Lead Security Engineer - Trading Technology
Security architect job in Great Neck, NY
The Team:
The Security Engineering Lead will be responsible for designing, building, and maintaining the organization's security infrastructure. This role requires a highly skilled professional who can lead a team of engineers, implement innovative security solutions, and ensure the resilience of the organization's systems and networks. The ideal candidate will have extensive experience in security engineering, a strong technical background, and the ability to manage and deliver complex security projects.
**This Role does NOT provide sponsorship**
Salary: $150k-$190k base w/ 20% bonus
Responsibilities:
Leadership and Management: Lead and mentor a team of security engineers, fostering a culture of continuous learning and innovation. Build and scale a global team to meet organizational needs.
Architecting Security Solutions: Assist teams in designing and implementing advanced security solutions, including cloud security, privilege access management and application/system security.
Collaboration: Partner with software development, infrastructure, and operations teams to embed security into the development lifecycle and operational processes.
Performance Optimization: Regularly evaluate and optimize existing security tools and technologies to ensure maximum efficacy and efficiency.
Training and Knowledge Sharing: Develop and deliver technical security training to engineers and other staff, ensuring a strong organizational security posture.
Documentation and Reporting: Create detailed documentation for security systems and processes, and provide regular project reports senior management.
Required Skills and Experience:
Experience (3+ year) in people leadership roles, nurturing security engineers into high-performing teams.
Experience (5+ years) in a security engineering role, focusing on designing and implementing security solutions and managing security infrastructure, both on-premise and cloud.
Experience working with privilege and identity management solutions.
Experience with operating system security and system hardening.
Knowledge of network security principles, protocols, and technologies.
Strong analytical and problem-solving skills, with the ability to assess risks and develop appropriate security controls.
Excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to technical and non-technical stakeholders.
Ability to work independently, prioritize tasks, and manage multiple projects simultaneously.
Strong leadership skills, with the ability to mentor and guide junior team members.
Skills and Experience That Would Help You Stand Out:
A bachelor's degree in Computer Science, Information Security, or a related field. A master's degree is a plus.
Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable.
Linux security experience
Familiarity with DevSecOps and integrating security into CI/CD pipelines.
Scripting experience.
Director, Client Security Engineering Architect
Security architect job in Melville, NY
Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team.
KPMG is currently seeking a Director, Tech Engineering to join our Tax Ignition Group.
Responsibilities:
* Lead the function of responding to clients' security inquires
* Meet with clients to answer their security questions and negotiate compensating controls when there are gaps between client requirements and our product offerings
* Drive innovation and improvement in the client security inquiry process such incorporating Artificial Intelligence into the process, creating additional collateral such as whitepapers, managing metrics, and improving the tooling and interactions with requestors
* Partner with various groups within Tax's technology function and business teams to incorporate trends into product roadmaps; collaborate with other compliance teams, and raise awareness around client security requirements
* Review and respond to client security questionnaires and assessments
* Build and maintain a knowledge base of common client questions
Qualifications:
* Minimum ten years of recent experience in Information Technology (IT) security compliance, risk management or related IT security within a large IT organization, preferably within a professional services firm, software product, or other highly regulated environment
* Bachelor's degree from an accredited college or university is preferred
* Deep understanding of cloud architecture, modern software development, and technical security controls is required; Azure experience is preferred
* Strong executive presence, negotiation, presentation, and communication skills are required; excellent analytical and problem-solving skills to assess complex security issues and develop effective solutions; capability to work effectively in a global environment, understanding diverse cultural perspectives and international client needs
* Proven experience in client-facing roles, particularly in handling security inquiries, negotiations, and managing client relationships; demonstrated ability to drive innovation and continuous process improvement, particularly in integrating new technologies and methodologies into existing processes
* Demonstrated knowledge of industry authoritative sources such as COBIT, NIST, ISO standards; CISM, CISA, ISO 27001 Auditor, LSS Green Belt, CRISC, CIPP, CGEIT or ITIL preferred
* Must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa
KPMG LLP and its affiliates and subsidiaries ("KPMG") complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, KPMG is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year KPMG publishes a calendar of holidays to be observed during the year and provides eligible employees two breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at Benefits & How We Work.
Follow this link to obtain salary ranges by city outside of CA:
**********************************************************************
KPMG offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding KPMG's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.
KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them.
Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Cyber security Architect
Security architect job in West Babylon, NY
Job DescriptionBenefits:
401(k)
401(k) matching
Competitive salary
Title: Cyber security Architect Work authorization: US Citizen Key Responsibilities Design and develop enterprise-class architecture across assigned technologies.
Manage project tasks, timelines, deliverables, and technical resources.
Review firewall policies to identify, analyze, and report cybersecurity gaps.
Assess firewall interface configurations and provide detailed findings on security risks.
Review and validate firewall zones for proper segmentation and compliance.
Create comprehensive documentation, diagrams, and technical artifacts to support system architecture.
Collaborate with cross-functional teams to ensure secure, scalable, and reliable system implementations.
Required Qualifications
Minimum Experience: 8+ years of enterprise-level experience in technical architecture or related fields.
Certifications: Multiple industry and/or vendor certifications (e.g., CISSP, CCNP/CCIE, AWS/Azure Architect, Security+).
Education: Bachelors Degree in Computer Science or related field.
Equivalent education or experience may be substituted.
Preferred Skills
Strong knowledge of cybersecurity frameworks and industry best practices.
Expertise in firewall technologies, configurations, and policy management.
Excellent analytical, documentation, and diagramming skills (e.g., Visio, Lucidchart).
Ability to communicate complex technical concepts to both technical and non-technical stakeholders.
Experience leading technical teams or acting as a project technical lead.
Cyber Defense Forensics Analyst
Security architect job in Jericho, NY
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
Lead SAP Security & GRC admin- Full time perm job
Security architect job in Stamford, CT
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
Job Description
SAP Security & GRC
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cloud Security Engineer
Security architect job in Melville, NY
This role is Hybrid, 3 days a week to any local, US based UL Solutions Office. We are seeking a highly skilled Cloud Security Engineer with strong Application Security expertise to join our security architecture team. This role will be responsible for designing, implementing, and maintaining secure cloud environments and applications across multi-cloud platforms, with a focus on Azure. The ideal candidate will have hands-on experience with cloud-native security tools, DevSecOps practices, and compliance frameworks such as NIST 800-53, SOC 2, and CIS Controls.
Cloud Security Engineering
+ Design and implement security controls for cloud infrastructure (Azure, AWS, GCP).
+ Develop and maintain security architecture patterns (e.g., hub-and-spoke, Zero Trust).
+ Integrate security tools such as Wiz, Microsoft Defender for Cloud, Silverfort, and Terraform.
+ Conduct threat modeling and risk assessments for cloud-native services.
+ Collaborate with IAM, SOC, and GRC teams to align cloud security with enterprise policies.
Application Security
+ Perform secure code reviews, static/dynamic analysis, and vulnerability assessments.
+ Integrate security into CI/CD pipelines using tools like Snyk, Checkmarx, or Veracode.
+ Guide development teams on secure coding practices and OWASP Top 10.
+ Design and implement API security strategies including OAuth2, OpenID Connect, and mTLS.
+ Support remediation of application vulnerabilities and provide technical guidance.
Compliance & Governance
+ Map cloud and application security controls to compliance frameworks (NIST 800-53, SOC 2, CIS).
+ Assist in audits and evidence collection for regulatory compliance.
+ Maintain documentation of security architecture, policies, and procedures.
+ Bachelor's degree in Computer Science, Cybersecurity, or related field.
+ 3-4 years of experience in cloud security engineering and application security.
+ Strong understanding of Azure security services and architecture.
+ Experience with infrastructure-as-code (Terraform, Bicep).
+ Familiarity with Snowflake security features and data protection strategies.
+ Knowledge of identity and access management (Azure AD, Conditional Access, MFA).
+ Hands-on experience with DevSecOps tools and practices.
Preferred Qualifications
+ Certifications: Azure Security Engineer Associate, CISSP, CCSP, OSCP, or GIAC.
+ Experience with multi-subscription Azure environments.
+ Familiarity with Zero Trust architecture and implementation.
+ Experience with security automation and orchestration.
Soft Skills
+ Strong analytical and problem-solving skills.
+ Excellent communication and collaboration abilities.
+ Ability to work independently and in cross-functional teams.
+ Passion for continuous learning and staying current with security trends.
What you'll experience working for ULS
UL Solutions has been pioneering change since 1894 and we're still leading the way. From day one, we've blazed a trail protecting the planet and everyone on it. Our teams have influenced billions of products, plus services, software offerings and more. We break things, burn things and blow things up. All in the name of safety science.
That's where you come in - because none of it could happen without you. It takes passion to protect people, problem-solving to safeguard personal data and conviction to make the world a more sustainable place. It takes bold ideas and brilliant minds to build a better world for future generations across the globe.
This is more than a job. It's a calling. A passion to use our expertise and play our part in creating a more secure, sustainable world today - and tomorrow. As a member of our safety science community, you'll use your ideas, your energy and your ambition to innovate, challenge and ultimately, help create a safer world.
Everyone here is unique. But we're also a global community, working together to help create a safer world. Join UL Solutions and you can connect with the brightest minds in the business, all bringing their distinct perspectives and diverse backgrounds together to deliver real change.
Empowering our customers to keep the world safe means thinking ahead. It means investing in training and empowering our people to learn and innovate. At UL Solutions, we help build a better future - one where everyone benefits.
Join UL Solutions to be at the center of safety. To learn more about us and the work we do, visit UL.com
Total Rewards: We understand compensation is an important factor as you consider the next step in your career. The estimated salary range for this position is $95,000 to $120,000 and is based on multiple factors, including job-related knowledge/skills, experience, geographical location, as well as other factors. This position is eligible for annual bonus compensation with a target payout of 10% of the base salary. This position also provides health benefits such as medical, dental and vision; wellness benefits such as mental and financial health; and retirement savings (401K) commensurate with the standard rewards offered in each individual location or country. We also provide full-time employees with paid time off including vacation (15 days), holiday including floating holidays (12 days) and sick time off (72 hours).
#LI-SG2
#LI-Hybrid
UL LLC has been and will continue to be an equal opportunity employer. To assure full implementation of this equal employment policy, we will take steps to assure that:
Persons are recruited, hired, assigned and promoted without regard to race, color, age, sex or gender, sexual orientation, gender identity, gender expression, transgender status, religion, creed, national origin, ethnicity, citizenship, ancestry, disability, genetic information, military or veteran status, pregnancy, marital or familial status, or any other protected category under applicable law.
Cyber Palo Alto Networks Security Operations Senior Consultant
Security architect job in Stamford, CT
Cyber Palo Alto Networks Security Operations Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
* Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
* Integrate diverse log and telemetry sources, ensuring data quality and normalization.
* Develop and optimize automated response workflows for incident containment and remediation.
* Advise clients on advanced use cases, threat detection, and automation strategies.
* Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
* Present technical findings and recommendations to stakeholders.
Required Qualifications
* BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
* 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
* 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
* 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
* 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
* 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
* 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
* 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
* Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
* Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
* Limited immigration sponsorship may be available
Preferred Qualifications
* Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
* Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
* Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
* Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
* Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
* Previous consulting or "Big 4" experience
* Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers
Requisition code: 314097
Job ID 314097
Senior Security Ops Analyst - Incident Response
Security architect job in New Hyde Park, NY
We are seeking a Senior Security DevOps Engineer who will be responsible for a variety of objectives resulting in risk mitigation and remediation of internal & external security threats. This role performs advanced threat analysis, threat intelligence gathering & reporting, incident response activities, improves accuracy of security systems, improves existing processes, and works on Cybersecurity focused projects.
Contract to hire
Onsite 2 days a week located in New York
Cybersecurity - Cyber Intelligence & Incident Response
Responds to and remediates email, endpoint, threat intelligence, and network-based threats; provides forensic investigation and support.
Provides after-hours support as needed for response activities.
Integration experience.
Collaborates with cross divisional and Cybersecurity teams to continuously improve security capabilities and response to threats in the most efficient and effective manner.
Assists with projects to implement advanced technologies to prevent & identify malicious behavior within cloud environments, networks, endpoints, and email technologies.
Operates products such as SIEM, SOAR, threat intelligence platforms, advanced email protection, EDR, cloud security products, IDS/IPS, Zero Trust tooling, and other security technologies.
Scripting experience.
Implements and performs threat analysis utilizing industry standard frameworks (kill chain/diamond model) and techniques.
Proposes and helps review security plans and policies to improve environmental security.
Maintains and produces metrics, operational playbooks, process diagrams and documentation for the Cybersecurity program.
AWS and/or Azure knowledge.
Produces and distributes operational and tactical threat intelligence reports.
Other duties may be assigned as needed to address new security threats facing the enterprise.
Ability to:
Demonstrate great teamwork and partnership with internal teams for resolution of security-based issues.
Python programming tasks and understand of programming in general.
Perform security event correlation, triage, and analysis.
Apply security Threat Intelligence while responding to and investigating security events or Incidents.
Identify when an application, network, system, or user has been compromised by an internal or external threat.
Work on multiple projects to improve security capabilities.
Exercise strong understanding of defense-in-depth security best practices.
Apply security engineering and architecture concepts to best understand how to employ the most effective security monitoring, response, and threat reporting.
Demonstrate effective communication of security issues and topics to management and others.
Work well under pressure and within a high paced environment.
Maintain operational guidelines and standards for Cybersecurity.
Cyber Security Analyst
Security architect job in Bethpage, NY
The Network and Cyber Security Analyst will be responsible for designing, implementing, and maintaining the network and security infrastructure of the IT organization. This role requires a combination of hands-on experience with firewalls and other security tools, strong network knowledge, and expertise in Microsoft Azure networking and security. The ideal candidate will also have experience in setting and documenting security policies as well as working with 3rd party security vendors. Key Responsibilities: - Design, deploy, and maintain secure and high-performance network solutions, including switches, routers, and wireless systems. - Act as 2nd in line patch and troubleshooting support - Monitor and troubleshoot network performance and connectivity issues to ensure minimal downtime. - Optimize network configurations to enhance scalability, efficiency, and security. - Implement and manage firewalls, intrusion prevention systems (IPS), and other security appliances. - Perform regular vulnerability assessments and lead the remediation of identified risks. - Develop and enforce security policies, procedures, and incident response protocols. - Design, deploy, and manage secure cloud networking solutions, with a primary focus on Microsoft Azure. - Configure virtual networks, firewalls, and security groups in Azure to ensure compliance with organizational standards. - Manage identity and access solutions in Azure, including multi-factor authentication (MFA) and conditional access policies. - Collaborate with cross-functional teams to align IT infrastructure with business goals. - Manage 3rd party security partners - Maintain up-to-date documentation of network architecture, configurations, and security policies. - Generate regular reports on network performance, security incidents, and compliance metrics. - Provide guidance and training to staff on security best practices and awareness. - Stay up-to-date with the latest security trends, threats, and technology solutions. Qualifications: - Bachelor's degree in Information Technology, Computer Science, or a related field (or equivalent experience). - Minimum of 8+ years of experience in network administration and cybersecurity roles. - Expertise in configuring and managing network devices such as Cisco, Juniper, or similar switches and routers. - Hands-on experience with firewall platforms such as Cisco, Palo Alto, Fortinet, or similar solutions. - Proficiency in Azure cloud networking, including virtual networks, VPNs, and security configurations. - Strong knowledge of network protocols (TCP/IP, DNS, DHCP, VLANs, etc.) and troubleshooting tools. - Experience in setting and documenting security policies and procedures. - Excellent problem-solving, communication, and leadership skills. Preferred Skills. - Experience with endpoint protection, SIEM solutions, and log management tools. - Knowledge of compliance standards like ISO 27001, NIST, or GDPR. - Certifications such as CCNA, CCNP, Azure Network Engineer Associate, or equivalent are highly desirable.
Skills
Cyber security, Information security, Firewall, Arcitc Wolf, siem, azure, cisco, Vulnerability assessment, Vulnerability management, palo alto, juniper, CCNA, CCNP, azure network engineer associate, log management tools
Top Skills Details
Cyber security,Information security,Firewall,Arcitc Wolf,siem,azure,cisco
Additional Skills & Qualifications
- Experience with endpoint protection, SIEM solutions, and log management tools. - Knowledge of compliance standards like ISO 27001, NIST, or GDPR. - Certifications such as CCNA, CCNP, Azure Network Engineer Associate, or equivalent are highly desirable. Contract to Hire role (approximate time contracting is 6 months)
Experience Level
Expert Level
Job Type & Location
This is a Contract to Hire position based out of Bethpage, NY.
Pay and Benefits
The pay range for this position is $65.00 - $72.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: - Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Bethpage,NY.
Application Deadline
This position is anticipated to close on Dec 19, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Director of Information Security
Security architect job in Hempstead, NY
Qualifications Bachelor's degree required. Minimum five years of full-time professional experience in information technology, including evidence of successful and progressively responsible roles in information security or related area (including growth in levels of responsibility, complexity of work, numbers, and sophistication of employees) related to the essential responsibilities listed. Demonstrated fluency in written and spoken English with the sophistication necessary to effectively communicate technical details to both technical and non-technical individuals. Demonstrated willingness and ability to carry out the essential responsibilities listed with humility, grace, and optimism. Demonstrated understanding of, sensitivity to, and respect for the academic, cultural, and social diversity in the Hofstra University community.
Preferred Qualifications
Advanced degree in computer science, computer engineering, information security, or related field strongly preferred. One or more relevant professional certifications (e.g., CISSP , CISM /A, etc.) strongly preferred. Experience with state and federal information security regulatory requirements ( GLBA , FERPA , HIPAA , etc.) and other compliance requirements ( PCI , etc.). Knowledge of and experience applying industry-standard IT security frameworks ( NIST , IHECF , etc.). Significant experience in computing and information security, network security issues, and security incident response and recovery in a higher education environment. Significant experience in communicating information security principles and concepts to non-technical stakeholders, and success in improving cybersecurity awareness in a higher education environment. Working knowledge of the information security policy and regulatory environment of information security, particularly in higher education. Demonstrated experience and success in advising and collaborating with key stakeholders relevant to the essential responsibilities listed, including senior leadership, Internal Audit, outside auditors, and consultants. Professional experience in a leadership role in a higher education institution.
Cyber Security Analyst - Information Security (Identity and Access Management)
Security architect job in Dix Hills, NY
Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards.
Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets.
Create and maintain detailed IAM system and workflow documentation based on business and technical requirements.
Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services.
Develop, execute, and document test cases to validate IAM workflow enhancements and system changes.
Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories.
Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives.
Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents.
Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations.
Participate in on-call rotation as needed to support critical IAM functions and operational continuity.
Highly Preferred Skills:
2-5 years of experience as an IAM Analyst, Business Analyst, or similar technical/functional role.
Strong business analysis skills, including requirements gathering, process mapping, and workflow design.
Experience writing and executing test cases, test scripts, and test plans.
Familiarity with IAM systems and concepts such as identity lifecycle management, authentication, authorization, roles, and entitlements.
Experience with IAM tools (e.g., Okta, SailPoint, Azure AD/Entra ID, Duo) is preferred but not required.
Working knowledge of SQL, Power BI, or other reporting tools is a plus.
Strong documentation skills using MS Word, Excel, Visio, or similar tools.
Excellent verbal and written communication skills; able to translate between business and technical language.
Detail-oriented, analytical thinker, and effective problem solver.
Willingness to participate in testing activities and occasional on-call or after-hours support if needed.
Job Description
Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur.
Job Responsibility
Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions.
Job Qualification
Bachelor's degree in Computer Science, Cyber Security or related field, required.
Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required.
2-4 years of related experience, required.
*Additional Salary Detail
The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity).
Auto-ApplyFirewall Security Engineer
Security architect job in Stamford, CT
Duration: 6+ Months Experienced Firewall administrator for operational implementation, maintenance and configuration of firewalls. Key Responsibilities: Performs maintenance and changes in firewalls as required. Implementation of new firewalls as required
Assists with troubleshooting network connectivity as it relates to firewalls
Utilizes change management, request, and ticketing systems, documents status updates and problem resolutions
Complete All assignments in a timely manner with an acceptable level of quality
Maintains documentation related to work area
Completes network change requests
Follows documented processes, procedures and policies
Performs customer service duties and responds to customer and project requests as defined by management
Other related duties assigned as needed.
Qualifications/Requirements:
Bachelor's degree and with 3 to 4 years of operational experience administering Firewalls
4 or more years networking/firewall background
Must have networking TCP/IP routing protocol experience
Desired Characteristics:
In-depth experience in security aspects of multiple platforms, operating systems, software, communications and network protocols is desired
Competency in verbal, written, and presentation communications and interpersonal understanding
Ability to understand customer's business needs.
Leadership of work teams/groups
Ability to work with all levels of employees
Highly motivated and able to work effectively under minimal supervision in a fast-paced environment
Team-oriented, placing priority on quality and the successful completion of team goals
Organization and planning skills that include: time management, project coordination and management, and the ability to handle multiple deadlines and associated pressures.
Competency in developing effective solutions to business problems
Ability to analyze problems and to make decisions
REQUIRED SKILLS
YEARS OF EXPERIENCE
WHEN THE SKILL WAS LAST USED
Expert knowledge of Cisco Security products, ASA and Firepower
Expert knowledge of NSX
Expert knowledge of Palo Alto systems
Security Certifications a Plus
Must have networking TCP/IP routing protocol experience
Networking/firewall background
Operational experience administering Firewalls
Additional Information
All your information will be kept confidential according to EEO guidelines.
Data Security Engineer
Security architect job in Stamford, CT
What you'll do • Design and implement comprehensive data security architectures, with particular focus on database platforms (primarily SQL Server) • Develop and maintain enterprise-wide encryption strategies for securing structured and unstructured data both in transit and at rest, both and both on-premise and in the cloud
• Enhance logging, monitoring and SecOps capabilities of enterprise databases and other data stores
• Configure and optimize Identity and Access Management (IAM) solutions across data platforms and repositories to align to least privilege principles
• Implement Data Loss Prevention (DLP) strategies and controls
• Implement and maintain Information Rights Management (IRM) and Digital Rights Management (DRM) solutions
• Design and implement data tokenization strategies where appropriate
• Secure data processing pipelines and ensure appropriate controls for data workflows
• Create and maintain data security documentation, including policies, procedures, and standards
• Collaborate with development teams to ensure security best practices in data handling
• Conduct vulnerability assessments of the firm's database architecture and associated data storage and processing systems
• Assist in monitoring and managing security patching and upgrade processes for database platforms
What's required
• Bachelor's degree in computer science, cybersecurity, or related technical field
• 6+ years of experience in data/database security engineering and governance
• Deep expertise in database security, particularly SQL Server
• Comprehensive understanding of data warehouse/data lake architectures and tools, particularly Databricks (required)
• Subject matter expertise in Object Storage (eg: S3, Azure Blob, etc) and related security
• Understanding of Active Directory Delegation (constrained vs. unconstrained) and associated best practices
• Experience with 3rd-party SQL Server security governance and monitoring products (eg: Idera, Solarwinds)
• Extensive knowledge of encryption technologies for both structured and unstructured data
• Broad knowledge of secure data/file sharing solutions and ETL workflows
• Experience designing and implementing data tokenization solutions
• Experience with data classification and DLP technologies
• Scripting/automation capabilities (eg: SQL, PowerShell, Python)
• Commitment to the highest ethical standards
Qualifications
Ivy league
colleges education preferred or huge plus.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber Security Analyst
Security architect job in Great Neck, NY
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
* Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
* Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
* Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
* Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
* Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
* Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
* Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
* Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
* Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
* Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
* Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
* Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
* Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
* Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
* Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
* Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
* Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
* Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
* Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
* High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
* Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
* Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
* Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyOT Security Engineer
Security architect job in Stamford, CT
The OT Security Engineer, Global Information Security (GIS) will have primary responsibility for Crane's Operational Technology security solutions that protect Crane's manufacturing environments. You will implement OT and IoT security solutions throughout the enterprise and ensure that OT/IoT security solutions identify threats, uncover vulnerabilities, and measure risks of operational equipment.
Coordinating with both IT and OT teams at all manufacturing sites, you will define and develop security standards and technical solutions. As a subject matter expert in the hardening and defense of OT, you will work with business units to implement security standards, securely modify systems, and implement secure network architectures during implementations of OT related projects to ensure secure system deployments.
You will work closely with other GIS functional areas, supporting security engineering, administration, operations, and incident response. You will integrate the OT/IoT security solutions with other GIS and business unit tools such as SIEM, SOAR, AD, and other tools to gain a unified view of security events and respond more effectively to security incidents both for OT and IT.
Responsibilities and Duties:
* Support and maintain OT/IoT security tool set and associated integrations with other systems
* Collaborate with the manufacturing function across lines of business to develop and define security requirements
* Design OT security controls for architectures, systems and networks ensuring that alerting to threats is efficient and effective.
* Identify and implement supporting security technologies for the identification of threats and defense of OT systems and provide secure methods for remote access.
* Work directly with plant leaders, process engineers, and support/system vendors to ensure OT security controls are implemented
* Develop and implement standard work supporting the Global OT security function and supporting solutions
* Develop and maintain security models, templates, standards and procedures that can be used to leverage security capabilities in projects and operations
* Assist in the identification, response, investigation, and remediation of OT security events and incidents as needed
* Ensure security best practices are identified and integrated into all approaches and methodologies.
* Define requirements and design standards to protect Crane's OT solutions from security threats and for mitigating the impacts of these threats.
* Define reference network architectures based on industry best practices and work with business units to implement for OT solutions
* Consult on business unit OT projects and provide cybersecurity expertise
Qualifications and Competencies:
* 2yrs experience with securing Operational Technology and related systems environments
* Strong understanding and prior experience with the application of securing OT and related systems
* Current deep technical understanding of common OT systems such as PCS, SCADA, PLCs, RTUs, HMIs, CNC
* Deep technical understanding of TCP/IP Networking and Firewalls
* Deep technical understanding of system integration methods including API's and authentication methods
* Knowledgeable in NIST CSF, NIST 800-82, Purdue Model, IEC 62443 standards
* Solid foundation cybersecurity domains such as network security, EDR, anomaly detection
* Understanding of common OT communications protocols such as MQTT, MODBUS, DNP3, S7, G-code
* Comfortable with designing and overseeing the implementation of secure OT architectures
* Prior experience in the direct remediation of vulnerabilities or compensating controls within OT environments
* Commitment to security training and earning corresponding certifications
* Highly motivated with passion for solving complex problems
* Excellent verbal and written communication skills, comfortable with presenting to Operational Teams
* Flexibility to work outside regularly scheduled/normal business hours as required
* Ability and desire to travel both domestically and internationally
* Required: Degree in a related field or at least 4 years relevant professional experience
* Required: Mobility and ability to be on your feet for long periods in a manufacturing setting
* Required: Technical professional security certification such as GICSP, GRID, OSCP, CEH or similar
* US Person as defined under EAR PART 772 AND ITAR 120.15
This description has been designed to indicate the general nature and level of work being performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job.
Crane Company. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, sexual orientation, general identity, national origin, disability or veteran status.
Auto-ApplyInformation Security Risk Analyst
Security architect job in Setauket-East Setauket, NY
I have a client located in the East Setauket, NY area that has an opportunity for a Information Security Risk Analyst. If you or any of your colleagues are interested in discussing this opportunity please click Apply Now.
In this role you will be an Information Security Risk Analyst for a client that works in the medical industry. This role is responsible for monitoring, determining, and reviewing potential and current information security risks.
This is a 3 month and possibly longer contract. This role must be performed on-site.
The pay on this role is $30.00 to $40.00 an hour based on experience.
Job Requirements:
3+ years of experience with O365 and Purview platforms
Experience reviewing daily Risky Users
Ability to communicate with internal users to evaluate high risk access
Ability to monitor the company's networks and identify security breaches
Perform 3rd party security reviews using UpGuard TPRM tool
Monitor DoJ DSP attestations and manage vendor communication and certs
Help assist in creating IS runbook
Document security processes
Analyze Business Associate Agreements and provide recommendations on security & Liability
Support Audit responses and investigations
#VIS
Director, Client Security Engineering Architect
Security architect job in Stamford, CT
Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team.
KPMG is currently seeking a Director, Tech Engineering to join our Tax Ignition Group.
Responsibilities:
* Lead the function of responding to clients' security inquires
* Meet with clients to answer their security questions and negotiate compensating controls when there are gaps between client requirements and our product offerings
* Drive innovation and improvement in the client security inquiry process such incorporating Artificial Intelligence into the process, creating additional collateral such as whitepapers, managing metrics, and improving the tooling and interactions with requestors
* Partner with various groups within Tax's technology function and business teams to incorporate trends into product roadmaps; collaborate with other compliance teams, and raise awareness around client security requirements
* Review and respond to client security questionnaires and assessments
* Build and maintain a knowledge base of common client questions
Qualifications:
* Minimum ten years of recent experience in Information Technology (IT) security compliance, risk management or related IT security within a large IT organization, preferably within a professional services firm, software product, or other highly regulated environment
* Bachelor's degree from an accredited college or university is preferred
* Deep understanding of cloud architecture, modern software development, and technical security controls is required; Azure experience is preferred
* Strong executive presence, negotiation, presentation, and communication skills are required; excellent analytical and problem-solving skills to assess complex security issues and develop effective solutions; capability to work effectively in a global environment, understanding diverse cultural perspectives and international client needs
* Proven experience in client-facing roles, particularly in handling security inquiries, negotiations, and managing client relationships; demonstrated ability to drive innovation and continuous process improvement, particularly in integrating new technologies and methodologies into existing processes
* Demonstrated knowledge of industry authoritative sources such as COBIT, NIST, ISO standards; CISM, CISA, ISO 27001 Auditor, LSS Green Belt, CRISC, CIPP, CGEIT or ITIL preferred
* Must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa
KPMG LLP and its affiliates and subsidiaries ("KPMG") complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, KPMG is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year KPMG publishes a calendar of holidays to be observed during the year and provides eligible employees two breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at Benefits & How We Work.
Follow this link to obtain salary ranges by city outside of CA:
**********************************************************************
KPMG offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding KPMG's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.
KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them.
Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
SAP Identity Management
Security architect job in Stamford, CT
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website *****************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Required Skills:
• knowledge of SAP Identity Management 7.2 version
• knowledge of SAP IDM integration points with SAP and non-SAP products/tools
• LDAP/Active Directory, PD-Org, NWBC, Solution Manager 7.1.
• Experience in SAP security, SAP GRC is a plus.
• Basis experience is a plus
• 6+ years of SAP Identity Management Implementation and support experience.
• Experience as the SAP IDM SME in at least 2 implementations
• Experience with gap analysis and strategic roadmap/blueprint development
• Experience in configuring SAP IDM for user provisioning in a complex SAP landscape comprising of ABAP, JAVA and duel stack systems as well as non-SAP systems
• Involve in Onsite-Offshore coordination activities (handover-takeover, off business hour activity tracking, offshore reporting)
• Provide SAP IDM support to SAP implementation as well as support teams and internal customers/clients
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber Palo Alto Networks Security Operations Senior Consultant
Security architect job in Stamford, CT
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
+ Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
+ Integrate diverse log and telemetry sources, ensuring data quality and normalization.
+ Develop and optimize automated response workflows for incident containment and remediation.
+ Advise clients on advanced use cases, threat detection, and automation strategies.
+ Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
+ Present technical findings and recommendations to stakeholders.
Required Qualifications
+ BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
+ 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
+ 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
+ 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
+ 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
+ 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
+ 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
+ 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
+ Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
+ Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
+ Limited immigration sponsorship may be available
Preferred Qualifications
+ Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
+ Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
+ Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
+ Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
+ Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
+ Previous consulting or "Big 4" experience
+ Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Cyber Security Analyst
Security architect job in Great Neck, NY
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better .
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
• Competitive base salary and bonus opportunities
• Paid time off (three-week minimum)
• Medical, dental and vision starting day one
• 401(k) with employer match
• Paid parental leave
• Child and family care assistance (dependent care FSA with employer match up to $2500)
• Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
• Tuition assistance
• Wellness program with savings of up to $4,000 per year on insurance premiums
• ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-Apply