Cyber Security Analyst
Cyber security analyst job in New York, NY
Job Title: Sr. Cybersecurity Risk Analyst
Duration: 24+Months
Responsibilities:
Build new risk processes and implement risk frameworks to enable better monitoring and evaluation of risks across the City;
Manage complex, cross-functional projects, pushing through ambiguity and challenges which may arise;
Work with stakeholders across various divisions, soliciting input and working through feedback;
Evaluate risk of third parties used by New York City agencies;
Document and track remediation of risks in the Risk Register;
Review and analyze various cybersecurity risk cases, justification, and exceptions documents submitted by agencies;
Assist in the development of cybersecurity risk assessment procedures and testing methodologies based on established frameworks and guidelines;
Initiating corrective actions to remediate vulnerabilities or weaknesses where necessary;
Engage in communications with NYC Agencies;
Handle special projects and initiatives as assigned.
Required Sklls:
A minimum of 4 years of experience in risk management or cybersecurity risk assessment or 4 years of experience evaluating and managing third parties in a cybersecurity team.
DESIRABLE SKILLS/EXPERIENCE:
BS/BA degree in Cybersecurity, Risk Management, Information Systems, Computer Science, or a related field.
One or more of the following certifications are a plus:
Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Certified Information Security Manager (CISM)
CompTIA Security+
CompTIA Network+
CompTIA A+
CompTIA CySA+
Cisco Certified Network Associate - CCNA
CEH: Certified Ethical Hacker
GIAC Information Security Fundamentals (GISF)
GIAC Security Essentials (GSEC)
(ISC)2 Systems Security Certified Practitioner (SSCP)
Ability to work effectively in a team environment.
Being highly organized, motivated and a self-directed professional.
Knowledge of hardware, software, data, and network principles and systems related to Private and/or Public Sectors services.
Understanding of commonly used computer operating systems, databases, network structures.
Familiarity with cybersecurity framework(s) (NIST, SANS, PCI, ISO 27001/27002, or CIS)
Investigative and analytical skills.
Excellent oral and written communication skills;
Knowledge of the current and evolving cyber threat landscape;
Knowledge of laws, regulations, policies, and ethics related to cybersecurity and information privacy;
Cyber Command Forensic Analyst
Cyber security analyst job in New York, NY
Contact Details:
1.Poonam Khandelwal
Email: poonam.khandelwal@peer-consulting.com
Cell: (732) 797-9766
Job Title: Cyber Command Forensic Analyst
Duration: 48 months
Years of Experience: 8+ years
Required Hours/Week: 35hrs/week
Job Description:
The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause, extent and consequences of the breach.
Research and develop new techniques, and procedures to continually improve the digital forensics process.
Produce high quality written work product presenting complex technical issues clearly and concisely.
Managing and maintaining the analysis labs and forensics tools leveraged for investigations.
Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements.
Assisting the Cyber Emergency Response Team during critical incidents.
Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based forensic analysis.
Mandatory Skills/ Experience:
Candidates who do not have the mandatory skills will not be considered.
Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools.
Desirable Skills/ Experience:
Experience with a wide range of forensic tools (FTK, X-Ways, SIFT, AXIOM, EnCase, etc.)
Experience with memory analysis tools (i.e. Volatility, MemProcFS)
Experience with Linux and open source tools
Experience investigating intrusions on Windows and Linux/Unix operating systems
Experience with performing forensics collections in cloud environments (AWS, Azure, GCP)
Knowledge of gathering, accessing, and assessing evidence from computer systems and electronic devices
Knowledge of virtual environments
Knowledge of forensic imaging techniques
Knowledge of Microsoft Windows operating system and Windows artifacts
Knowledge of Linux/UNIX operating systems and artifacts
Knowledge of mac OS operating system and forensics artifacts
Knowledge of file systems
Strong analytical skills
Vice President, Application Cyber Security Specialist
Cyber security analyst job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Cyber Security Engineer
Cyber security analyst job in New York, NY
JOB FUNCTION
The Cybersecurity Engineer will be responsible for implementing and maintaining the firm's cybersecurity technology solutions, monitoring for security incidents and vulnerabilities, coordinating end user activities, and participating in the investigation and response of any breaches or attacks. The ideal candidate will be a self-starter who can work both independently and collaboratively with diverse technical and business teams. He or she will report to the Chief Information Security Officer. Additional responsibilities include:
Managing the vulnerability management program, including internal and external scanning, monitoring threat feeds, news sources, and vendor bulletins for risks and tracking remediation
Maintaining and monitoring control baselines, hardening standards, asset/coverage metrics, and configuration compliance
Monitoring and documenting key performance indicators (KPIs) and governance, risk, and compliance (GRC) evidence
Suggesting and evaluating new technologies
Educating employees on security best practices to reduce the risk of human error
Collaborating with the Cloud, Systems, Network, Database, Desktop, and Development engineering teams on risk identification, analysis, and remediation
Assisting with vendor due diligence
Assisting with physical security infrastructure projects, maintenance, and updates
QUALIFICATIONS
The ideal candidate should have the following experience:
3+ years of experience in a Security Engineer role
Proficiency with managing EDR solutions, SIEM, network security, cloud security, mobile security, vulnerability management, identity and access management, encryption, and a solid understanding of operating systems like Windows and Linux
Strong ability to analyze security data, identify threats, and create effective solutions
Ability to document and communicate technical information clearly to both technical and non-technical audiences
Scripting/automation experience a plus
The ideal candidate possesses the following traits:
Creativity: the ability to deploy different approaches and be resourceful.
Intellectual curiosity: passion for learning and investigating a broad range of subject matter; satisfaction derived from the consumption and understanding of information and increasing knowledge base.
Accountability: ownership of individual responsibilities and work product.
Strong people skills: ability to build relationships internally and externally and to be versatile in engaging with different constituents.
Cyber Security Specialist
Cyber security analyst job in New York, NY
Akkodis is seeking a Cybersecurity Operations Specialist role is a Direct hire with a client located in NYC 10022 (Hybrid). Ideally looking for applicants to have a solid background in Security operations, SOC, Financial services, FINRA, SEC would come as a big plus.
Salary Range: $130k-$140k/Annum + Benefits, The salary may be negotiable based on experience, education, geographic location, and other factors.
We are seeking a Cybersecurity Operations Specialist to join our security operations team and play a hands-on role in monitoring, protecting, and improving the firm's cybersecurity posture.
This position focuses on day-to-day security operations, vulnerability management, and incident response across our on-premise and cloud environments (AWS and Microsoft 365). The ideal candidate has strong technical knowledge of endpoint protection, identity management, and network security, combined with an analytical mindset and attention to detail suitable for a regulated financial environment.
Key Responsibilities:
Security Operations & Monitoring
Monitor and investigate alerts from CrowdStrike Falcon XDR, Microsoft Defender, and Intune.
Conduct triage and escalation of suspicious activities in coordination with infrastructure and IT teams.
Maintain visibility and reporting through Tenable Security Center and Nessus vulnerability scans.
Support log analysis, correlation, and event tracking through integrated dashboards or SIEM platforms.
Vulnerability & Patch Management
Perform routine vulnerability assessments and track remediation status.
Collaborate with system administrators to ensure timely patching of Windows, Linux, and network devices.
Validate risk reduction and patch compliance before closing findings.
Endpoint & Identity Security
Administer and monitor Symantec Endpoint Protection Manager (EPM) and Microsoft Intune policies.
Enforce endpoint encryption (Corporate Laptop), application control, and posture management.
Manage Microsoft Entra (Azure AD) identity policies, MFA enforcement, and conditional access rules.
Review privileged account usage and assist in quarterly access recertification.
Network & Cloud Protection
Support network segmentation, VPN access, and firewall change reviews on Juniper platforms.
Monitor ZScaler logs for anomalous web traffic or policy violations.
Assist with AWS and Microsoft 365 security baselines, configuration hardening, and identity governance.
Security Awareness & Compliance
Administer and report on employee phishing and training campaigns via KnowBe4.
Support audit requests (FINRA, SEC, SOC1/2) by preparing evidence and log samples.
Maintain documentation of incidents, vulnerabilities, and security control tests.
Incident Response & Reporting
Participate in incident containment, investigation, and remediation.
Collect forensic artifacts (logs, screenshots, binaries) as directed by the CISO.
Prepare post-incident summaries and lessons-learned documentation.
Qualifications:
Required
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
3-5 years of experience in security operations, SOC, or IT security support.
Working knowledge of EDR/XDR platforms (CrowdStrike, Defender), vulnerability scanners (Nessus), and firewall/IDS systems.
Understanding of Windows/Linux administration, TCP/IP networking, and cloud identity management.
Strong analytical, documentation, and communication skills.
Preferred
Experience with regulated financial institutions (FINRA, SEC, NFA, CFTC).
Certifications such as CompTIA Security+, CySA+, Microsoft Certified: Security Operations Analyst, or GIAC GSEC.
Familiarity with scripting or automation (PowerShell, Python) for security tasks.
If you are interested in this role, then please click APPLY NOW. For other opportunities available at Akkodis, or any questions, feel free to contact me at *********************************.
Equal Opportunity Employer/Veterans/Disabled
Benefits offerings include but are not limited to:
• 401(k) with match
• Medical insurance
• Dental Insurance
• Vision assistance
• Paid Holidays Off
To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit ******************************************
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
· The California Fair Chance Act
· Los Angeles City Fair Chance Ordinance
· Los Angeles County Fair Chance Ordinance for Employers
· San Francisco Fair Chance Ordinance
Software Security Engineer
Cyber security analyst job in New York, NY
Software Security Engineer (Agentic AI Platform)
We are partnered with a fast moving AI company that recently closed an eight figure seed round and is now building the core technical foundation that will support their next phase of growth. The founders are experienced second time operators moving with serious velocity and they have brought us in to help make a mission critical early hire.
This is a rare opportunity to join at the ground level and take full ownership of the infrastructure, security posture, and enterprise readiness of a product already gaining strong traction with financial and enterprise customers.
What You Will Do
Design build and maintain scalable secure and resilient cloud infrastructure for a high performance AI platform.
Define and implement cloud security standards authentication guardrails and enterprise grade controls such as SSO RBAC and audit logging.
Lead the companies readiness for SOC2 and ISO compliance and partner closely with the founders to navigate enterprise requirements.
Own the technical architecture for any infrastructure or security blockers encountered with large customers.
Build robust observability systems including metrics logging and tracing to support reliability at scale.
Design and ship production systems end to end from concept to architecture to deployment.
Collaborate with AI engineering and product teams to ensure infrastructure supports rapid iteration growth and enterprise expansion.
What We Are Looking For
Three or more years of hands on experience across backend engineering infrastructure or security engineering.
Strong cloud security fundamentals with Azure experience especially helpful.
A proven ability to architect and maintain production grade cloud systems.
Experience building secure scalable services with strong engineering rigor.
Comfort working directly with fast moving founders in an AI native environment.
Experience preparing for or leading SOC2 or ISO compliance efforts is a major plus.
Location
New York City.
Compensation
$200k - $300k Base Salary + Founding Level Equity
At CodeRed Partners we are committed to supporting equal opportunity employers and helping build diverse and inclusive teams. People are at the center of everything we do and we are proud to partner with companies shaping the future of AI through technical excellence trust and authentic collaboration.
Senior Cyber Security Engineer (IAM, PAM, SOAR)
Cyber security analyst job in New York, NY
Senior Cyber Security Engineer, NYC Hybrid (3 Days a week Onsite)
Our client is a financial services provider and they're looking for a senior engineer with real depth in Python OO and CyberArk or Swimlane to step into a high impact role. This is a hands-on position in a stable environment where you will own serious engineering problems and build the next generation of identity and PAM controls.
What you will work on:
• Engineering CyberArk (IAM/PAM) integrations and custom PAM solutions
• Building Python based tooling, APIs, and automation that matter
• Strengthening enterprise identity platforms across a complex environment
• Collaborating with senior architects while still owning the code
What we are looking for:
• Python object-oriented engineering, not scripting
• CyberArk (IAM/PAM) or Swimlane (SOAR) engineering experience
• Infrastructure security background
• 15+ years' experience in Engineering and/or Cyber Security
• Experience in financial services or large enterprise is a plus
Who usually fits this role:
• Identity and PAM platform engineers
• SOAR engineers who build with Python
• Infra security engineers tired of purely operational work
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Apply now: Cloud Security Engineer (Principal InfoSec Specialist), location is Hybrid (Philadelphia, PA). The start date is 12/22/25 for this contract-to-hire position.
Job Title: Cloud Security Engineer (Principal InfoSec Specialist)
Location-Type: Hybrid (80% remote, 20% onsite - Philadelphia, PA)
Start Date Is: 12/22/25
Duration: 6-month contract-to-hire
Compensation Range: $80-102/hr on W2 ONLY
Job Description:
Serve as a subject matter expert for cloud security architecture and controls, driving risk-based outcomes and optimizing cloud security operations in a hybrid multi-cloud environment.
Day-to-Day Responsibilities:
Design, implement, and optimize cloud security controls and tools
Support cloud migration and secure cloud services delivery
Collaborate across internal teams and vendors on security architecture
Manage security tools like EDR, SIEM, IAM, CSPM
Lead or support incident response, system hardening, and compliance activities
Participate in audits, risk assessments, and governance forums
Mentor junior InfoSec engineers
Ensure alignment with industry standards and compliance frameworks
Requirements:
Must-Haves:
Bachelor's Degree
12+ years of IT experience, with 6+ years in InfoSec and 3+ years in IAM, RBAC, or related areas
Strong experience with cloud/virtualization technologies (Azure preferred)
Experience with multi-cloud security, identity management, and regulatory compliance
Proficiency in tools like Microsoft Defender, Sentinel/Splunk, Wiz, Entra ID, Terraform
CISSP certification
Nice-to-Haves:
Cloud security certifications (e.g., Azure Security Engineer, AWS Certified Security)
Experience working with high-performance matrixed teams
Familiarity with clinical systems (e.g., Epic, Lawson) and SDLC methodologies
Benefits:
This role is eligible to enroll in both Mondo's health insurance plan and retirement plan. Mondo defers to the applicable State or local law for paid sick leave eligibility
Senior Security Engineer
Cyber security analyst job in New York, NY
You will provide guidance and technical support to clients deploying security integrations. You'll act as the technical partner, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide and suggest integrations to better serve their success. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better.
You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies.
Responsibilities
Communicate with the customer(s), sales teams, peers, engineering and support teams as appropriate
Understand the customer environment, requirements, and security roadmap to implement the appropriate security solution
Configure, implement, and maintain Security Operating Platform
Optimize and migrate policies and objects from the existing environment to our Next-Gen Firewall
Test and validate the migration environment
Coordinate and execute cutover to production
Provide guidance on code upgrades
Facilitate the development of new application and threat signatures
Interact with our Technical Assistance Center (TAC) to understand and diagnose support cases
Some travel may be required, dependent on customer request
You work with the customer's security & network teams to build confidence across the business units impacted by the change
Experience
High level of experience with Panorama and log collectors
NGFW
Global Protect
BS in Computer Science, MIS, business, or equivalent education/training/experience
Minimum of 5 years' experience with network/security solutions and technologies (BGP, SD-WAN concepts, VXLAN and general routing and switching)
Minimum of 3 years' experience leading security solutions in large environments)
Detailed technical experience in the installation, configuration, and operation of high-end firewall appliances, ideally Palo Alto Networks products
You're experienced in internetworking, LAN, and WAN technologies
You have a good understanding of Internet protocols and applications
Any of the following industry certifications or equivalent experience is a plus: CISSP, CCNA, PCNSE, JNCIE-SEC
You effectively handle multiple projects and work calmly in high pressure
You're an excellent writer, with strong verbal communication skills, with demonstrable ability to communicate to senior leaders and technical peers
Senior Cloud Security Engineer (Infrastructure and Security) - New York - Competitive Salary + Competitive Package + Opportunity to work with an Ambitious, Young, Growing Organisation!
Cyber security analyst job in New York, NY
This young and agile company, providing identity risk solutions is currently seeking a Senior Cloud Security Engineer with a focus on Infrastructure and Security to join their growing team.
You will assist with the continuous maturation of their Cloud Security services within the Security division.
This is an excellent opportunity for an experienced Cloud Security Engineer with experience in both Infrastructure and Security to take the next step into a challenging position with a company offering significant growth potential.
About the Company:
Founded in the last 10 years, they are one the fastest growing companies in their space.
They are a fast-growing company that have built a platform that allows finance organisations and fintechs to strengthen their security defences.
Their mission is to allow companies to manage their identity and fraud risk.
Everything they do is entrenched in achieving engineering excellence.
Their culture is not corporate, and they like to trust their employees to take on a lot of responsibility and have input into the shape of growth of the organisation.
About the Senior Cloud Security Engineer (Infrastructure and Security) Vacancy:
What you will be doing:
• Serve as a cloud security subject matter expert, advise on and implementing best practices
• Respond to security incidents and provide timely and appropriate solutions
• Conduct cloud security risk assessments and audits
• Conduct investigations into security incidents and potential threats
• Take part in on call rotations for incident response and remediation
• Assist with policy management, security audits, and due diligence for cloud security concerns
• Advise on, configuring, and managing a variety of security tools
• Keep informed about and respond to emerging security threats and vulnerabilities
• Assist with cloud security reviews of potential vendors
Ideal Requirements for the Senior Cloud Security Engineer (Infrastructure and Security) Vacancy:
• Several years of experience working in a similar role with a focus on Cloud Security in AWS
• Experience provisioning infrastructure in AWS using Terraform, CloudFormation, CDK, or similar tools
• Experience configuring VPCs, route tables, NACLs, Security Groups, iptables, Web Application Firewall, Config, GuardDuty, Inspector, KMS, IAM, etc.
• In depth knowledge of AWS security best practices around systems hardening, monitoring, and incident response
• Experience taking part in an on-call rotation
• You are passionate about securing infrastructure, reducing risk, and protecting data!
• You are a subject matter expert on cloud security in AWS
• You have a solid understanding of network architecture and protocols
• You can advise on cloud security policies and procedures
Apply to the Role:
Roles like these are snapped up very quickly, so act now if you do not want to miss out! Reply to this advert or email your CV to **********************
Sr Technical Security Engineer
Cyber security analyst job in New York, NY
Sr. Technical Security Engineer, W2 remote Minimum Requirements
5+ years of experience in application or product security, with a track record of securing desktop and mobile applications.
Strong understanding of secure architecture for thick clients, including local storage protection, inter-process communication, JavaScript engines, OS-level security features, and web security standards (CSP, same-origin policy, TLS/HTTPS).
Experience with mobile (iOS/Android) and desktop (Windows/mac OS/Linux) application security models.
Proficiency in GenAI security, modern cryptography, certificate management, secure authentication (OAuth, WebAuthn, FIDO2), and secure session handling.
Knowledge of OS-level hardening techniques, sandboxing, privilege separation, and secure use of platform APIs.
Hands-on experience with secure coding practices in at least one systems language (C++, Rust, Go) and one application language (Kotlin, Swift, C#).
Familiarity with static/dynamic analysis tools, fuzzing, penetration testing, and reverse engineering for client applications.
Experience embedding security into the software development lifecycle (threat modeling, code reviews, secure design patterns).
Ability to manage incident response and vulnerability remediation for thick client environments.
Strong cross-team communication skills and ability to write clear developer-facing security guidelines.
Lead Security Engineer - Trading Technology
Cyber security analyst job in Great Neck, NY
The Team:
The Security Engineering Lead will be responsible for designing, building, and maintaining the organization's security infrastructure. This role requires a highly skilled professional who can lead a team of engineers, implement innovative security solutions, and ensure the resilience of the organization's systems and networks. The ideal candidate will have extensive experience in security engineering, a strong technical background, and the ability to manage and deliver complex security projects.
**This Role does NOT provide sponsorship**
Salary: $150k-$190k base w/ 20% bonus
Responsibilities:
Leadership and Management: Lead and mentor a team of security engineers, fostering a culture of continuous learning and innovation. Build and scale a global team to meet organizational needs.
Architecting Security Solutions: Assist teams in designing and implementing advanced security solutions, including cloud security, privilege access management and application/system security.
Collaboration: Partner with software development, infrastructure, and operations teams to embed security into the development lifecycle and operational processes.
Performance Optimization: Regularly evaluate and optimize existing security tools and technologies to ensure maximum efficacy and efficiency.
Training and Knowledge Sharing: Develop and deliver technical security training to engineers and other staff, ensuring a strong organizational security posture.
Documentation and Reporting: Create detailed documentation for security systems and processes, and provide regular project reports senior management.
Required Skills and Experience:
Experience (3+ year) in people leadership roles, nurturing security engineers into high-performing teams.
Experience (5+ years) in a security engineering role, focusing on designing and implementing security solutions and managing security infrastructure, both on-premise and cloud.
Experience working with privilege and identity management solutions.
Experience with operating system security and system hardening.
Knowledge of network security principles, protocols, and technologies.
Strong analytical and problem-solving skills, with the ability to assess risks and develop appropriate security controls.
Excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to technical and non-technical stakeholders.
Ability to work independently, prioritize tasks, and manage multiple projects simultaneously.
Strong leadership skills, with the ability to mentor and guide junior team members.
Skills and Experience That Would Help You Stand Out:
A bachelor's degree in Computer Science, Information Security, or a related field. A master's degree is a plus.
Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable.
Linux security experience
Familiarity with DevSecOps and integrating security into CI/CD pipelines.
Scripting experience.
Lead Security Engineer
Cyber security analyst job in New York, NY
Lead Security Engineer - Hands-On Role with Leadership Opportunity
We're looking to hire a senior-level Security Engineer who's ready to step up and take the lead. Someone who's still very hands-on technically but also enjoys mentoring others, setting direction, and building scalable solutions that make a real difference.
Title: Lead Security Engineer
Salary: $160,000 to 190,000 +Bonus
Location: Queens, NY (Hybrid)
This role sits at the center of engineering, operations, and security-you'll be working directly with software and infrastructure teams to make sure security is embedded into everything we do. You won't just be managing tools; you'll help shape how security is done across the company.
If you're based in the NYC area and looking for the next serious step in your career-where your ideas are heard and your work actually drives change-this is worth a conversation.
What the Role Looks Like:
You'll lead and mentor a small but growing team of security engineers, helping them grow while staying deep in the tech yourself.
Work with internal teams to design and implement security solutions-cloud security, PAM, app and system hardening, etc.
You'll be the one connecting the dots between development, infrastructure, and security-building relationships across teams and making sure security is part of the process from the start.
Help optimize and improve the tools we already have, and figure out what's missing.
What We're Hoping You Bring:
A few years of experience leading or mentoring other security engineers-you don't need to have managed huge teams, but you've helped others level up.
Solid technical background (5+ years in security engineering) and experience with on-prem and cloud security solutions (AWS or Azure).
Hands-on knowledge of privileged access, identity management, system hardening, and network security.
Strong instincts for risk, practical problem-solving, and keeping systems both secure and usable.
Someone who communicates clearly, doesn't get lost in buzzwords, and works well with people across teams.
Nice to Have, But Not Dealbreakers:
Certifications like CISSP, CEH, CISM
Experience with Linux security or scripting
Familiarity with CI/CD pipelines and how security fits into DevOps
Why This Role Might Be Right for You:
You're ready for more responsibility and leadership, but don't want to give up the technical side of the work.
You want to be part of a stable company with real backing and complex challenges to work on.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Information Security Specialist
Cyber security analyst job in Horsham, PA
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Sr. Security Researcher - Red Team
Cyber security analyst job in Jersey City, NJ
About The Role
The Sr. Security Researcher is responsible for leading and executing offensive security assessments (red teaming) against the organization's systems and networks. This role will leverage advanced penetration testing, social engineering, and other offensive security techniques to identify and exploit vulnerabilities, simulate real-world threats, and enhance the organization's overall security posture.
Responsibilities
Lead and execute red team engagements:
Develop and execute comprehensive red team assessments, including reconnaissance, vulnerability scanning, exploitation, and post-exploitation activities.
Lead and mentor junior red team members, providing guidance, training, and hands-on experience.
Develop and maintain red team methodologies, tools, and infrastructure.
Conduct threat modeling and risk assessments to identify potential attack vectors and prioritize targets.
Develop and execute social engineering campaigns, including phishing, vishing, and physical penetration tests.
Vulnerability research and exploitation:
Stay abreast of the latest threat intelligence, vulnerabilities, and exploits.
Research and develop new exploitation techniques and tools.
Conduct in-depth analysis of vulnerabilities and their potential impact.
Reporting and communication:
Prepare detailed and concise reports documenting red team findings, including technical details, impact assessments, and remediation recommendations.
Effectively communicate findings to technical and non-technical audiences, including senior management.
Present findings and recommendations at security forums and conferences (optional).
Security awareness and training:
Develop and deliver security awareness training programs to employees on topics such as social engineering, phishing, and secure coding practices.
Conduct security awareness campaigns to raise employee awareness of security threats and best practices.
Collaboration:
Collaborate with other security teams (e.g., blue team, incident response) to improve overall security posture.
Work with development teams to identify and remediate security vulnerabilities in applications and systems.
Build and maintain relationships with external security researchers and the cybersecurity community.
Skills and Qualifications
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
5+ years of experience in cybersecurity, with 3+ years of hands-on experience in penetration testing, red teaming.
Understanding of blended attacks.
Proven experience leading and mentoring junior security professionals.
Strong understanding of networking, systems administration, and programming concepts.
Expertise in penetration testing methodologies and tools (e.g., Cobalt Strike, Outflank, Sliver, PowerShell Empire, Metasploit, Kali Linux, Nmap).
Proficiency in scripting languages (e.g., Python, Ruby, PowerShell).
Strong understanding of network protocols (e.g., TCP/IP, HTTP, DNS).
Experience with vulnerability scanners, intrusion detection systems, and firewalls.
Experience with cloud security (e.g., AWS, Azure, GCP) is a plus.
Relevant security certifications (e.g., RTO I, RTO II, OSCP, OSCE, GPEN, CRTP) are highly desired.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Ability to work independently and as part of a team.
Strong attention to detail and accuracy.
Ability to adapt to new technologies and challenges.
Project Management.
Cloud Security Engineer - SRE
Cyber security analyst job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Security Incident Response Engineer III
Cyber security analyst job in Philadelphia, PA
Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet.
Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization?
About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations.
This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise.
Responsibilities:
Assisting in scoping security incidents and identifying indicators of attack and compromise.
Analyzing incident data from threat analytics tools.
Communicating recommendations and guidance based on security incident analysis.
Coordinating responses to security incidents with other security and consulting teams.
Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response.
Performing security triage and analysis on endpoint, server, and network infrastructure.
Conducting activities necessary for immediate containment and short-term resolution of incidents.
Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities.
Investigating the root cause of complex security incidents.
Maintaining a high level of confidentiality.
Requirements
Possess experience in cybersecurity incident response or related fields.
Proven ability to analyze, triage, scope, contain, and remediate security incidents.
Have current and extensive knowledge of security technologies, tools, and processes.
Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments.
Have current skills in automation using PowerShell, Python, Java, or similar languages.
Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration.
Experience supporting large, complex, and geographically distributed enterprise environments.
Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment.
Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
Chief Information Security Officer
Cyber security analyst job in New York, NY
Chief Information Security Officer (CISO)
📍
💰
Base Salary:
Up to $325,000 + Bonus + Equity
🏢
Our Client:
A Blockchain & Digital Asset Infrastructure Company
About Our Client
Our client is a fast-growing organization building infrastructure, software, and services that support the next generation of blockchain and digital asset ecosystems. They power secure transactions, institutional-grade solutions, and high-performance platforms used across the crypto economy.
As the business scales, they are expanding their leadership team with a Chief Information Security Officer (CISO) who will own the strategic direction, operations, and continuous improvement of all information and cybersecurity initiatives.
Role Overview
The CISO will set the long-term vision for security across the entire organization, covering infrastructure, products, employee environments, and customer-facing systems. This leader will ensure that the company's digital asset capabilities, blockchain networks, APIs, and cloud environments meet the highest standards of protection, resilience, and regulatory readiness.
This role requires an executive who can operate across technical, operational, and strategic levels-partnering with engineering, legal, compliance, product, and leadership teams.
Key Responsibilities
Design and drive a holistic security strategy covering infrastructure security, application security, product security, data governance, and operational risk.
Safeguard digital asset environments, including wallets, key management systems, consensus mechanisms, and blockchain-based services.
Build and lead an advanced threat detection, monitoring, and incident response program, ensuring rapid response and clear communication pathways.
Collaborate with engineering teams to integrate secure development practices into blockchain, smart contract, and cloud-native workflows.
Establish and maintain security controls, audits, and certifications, ensuring alignment with industry frameworks and regulatory expectations.
Oversee vendor security, supply-chain risk management, and third-party assessments.
Develop a culture of security throughout the business, including training, policy development, and ongoing risk awareness.
Provide regular reports and briefings to the executive team on emerging threats, risk posture, and security roadmap progress.
Experience & Qualifications
15+ years of experience in cybersecurity, with at least 5 years leading security organizations or programs at scale.
Strong experience in blockchain security, digital asset custody, exchange or infrastructure security, or related crypto-native environments.
Demonstrated success leading enterprise security programs that span cloud infrastructure, distributed systems, and high-availability environments.
Skilled in working with frameworks such as SOC 2, ISO 27001, NIST, and global data protection standards.
Expertise in cloud security (AWS, GCP, Azure), network security architecture, identity management, and DevSecOps.
Comfortable operating in fast-moving, engineering-driven environments.
Professional certifications (CISSP, CISM, CCISO, etc.) are a strong plus.