341983":0,"335551550":1,"335551620":1,"335559685":0,"335559731":0,"335559737":0,"335559739":0,"335559740":259,"335559991":10}"> </span></p> <p><span data-contrast="auto"><span data-ccp-parastyle="Normal (Web)">Outset is seeking a hands-on information security leader to drive our cybersecurity and technology risk management program. This individual will </span><span data-ccp-parastyle="Normal (Web)">be responsible for</span><span data-ccp-parastyle="Normal (Web)"> developing and enforcing security policies, managing governance, risk, and compliance (GRC) activities, executing security operations, and leading strategic projects to advance our security posture</span><span data-ccp-parastyle="Normal (Web)">.</span><span data-ccp-parastyle="Normal (Web)">  </span><span data-ccp-parastyle="Normal (Web)">In this role, you </span><span data-ccp-parastyle="Normal (Web)">will collaborate cross-functionally with software engineering, IT Infrastructure, quality, regulatory, </span><span data-ccp-parastyle="Normal (Web)">legal</span><span data-ccp-parastyle="Normal (Web)"> </span><span data-ccp-parastyle="Normal (Web)">and other key stakeholders to continuously evolve and strengthen our cybersecurity program.</span></span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><span data-contrast="auto"><span data-ccp-parastyle="Normal (Web)">This role requires a passion for protecting company assets and a strategic mindset to design and implement scalable security solutions. The ideal candidate will bring deep </span><span data-ccp-parastyle="Normal (Web)">expertise</span><span data-ccp-parastyle="Normal (Web)"> in both on-premises and cloud security, </span><span data-ccp-parastyle="Normal (Web)">including insights into </span><span data-ccp-parastyle="Normal (Web)">cloud </span><span data-ccp-parastyle="Normal (Web)">native security </span><span data-ccp-parastyle="Normal (Web)">solutions for </span><span data-ccp-parastyle="Normal (Web)">Microsoft 365 and AWS</span><span data-ccp-parastyle="Normal (Web)"> platforms</span><span data-ccp-parastyle="Normal (Web)">.</span></span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><span data-contrast="auto"><span data-ccp-parastyle="Normal (Web)">We’re</span><span data-ccp-parastyle="Normal (Web)"> looking for a leader with exceptional problem-solving skills, </span><span data-ccp-parastyle="Normal (Web)">high attention to detail, </span><span data-ccp-parastyle="Normal (Web)">strong organizational acumen, and a proven </span><span data-ccp-parastyle="Normal (Web)">track record</span><span data-ccp-parastyle="Normal (Web)"> of building enterprise-grade security programs. </span><span data-ccp-parastyle="Normal (Web)">This is a high-impact opportunity to shape the security foundation of Outset’s mission-driven organization</span><span data-ccp-parastyle="Normal (Web)"> – one that is </span><span data-ccp-parastyle="Normal (Web)">reimagining dialysis </span><span data-ccp-parastyle="Normal (Web)">and working to catalyze change </span><span data-ccp-parastyle="Normal (Web)">for patients who deserve better</span><span data-ccp-parastyle="Normal (Web)">.</span></span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559731":0,"335559737":0,"335559738":0,"335559739":0,"335559740":240,"335559991":10}"> </span></p> <p><strong><span data-contrast="none">Essential Job Functions and Responsibilities:</span></strong><span data-ccp-props="{"201341983":0,"335551550":1,"335551620":1,"335559685":175,"335559737":0,"335559739":145,"335559740":259,"335559991":10}"> </span></p> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Serve as the Security Lead and Subject Matter Expert (SME) for all environments, including cloud infrastructure, and on-premises systems.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Continuously assess and evolve the organization’s security posture—driving program maturity through strategic assessments, road mapping, stakeholder alignment, and project execution.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Monitor the external threat landscape to identify emerging attack vectors, vulnerabilities, and adversary tactics—translating threat intelligence into actionable insights that inform security strategy, initiatives and controls.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Ensure security practices and controls align with regulatory requirements, including FDA and HIPAA, and fulfill the requirements and obligations of the HIPAA security officer.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">Support commercial functions by responding to customer cybersecurity due diligence questionnaires and security assessments—articulating Outset’s security posture, controls, and compliance practices directly to Customers.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">Lead the vendor security risk assessment process—evaluating third-party partners for compliance with Outset’s security standards, identifying potential risks, and ensuring appropriate controls are in place.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="7" data-aria-level="1"><span data-contrast="none">Conduct technical evaluations of system architecture with a focus on security design and compliance, leveraging frameworks such as NIST CSF and NIST SP 800-53.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="8" data-aria-level="1"><span data-contrast="none">Provide strategic leadership in identifying, assessing, and mitigating information security risks; ensure alignment with internal policies and external standards.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="9" data-aria-level="1"><span data-contrast="none">Monitor emerging threats and lead the organization’s response to security incidents, serving as the primary control point and convening the Incident Response Team to investigate, contain, and resolve events.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="10" data-aria-level="1"><span data-contrast="none">Develop, maintain, and enforce enterprise cybersecurity policies, standards, and procedures, ensuring alignment with regulatory requirements, industry frameworks, and organizational risk tolerance.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-aria-posinset="11" data-aria-level="1"><span data-contrast="none">Influence technology and architecture decisions as a key member of the IT leadership team.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <p><strong><span data-contrast="none">Required Qualifications:</span></strong><span data-ccp-props="{"201341983":0,"335551550":1,"335551620":1,"335559685":190,"335559737":0,"335559739":145,"335559740":259,"335559991":10}"> </span></p> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">10+ years of industry experience in an information security function; leadership experience preferred.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">B.S. or M.S. in Computer Science, Information Security, or a related field.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Professional security certifications such as CISSP, CISM, CISA, CCSP, or CEH (or equivalent). Additional certifications like Microsoft Certified: Cybersecurity Architect or AWS Certified Security – Specialty are a plus.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Proven experience leading organizations through security certifications and audits, including SOC 2, HIPAA, FIPS, and HITRUST.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">Demonstrated expertise with cloud security tools and telemetry platforms including experience with AWS (CloudTrail, IAM, Incognito, GuardDuty) and Microsoft 365 (Defender, Entra ID, Purview, Sentinel).</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">Strong knowledge of risk assessment tools, technologies, and methodologies.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="7" data-aria-level="1"><span data-contrast="none">Exceptional written and verbal communication skills, with the ability to influence technical and non-technical stakeholders.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="8" data-aria-level="1"><span data-contrast="none">Experience in highly regulated industries.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <p><strong><span data-contrast="none">Desired Qualifications</span></strong><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559685":190,"335559737":2,"335559739":145,"335559740":259,"335559991":10}"> </span></p> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="9" data-aria-level="1"><span data-contrast="none">Experience in FDA regulated industries, specifically Medical Device, is strongly preferred.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="10" data-aria-level="1"><span data-contrast="none">Experience in customer-facing technical roles, with the ability to translate complex security concepts into business-aligned recommendations.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="11" data-aria-level="1"><span data-contrast="none">Experience planning, researching, and developing security policies, standards, and procedures.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="12" data-aria-level="1"><span data-contrast="none">Hands-on experience implementing enterprise security capabilities such as identity and access management (IAM), data loss prevention (DLP), endpoint detection and response (EDR), extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation and response (SOAR).</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="13" data-aria-level="1"><span data-contrast="none">Familiarity with mobile code, malware analysis, and endpoint protection technologies.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="14" data-aria-level="1"><span data-contrast="none">Proficiency in deploying logging and monitoring tools at scale, with an emphasis on automation and event-driven response.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="15" data-aria-level="1"><span data-contrast="none">Expertise in designing secure networks, systems, and application architectures.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul> <ul> <li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{"335552541":1,"335559685":885,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="16" data-aria-level="1"><span data-contrast="none">Experience with disaster recovery planning, digital forensics, and incident response tools and techniques.</span><span data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559739":145,"335559740":259}"> </span></li> </ul><div class="content-pay-transparency"><div class="pay-input"><div class="title">SF Bay Area Salary Range</div><div class="pay-range"><span>$218,000</span><span class="divider">—</span><span>$295,000 USD</span></div></div><div class="pay-input"><div class="description">National Salary Range</div><div class="title">National Salary Range (Remote)</div><div class="pay-range"><span>$185,000</span><span class="divider">—</span><span>$251,000 USD</span></div></div></div><div class="content-conclusion"><p><strong><span data-contrast="auto">Company Culture</span></strong></p> <p><span data-contrast="auto">At Outset, we believe every person matters. Every Outsetter, every patient, every caregiver. Because we are here to create a revolution, and we believe in doing that by innovating everywhere with intelligent speed. Our team expects nothing less than our best display of strengths and skills, and we find joy in working together for a common goal. At Outset, we believe that curiosity, ingenuity and conviction in the power of technology will transform the lives of dialysis patients and providers.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <p><span data-contrast="auto">We are fueled by the opportunity to give people their lives back. And we believe that it begins with YOU, our future Outsetter. At Outset, we’ve designed a professional world that our employees are honored and impassioned to belong to, one that offers challenge, the ability to collaborate with great people, and opportunities to build skill and expertise in a fulfilling career.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <p><span data-contrast="auto">An opportunity at Outset Medical won’t just be about finding a job. Our culture revolves around the principles of moving farther, faster, together, so working here feels like a masterclass in peak performance, for individuals and teams.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <p><span data-contrast="auto">Privacy is important to us. Please review our </span><a href="https://www.outsetmedical.com/wp-content/uploads/Applicant-Privacy-Notice.pdf"><strong><span data-contrast="none"><span data-ccp-charstyle="Hyperlink">Applicant Privacy Notice.</span></span></strong></a><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <p> </p> <p><strong>Important Notice</strong></p> <p>We have been made aware of fraudulent activities where individuals are impersonating our company and offering fake job opportunities. Please note, Outset Medical will never request payment or gift cards during the hiring process, nor will we ask you to purchase your own equipment. Anyone reaching out to you with an email address ending in @outsetmedical.cc, is not a legitimate Outset representative. <strong>For legitimate opportunities, always apply directly through our official careers page.</strong> If you are unsure about the authenticity of a communication, contact us immediately at <a href="mailto:peopleops@outsetmedical.com">peopleops@outsetmedical.com</a>.</p> <p> </p> <p><strong><span data-contrast="auto">EQUAL EMPLOYMENT OPPORTUNITY STATEMENT</span></strong><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <p><span data-contrast="auto">Outset Medical is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind on the basis of race, color, national origin, religion, gender, gender identity, sexual orientation, disability, genetic information, pregnancy, age, or any other protected status set forth in federal, state, or local laws. This policy applies to all employment practices within our organization.</span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p></div>
Outset Medical

Outset Medical

BIOTECHNOLOGY

Dialysis Device

LocationSAN JOSE, CA
Open Jobs30
Nephrology
View Company Profile

Pipeline

Intermittent Renal Replacement Therapy using the Tablo Hemodialysis SystemN/A
Tablo Hemodialysis SystemN/A
Dialysate Flow RateN/A
Tablo Hemodialysis SystemN/A
Tablo Hemodialysis SystemN/A