Senior Consultant - Physical Security
Security architect job in New York, NY
Senior Consultant-Physical Security; Not Cyber
Midtown Manhattan
Full Time - Onsite Five Days
The Firm, a provider of comprehensive risk management services, is seeking a Senior Consultant to serve as the dedicated Security Lead or virtual Chief Security Officer (CSO) across their client portfolio.
This is an end-to-end ownership role. The Consultant will manage engagements from the initial risk assessment and proposal delivery phase through the collaborative development, implementation, and refinement of customized security solutions, working in close partnership with key client stakeholders.
The Senior Consultant reports to the Executive Director, Consulting. The Senior Consultant interacts closely with other business units within the firm, including Investigations, Intelligence, Global Security Operations, Protection, and Security Technology. As a relationship manager, the Senior Consultant will constantly consider the needs, preferences and perspectives of each client and address them by leveraging the breadth of the Firm's services and capabilities.
Responsibilities:
Manage the full life cycle of a client engagement, ensuring client expectations are met, scope changes are addressed and documented, and deliverables are completed on schedule and within budget
Develop and implement a strategic roadmap for each client, factoring in their unique circumstances, available Firm resources, and financial viability
Manage client relationships in a manner that builds confidence and trust in the delivery of customized solutions, and maximizes strategic growth in accordance with client needs, concerns, and preferences
Contribute to the development of proposals, including scoping and pricing, to address identified vulnerabilities and expressed concerns
Physical Security Assessments that include technology, personnel and policies; emergency plans and procedures; fire life-safety; executive protection; protective intelligence; threat management; travel risk; training; and other areas
Identify program requirements and leverage firm resources to develop, deliver and manage physical security solutions
Produce clear, actionable documentation, including assessment reports, travel risk analyses, security policies and procedures, emergency response and crisis management plans, and trainings
Present materials and findings in a compelling manner to senior client stakeholders and/or internal leadership
Stay current on evolving trends and emerging technologies, conduct security benchmarking studies, and seek opportunities to build knowledge and share new information and resources internally and with clients
Track resource utilization and oversee accurate administration and invoicing in support of assigned client programs
Experience and Skills:
BA/BS or higher in international affairs, criminal justice, or related field required; MA preferred
Minimum of seven years of security risk management experience as a senior member of a large security department, as a security consultant, or in an applicable military or law enforcement position
Substantial hands-on experience designing, implementing, and managing a physical security program, or major components thereof, for high-value corporate or high-net-worth residential clients
Solid knowledge base across physical security domains including: security program design, implementation, and management; security technology; investigations; threat assessment and management; protective intelligence, executive protection; event security; global security operations; travel security; emergency and critical event planning and response; and security training
Deep expertise in one or several physical security domains. Hands-on familiarity with leading security technologies for access control, video management, intrusion detection, etc. a major plus
Strong analytical skills for assessing risk, vulnerability and threats
PSP or equivalent certification; CPP or equivalent preferred; CISSP a plus
Exceptional written and verbal communications skills; proficiency in presenting to clients and other stakeholders; strong attention to detail
Strong business acumen and strategic development mindset
Successful management of highly confidential information
Strong project management skills to include organization, multi-tasking and meeting deadlines
Highly proficient in MS Office software; Smartsheet proficiency a plus
Ability to travel 10% within the United States to conduct risk assessments, attend trainings or conferences, or support special events
This role is only open to candidates in the NY metro area. It will not include relocation and requires US work authorization.
Cyber security Architect
Security architect job in West Babylon, NY
Job DescriptionBenefits:
401(k)
401(k) matching
Competitive salary
Title: Cyber security Architect Work authorization: US Citizen Key Responsibilities Design and develop enterprise-class architecture across assigned technologies.
Manage project tasks, timelines, deliverables, and technical resources.
Review firewall policies to identify, analyze, and report cybersecurity gaps.
Assess firewall interface configurations and provide detailed findings on security risks.
Review and validate firewall zones for proper segmentation and compliance.
Create comprehensive documentation, diagrams, and technical artifacts to support system architecture.
Collaborate with cross-functional teams to ensure secure, scalable, and reliable system implementations.
Required Qualifications
Minimum Experience: 8+ years of enterprise-level experience in technical architecture or related fields.
Certifications: Multiple industry and/or vendor certifications (e.g., CISSP, CCNP/CCIE, AWS/Azure Architect, Security+).
Education: Bachelors Degree in Computer Science or related field.
Equivalent education or experience may be substituted.
Preferred Skills
Strong knowledge of cybersecurity frameworks and industry best practices.
Expertise in firewall technologies, configurations, and policy management.
Excellent analytical, documentation, and diagramming skills (e.g., Visio, Lucidchart).
Ability to communicate complex technical concepts to both technical and non-technical stakeholders.
Experience leading technical teams or acting as a project technical lead.
Information Security Architect
Security architect job in New York, NY
Mini-Circuits designs, manufactures and distributes integrated circuits, modules, and sub-systems for high-performance radio frequency (RF) and microwave applications. With design, sales and manufacturing locations in over 30 countries, Mini-Circuits' products are used in a range of wired and wireless communications applications. Our products are also used in detection, measurement and imaging applications, including military communication, guidance and electronic countermeasure systems, commercial, scientific, military land, sea and aircraft; automotive systems, medical systems, and industrial test equipment.
Mini-Circuits' sells its products to over 20,000 customers globally through our direct sales force, applications engineering staff, sales representatives, as well as through our extensive website.
Position Summary:
The primary function of the Information Security Analyst is to foster a culture of Cyber Security at Mini-Circuits by developing and managing the Information Security Program. The security program manager must understand the IT risks faced by the enterprise, create and drive execution and realization of the security initiatives. This position also requires technical proficiency on the IBM System i to assess security controls and the business risks associated with the mission critical ERP server.
Salary Range: $155,000 - $175,000 per year
Job Function:
Lead the Information System Security Program and align with organization's mission, goals, and business strategy.
Develop guiding principles, policies, standards, procedures, and technical documentation based on current Security Control frameworks and Industry standards.
Align execution roadmap with IT strategy for implementation, compliance, and internal assessment with NIST frameworks 800-53, 800-171 and CMMC
Perform risk assessments, maintain the IT risk register, and measure continuous improvement
Perform vulnerability assessments and test security controls, use findings to develop new security initiatives and improvement
Collaborate with partners and IT infrastructure team to address IT security risks, vulnerabilities by implementation of controls to mitigate the same
Identify, classify data assets, and determine controls required for data security and appropriate data handling procedures
Deliver security awareness to users, run simulated phishing campaigns
Research solutions for implementing technical controls using secure design principles
Implement controls for managing Identification and authentication, including privilege access management, and creating procedures for continuous assessment of control
Perform Security incident response activities in support of the Enterprise systems and assist the infrastructure team to remediate the incident
Develop and test Disaster recovery plans for Enterprise Systems, including use of tabletop exercises
Complete the due diligence questionnaires regarding Information Security posture for customers
Perform administration, and maintenance of the IBM i server and Infor XA ERP application.
Perform code reviews to assess security of changes made for ERP application modules.
Qualifications:
Bachelor's degree in Computer Science/Computer Engineering.
Master's degree in Management of Information Systems preferred.
CISSP or equivalent certification required.
Ability to prioritize effectively.
Good verbal and written communication skills for documentation and presentations when working with users.
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. While performing the duties of this job, the employee is regularly required to talk and hear. The employee frequently is required to stand, walk, sit and use hands to operate a computer keyboard. The employee is occasionally required to reach with hands and arms. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision, and ability to adjust focus. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Additional Requirements/Skills:
Comply, understand, and support corporate safety initiatives to ensure a safe work environment.
Ability and willingness to abide by Company's Code of Conduct.
Valid driver's license and ability to drive for extended periods of time.
Occasional travel, some overnight, as required.
Disclaimer: The listed qualifications and requirements for each position are intended as guidelines. Mini-Circuits reserves the right to hire outside of these guidelines at Management's discretion.
Mini-Circuits is an Equal Opportunity Employer and does not discriminate on the basis of actual or perceived age, race, creed, color, national origin, sexual orientation, military status, sex, disability, predisposing genetic characteristics, marital status, familial status, gender identity, gender dysphoria, pregnancy-related condition, and domestic violence victim status or protected class characteristic, or any other protected characteristic as established by federal or state law.
Auto-ApplyInformation Security Architect
Security architect job in New York, NY
Job Description
We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices.
This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
To be Successful in this Role
Develop an architectural vision to support the continued growth of the product suite
Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use
Experience with privacy-enhancing technologies and encryption techniques.
Working knowledge of cloud security architecture strategies, frameworks, and reference models
Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives
Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management
Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc.
Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure
Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design.
Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture
Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward.
Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans.
Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally
Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security.
Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment.
Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives.
Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs
Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components.
You Will Have
8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture
Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.)
Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations.
Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics.
Hands-on experience with Cloud Technologies AWS, Azure & GCP
Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks
Experience in managing and contributing to incident response
Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation.
Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
Aws Security Architect
Security architect job in New York, NY
Sonoma Consulting is one of the fastest growing national IT Consulting and Executive Search company in the United States, which was founded in 2011 by Mark McGee, the President and CEO. Sonoma Consulting has two business divisions - IT Consulting Services & Executive Search to serve its 150 national clients which range from entrepreneurial start-ups to Global Fortune 500.
Job Description
Expecting the first 2-3 weeks on site in NYC and theremainder of the project to be remote
Duties:
§ Analyze and design security solutions for applications and infrastructure, and provide expertise and consulting to clients;
§ Identify and document information security risks and propose mitigating controls;
§ Will be responsible for understanding complex business IT needs, requirements, and projects scopes, with a focus on information security requirements;
§ Research, design, and develop new information security controls for clients;
§ Assess current IT environments and make recommendations to increase security;
§ Assist clients in troubleshooting and resolving information security issues;
§ Author project and support documentation and diagrams; and
§ Implement security solutions.
Qualifications
Required Experience:
Assessed, developed and implemented, operationalized and documented comprehensive security technologies and processes;
Secure
software development, data protection, cryptography, key management,
identity and access management (IAM), network security (VPNs) within
SaaS, IaaS, PaaS, and other cloud environments.
Architected solutions within Amazon Web Services (AWS) and other cloud providers and SOA for cloud-based services;
Worked with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies;
Performed security design/architecture reviews, code reviews, and penetration tests of large applications, systems and/or networks;
Worked
on large scale cloud based services (including SaaS, PaaS, IaaS) and
understand security challenges involve in deploying Cloud Applications;
Created and maintained security policies and procedures, managing the protection of information systems and assets;
Performed threat modeling and design reviews assessing security implications and requirements introducing new technologies;
Hand-on
experience with multiple security technologies such as Firewalls,
Intrusion Detection/Prevention Systems, Vulnerability Scanning, WAF,
Wireless LAN, NAC, DLP, DDoS Mitigation, WAN security, SIEM, Content
Filtering, Cloud Security gateways, Secure Proxies, SSL crypto solutions
Solid
understanding of a range of compliance, regulatory and legal
requirements and relevant principles, best practices and standards
across multiple industries. Preferred industries: financial services, telecommunications. Examples would include: PCI, SOX, GLBA, CSA, PCI, NIST, ISO, IEEE, FedRAMP, HIPAA and TCG
Have
working knowledge of common and industry standard
cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID,
SAML, Ping, Okta, etc) and key management (Safenet, Vormetric, other)
Excellent
verbal and written communication skills including the ability to
present materials with detailed technical specs, represent technical
viewpoints to diverse audiences and making prudent technical risk
decisions.
Ability to collaborate and work well within a team
Customer service orientation - an attitude of “yes, here's how”, instead of “no”
Flexibility to travel up to 30-50%
Cloud
security and/or architecture related certifications - AWS Certified
Solutions Architect or Certified DevOps Engineer would be a plus
Additional Information
All qualified applicants will receive consideration for employment
without regard to race, color, religion, place of origin, ethnic origin,
national origin, ancestry, age, sex, sexual orientation, gender
identity, transgender status, genetic information, mental or physical
disability, marital status, pregnancy, veteran status, or any other
characteristic protected by applicable national, state, or local law.
Security Architect
Security architect job in New York, NY
TekWissen provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each clients requirements and span the services spectrum from Application Development/Maintenance testing, IT Consulting & staffing for IT Infrastructure Management through strategic consulting and industry-oriented business process.
Job Description
Experience with penetration testing tools - Burp Suite, Kali Linux, Metasploit, NMAP, SQLMap, Cain and Able, Ettercap, etc
Required: (Only W2 contract)
• Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
• Feed high level architectural ideas, low technical code snippets, security re-design component framework modules, etc. back to the respective Engineering Team(s) for review and work closely with them to improve the overall system.
• Understand the big picture of impact of changes and secure interfaces improvements in the overall environment
• Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; adhering to industry standards.
• Verifies security systems by developing and implementing test scripts.
• Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
• Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
• Prepares system security reports by collecting, analyzing, and summarizing data and trends.
• Self-motivated and detail-oriented.
• Excellent communication (oral and written), interpersonal, organizational, and presentation skills.
Additional InformationThanks & Regards,
Aravind Jakku
aravind.j-tekwissen.com
************
Security Architect - Infrastructure
Security architect job in New York, NY
Principal Security Architect - Infrastructure & Emerging Technologies
Compensation: Exceptionally Generous + Bonus + Benefits
The firm:
Join an elite technology and research group at the forefront of global finance. Their engineering teams operate at a scale and complexity that few can match, tackling some of the most interesting and difficult challenges in any industry. They are a community of passionate problem-solvers, where intellectual curiosity and deep technical expertise are paramount. If you are driven to design resilient security for cutting-edge, high-stakes environments, this is your opportunity to make a significant impact.
The role:
We are seeking a deeply experienced and forward-thinking Principal Security Architect to join their infrastructure security team. In this role, you will be a key leader responsible for designing, engineering, and enhancing the security posture of their complex global infrastructure. You will work side-by-side with world-class development and infrastructure teams, ensuring that security is a foundational component of everything you build, from on-premises systems to next-generation AI platforms. This is a hands-on architectural role that requires a blend of strategic vision and deep technical implementation skills.
Your responsibilities:
Architect & Design: Engineer and design the core security architecture for their global infrastructure, including networks, cloud environments, and internal systems.
Collaborate & Review: Work closely with development and infrastructure teams to perform in-depth security reviews of both new and existing systems, ensuring secure design patterns are implemented throughout the entire lifecycle.
Secure Next-Generation Platforms: Take a leading role in developing the security frameworks and controls for our cutting-edge platforms, including our Generative AI and Large Language Model (LLM) infrastructure.
Implement Modern Security Principles: Drive the implementation and enhancement of Zero Trust principles, advanced network segmentation, and robust authentication mechanisms across the firm.
Automate & Build: Utilize your programming and scripting skills to design, build, and operate innovative tools and automation that improve our internal security operations and defensive capabilities.
What you'll bring:
Extensive experience in security architecture, with a strong foundation in hands-on infrastructure or network engineering.
Proven experience designing and implementing security controls for complex, large-scale enterprise environments.
Deep expertise in securing Linux-based infrastructure at scale.
Practical experience with Zero Trust architecture design and implementation, including concepts like network microsegmentation.
Proficiency in at least one programming or scripting language (e.g., Python, PowerShell, Go) for automation and tool development.
Experience collaborating with development teams and integrating security into modern development practices (e.g., CI/CD security).
A forward-thinking mindset with a demonstrable interest in tackling security challenges for emerging technologies like AI/ML.
Security Architect
Security architect job in New York, NY
The
Information Security Architect
is responsible for establishing and maintaining portions of the Scholastic Technology Service (STS) Security Program, which is designed to ensure that the company's technology systems and information assets are adequately protected.
The Security Architect:
Plays a critical role to assure that the various technical, process and people elements of Scholastic's security program result in a security posture consistent with policy, regulatory, and customer expectations and requirements.
Is not only expert in the diversity of current risks and threats and means of addressing them, but also brings a broad technology background, including development and technology operations. This broad background enables the security architect to liaise with a wide variety of technology leaders to build trust, provide guidance and work in a consultative fashion to design and implement effective security constructs, controls, and mitigations.
Is a process owner for Scholastic's Information Security (IS)-related risk assessment and identification activities, for the company's systems and information assets and for its technology-dependent strategic business objectives.
A crucial element of this role is working with senior executives, line-of-business managers and other key decision makers to determine acceptable levels of residual risk for the company as a whole and for various internal departments and organizations.
Is a proven thought leader, problem solver and integrator of people and processes, as well as an effective internal consultant.
Must possess:
o In-depth knowledge of Scholastic's business environment, to ensure that the company's systems and services are appropriately protected and fully functional.
o Solid domain competencies in a number of risk-related disciplines, including security, business continuity management, business continuity management, privacy and compliance.
Primary Responsibilities and Activities:
• Ensure that the customer and market facing security demands and expectations are well known (as they evolve and change over time), and that the related security designs either meet or are evolving to meet those demands.
• Meet customer and business expectations in avoidance of business risk, with regard to information security and privacy issues.
• Work directly with business units and other internal departments and organizations to facilitate IS risk analysis and risk management processes, identify acceptable levels of residual risk, establish roles and responsibilities related to information classification and protection, and to ensure that other managers are taking effective remediation steps.
• Create, disseminate and (as required) update documentation of Scholastic's matrix of identified IS risks and controls.
• Play a critical role in managing executive level relationships across the technology and business organizations.
• Coordinate information security and risk management projects with Scholastic personnel from the STS organization, lines of business, and other internal departments and organizations.
• Review risk assessments, analyze the effectiveness of Scholastic's IS control activities and report on them, with actionable recommendations to STS Management.
• Be the central point of design and review and establish standards for the technical aspects of security to ensure that security components integrate into a comprehensive and effective security posture. These aspects or components include: infrastructure and network; data protection mechanisms; policy; hardening and deployment standards and practices; application security.
• Work closely with the enterprise architecture function to ensure that security needs and constructs are included in all aspects of enterprise technology.
• Serve as a technical expert resource to infrastructure and operations staff on choosing, implementing, and configuring tools, products, and solutions to meet security objectives.
• Serve as reviewer and approver of all requested exceptions to technical standards as related to security.
• Follow up on deficiencies identified in monitoring reviews, self-assessments, automated assessments, and internal and external audits to ensure that appropriate remediation and mitigation measures have been taken.
Qualifications
Education and Training:
Education:
Minimum Bachelor of Science required, with a focus on Information Technology or Information Security and architecture-related disciplines (e.g. computer science; security; enterprise architecture; software engineering). A business degree is beneficial.
Professional Certifications:
Candidates with the following certifications are preferred: ISC2, SANS, ISACA, or other recognized security professional credentialing organization
Experience:
8-10 years or experience in an enterprise technology environment, ideally with customer-facing systems and services. Numerous roles are applicable - operations, application development, networking, systems and infrastructure architecture, or other as applicable.
5-7 years of experience in security roles with increasing responsibility and business-leadership exposure. Previous roles may include information security analyst, application security or penetration testing, network-related security roles (firewall, intrusion detection, data loss prevention), or audit/compliance such as working to maintain SOX, PCI, and/or HIPAA compliance.
Evaluation of Success:
• The scope of the Security Architect's role will be determined by the Corporate Information Security Office (CISO) and/or the Director, Information Compliance & Risk Management who will be responsible for evaluating the Security Architect's performance.
• The Security Architect's performance will largely be evaluated on the basis of success in identifying IS-related risks, and developing and implementing effective policies, with regularly tested controls, to manage those risks.
Required Knowledge and Skill:
• Solid understanding of application security, including secure coding practices and standards, penetration testing and overall secure SDLC practices. Working knowledge of the use of common application frameworks in Java, .NET and others to avoid common classes of application vulnerabilities (e.g. OWASP Top Ten) is required.
• Strong infrastructure security skills including IDS/IPS, firewall, SIEM, server and OS hardening, malware detection, physical security, transport and at-rest encryption on file systems, DB, and other data persistence mechanisms.
• Previous experience in strategic planning and associated processes for budgeting and portfolio decision-making for business or technology goals is required. The ability to distill requirements from non-technical staff and working relations and build road-maps and prioritize over time is also required.
• A track record of contributing to and leading cross-functional teams delivering technology services and solutions for internal business stakeholders or customers.
• Prior exposure to security and/or risk-related compliance audit is strongly preferred.
• Formal project management experience and/or skills are a plus.
Key Behaviors and Competencies
• In-depth understanding of strategic business risks.
• Ability to develop a comprehensive understanding of Scholastic's business, market and industry and relate that knowledge to identified operations- and IS-related risks.
• Knowledge necessary to propose relevant responses to changing business risks and regulatory changes.
• Proven ability to communicate with people at all levels - from developers to the board of directors.
• Excellent written and verbal communication skills - including the ability to effectively communicate security- and risk-related concepts to technical and nontechnical audiences - and strong interpersonal and collaborative skills.
• Strong skills as a negotiator, to facilitate commitment to, and sign-off on, appropriate levels of residual risk from line-of-business managers.
• High level of personal integrity, with the ability to handle confidential and otherwise sensitive matters professionally and with the appropriate level of judgment and maturity.
• High degree of initiative, dependability and ability to work with little supervision.
• Capable of successfully handling multiple high priority tasks in a team setting.
Application Security Architect
Security architect job in New York, NY
ABOUT THE JOB
The ACLU seeks applicants for the full-time position of Application Security Architect in the Information Security Department of the ACLU's National office in New York, NY
.
This is a hybrid role that has in-office requirements of two (2) days per week or eight (8) days per month.
This role will define how secure applications are designed, integrated, and maintained across the ACLU's cloud, SaaS, and hybrid environments. You'll lead efforts to embed security throughout our software development lifecycle (SDLC), own our internal Security Architecture Review (SAR) process, and guide secure integration practices for highly customized platforms and other third-party applications critical to our civil liberties mission.
The AppSec Architect will partner closely with product and platform teams, Tech Engineering, Devops, IT, and affiliates to assess and mitigate risks associated with application design, data flows, integrations, and third-party software usage. You'll help set and enforce security standards, perform hands-on threat modeling, define secure development and deployment patterns, and directly support high-impact systems involving donor data, legal case workflows, and internal operational apps.
This hands-on technical leadership role will own and drive the ACLU's application security efforts across both internally developed and externally adopted applications.
This position is part of a collective bargaining unit. It is represented by ACLU Staff United (ASU).
WHAT YOU'LL DO
Reporting to the Director, Security Architecture & Engineering, the Application Security Architect will define and drive the ACLU's application security roadmap-from code to cloud, and everything in between.
YOUR DAY TO DAY
Lead the ACLU's Application Security Program, owning the InfoSec SDLC strategy and continuous improvement of application-layer security across cross-functional teams.
Own the Security Architecture Review (SAR) process, including intake, risk evaluation, documentation, and partner engagement.
Perform and guide threat modeling for new applications, integrations, and high-risk workflows-including financial systems, legal platforms, and supporter/donor tools.
Define secure design patterns for authentication (OAuth/OIDC), secrets management, API authorization, session handling, and data flow protections across internal and third-party systems.
Evaluate, deploy, and maintain AppSec tooling such as SAST, DAST, SCA, API security tools, and secrets detection platforms, based on risk and developer stack alignment.
Partner with stakeholders to assess internal cloud apps, low-code tools, and internal workflow automations for security risks.
Oversee application-layer vulnerability triage, analysis, and escalation-including issues from internal testing, coordinated disclosure, and external penetration testing.
Collaborate with platform owners of high-risk SaaS platforms to validate that application-level security controls-authZ, audit logging, IP allowlists, token lifetimes, etc.-are in place and enforced.
Ensure application-layer security extends across data ecosystems, including ETL and reverse ETL pipelines, data warehouse platforms (e.g., Redshift, Snowflake), and high-risk integrations that move or transform sensitive donor, legal, or supporter data between internal systems and external SaaS tools.
Identify and reduce emerging application-layer risks related to AI adoption, including prompt injection, model abuse, insecure integrations with LLM APIs, and exposure of sensitive data through AI-powered features or automations.
FUTURE ACLU'ERS WILL
Be committed to advancing the mission of the ACLU
Center and embed the principles of equity, inclusion and belonging in their work by demonstrating commitment to diversity with an approach that respects and values multiple perspectives
Be committed to work collaboratively and respectfully toward resolving obstacles and conflicts
WHAT YOU'LL BRING
Extensive experience in application or product security, secure software development, or DevSecOps architecture.
Practical experience designing and implementing secure SDLC, AppSec testing workflows, or automated CI/CD security gates.
Deep understanding of common software vulnerabilities (e.g., OWASP Top 10), secure coding practices, and threat modeling methodologies.
Familiarity with GitHub Actions, modern SaaS stacks, and secure API design principles.
Familiarity with CMS tooling (e.g., Drupal, WordPress), cloud computing platforms (e.g., GCP, Azure, AWS), and containerization environments (e.g., Kubernetes, Docker, ECS).
Experience securing data pipelines and warehouse environments, with a focus on protecting structured data.
Experience partnering directly with developers and product teams to influence secure outcomes.
Excellent communication skills, especially when translating technical issues into business risk language.
COMPENSATION The ACLU is committed to equity, transparency, and clarity in pay. Consistent with our compensation philosophy, there is a set salary for each role based on geographic work location. The annual salary for this position is $161,123 (Level - E), reflecting the salary of a position based in New York, NY. Salaries are subject to a regional pay adjustment if authorization is granted to work outside of the location listed in this posting. For details on our pay structure, please visit: ************************************************************************ WHY THE ACLU
For over 100 years, the ACLU has worked to defend and preserve the individual rights and liberties guaranteed by the Constitution and laws of the United States. Whether it's ending mass incarceration, achieving full equality for the LGBTQ+ community, establishing new privacy protections for our digital age, or preserving the right to vote or the right to have an abortion, the ACLU takes up the toughest civil liberties cases and issues to defend all people.
We know that great people make a great organization. We value our people and know that what we offer is essential not just their work, but to their overall well-being.
At the ACLU, we offer a broad range of benefits, which include:
Time away to focus on the things that matter with a generous paid time-off policy
Focus on your well-being with comprehensive healthcare benefits (including medical, dental and vision coverage, parental leave, gender affirming care & fertility treatment)
Plan for your retirement with 401k plan and employer match
We support employee growth and development through annual professional development funds, internal professional development programs and workshops
OUR COMMITMENT TO ACCESSIBILITY, EQUITY, DIVERSITY & INCLUSION
Accessibility, equity, diversity and inclusion are core values of the ACLU and central to our work to advance liberty, equality, and justice for all. For us diversity, equity, accessibility, and inclusion are not just check-the-box activities, but a chance for us to make long-term meaningful change. We are a community committed to learning and growth, humility and grace, transparency and accountability. We believe in a collective responsibility to create a culture of belonging for all people within our organization - one that respects and embraces difference; treats everyone equitably; and empowers our colleagues to do the best work possible. We are as committed to anti-oppression, anti-ableism, and anti-racism internally as we are externally. Because whether we're in the courts or in the office, we believe ‘We the People' means all of us.
With this commitment in mind, we strongly encourage applications from all qualified individuals without regard to race, color, religion, gender, sexual orientation, gender identity or expression, age, national origin, marital status, citizenship, disability, veteran status and record of arrest or conviction, or any other characteristic protected by applicable law.
The ACLU is committed to providing reasonable accommodation to individuals with disabilities. If you are a qualified individual with a disability and need assistance applying online, please email
************************
. If you are selected for an interview, you will receive additional information regarding how to request an accommodation for the interview process.
Auto-ApplySr. Security Portfolio TPM
Security architect job in New York, NY
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
The Opportunity
The Adobe Security organization seeks a proactive force multiplier with experience skillfully leading multiple technical programs, running a healthy portfolio, working directly with leadership, and delighting stakeholders. Our ideal candidate has superb communication and relationship-building skills and a solid track record of driving business outcomes through managing large programs. In addition, familiarity with fundamentals in key security operations and related security compliance frameworks could help this candidate have an immediate impact. If you excel at navigating complexity with multiple internal customers, are a master planner who helps teams foresee challenges and risks and guides them through them, and are equipped with a diverse technical program management toolbox, we can't wait for you to join our Security PMO team!
What you'll Do
* Partner directly with security leadership to build a portfolio of key programs. Lead and monitor the health and execution of several key initiatives with insights into status, risks, dependencies, roadblocks, and budget across the organization's program portfolio.
* Ensure a healthy program portfolio in Adobe's Technology GRC (Governance, Risk, and Compliance) organization with a clearly defined roadmap.
* Bring together cross-functional teams to deliver business outcomes for high-priority programs through clear planning, execution, partnership, and communication.
* Make things easier for all collaborators of your program portfolio by driving simplicity, clarity, and efficiency in all aspects of your work.
* Reduce program risk by proactively identifying, communicating, and removing roadblocks.
* Build trust through visibility. Provide accurate and timely data-driven status reports for a broad audience and lead executive governance meetings.
* Effectively handle program financials, including driving accurate budget forecasts.
What you need to succeed
* Exceptional communication skills for effective engagement with both engineers and executives in meetings, presentations, and writing. Excel at building strong and trusted partner relationships.
* 7+ years as a program manager in the security domain with portfolio-level oversight experience. Demonstrate strong knowledge in the compliance field and have worked closely with the compliance teams on projects.
* Experience leading programs involving AI systems and workflows (e.g., MCP servers, RAG capabilities, LLM integrations, or related AI infrastructure).
* Established history of effectively managing programs from inception, prioritizing, and strategizing to implementation, reporting, and successful delivery of intricate projects with many significant internal customers.
* Demonstrated Agile practice experience in software projects and familiarity with Jira (including query and dashboarding), O365 Suite, MS Teams, SharePoint, MS Project, Excel, and Miro or equivalent experience
* Familiarity with compliance frameworks such as ISO 42001, SOC2, HIPAA, PCI DSS, ISO27001, ISO27017/18, ISO22301, and Geo-compliance programs.
* Preferred Certifications: CISSP, CISM, PMP, or equivalent credentials demonstrating expertise in cybersecurity and program leadership.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $124,300 -- $228,400 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process.
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and "fair chance" ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
Manager, Information Security Compliance
Security architect job in New York, NY
Department Description At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company (TWDC) is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance these exciting experiences.
The Enterprise Technology mission is to deliver technological solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence.
The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to:
* Secure the Magic by protecting information systems and platforms.
* Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests.
* Strengthen the business through optimizing execution, application, and technology used to protect the Company.
* Innovate by investing in core capabilities to enhance operational efficiency.
Team Description:
Global Information Security (GIS) supports all of Disney's business segments, including Disney Entertainment & ESPN (DE&E). DE&E encompasses the operations of Disney's streaming services-Disney+, Hulu, ESPN+, Disney+ Hotstar, Star, and the upcoming Venu Sports streaming service-as well as Disney's broadcast and cable networks, including ABC, ESPN, FX, Disney Channels, and National Geographic. DE&E sits at the intersection of entertainment, sports, and technology, striving to connect viewers with beloved stories while advancing the streaming industry with consumer-first innovations. Security professionals supporting DE&E work with industry-leading technologies to deliver world-class, highly secure services to customers.
What You'll Do:
* Independent audit support for:
* SOX 404 ITGCs
* PII
* PCI
* ISPS
* Collaborate with Enterprise Controls and Compliance (ECC) to scope systems and respective ITGCs.
* Perform control health checks and remediation testing procedures to address issues identified via audit assessments, access control reviews, internal or external audits and/or other assessments.
* Develop and lead the Control Assurance Programs (ISPS and SOX).
* Lead Audit Readiness efforts to ensure proper system scoping and respective ITGCs, control validations and timely program onboarding.
* Participate in audit walkthrough meetings to help establish internal testing procedures to gain operational comfort in the design of the Company's automated controls.
* This includes control self-evaluations of new controls or processes that impact the effectiveness of an existing control.
* Perform impact analysis and risk assessment on deficiency findings and documentation associated with the assessment.
* Work with management and internal audit on maintaining the master Risk and Control Matrix over the systems material to Disney Entertainment and ESPN (Broadcast TV and Streaming - Hulu, Disney+, ESPN+, STAR+ products)
* Ensure for timely management response of audit findings into our corporate SOCD/SAD.
* Oversee ISPS Management Audit coordination and open action plans.
* Provide consultancy to Development leads to identify and implement automation and efficiency opportunities to meet governance and compliance demands.
* Management of GRC workflows around coordination of certifications and attestations.
* Partner with leadership to support the PCI-DSS compliance program.
* Develop training materials, coordinate training sessions, and monitor compliance with training requirements.
* Oversee and manage a team of compliance analysts, ensuring day-to-day operations run smoothly and efficiently.
* Assign tasks and projects to team members based on priorities, deadlines, and individual strengths.
* Provide executive level updates on Compliance programs
Must Haves (Years of Experience, languages, programs, tools, etc.):
* Minimum of 8 years of related work experience, with 3 in management roles
* IT SOX experience and proven experience in supporting IT audit/compliance functions
* Experience in managing people
* Thorough understanding of SOX ITGC and ICFR 404 standards and audit objectives
* Interpersonal skills with the ability to work with teams cross-functionally
* Strong verbal and written communication skills and ability to effectively communicate to technical and non-technical audiences, including developers and tech operators
* Detail-oriented but able to understand the big picture. Highly organized and efficient
* Ability to navigate through ambiguity, manage and coordinate multiple project assignments simultaneously in a fast-paced, deadline-driven environment, accepting ownership and accountability of the process and deliver on commitments
* Experience with cloud-based services, specifically AWS
Nice To Haves (see above):
* Experience and knowledge of NIST framework, ISO 27001, K-ISMS, GDPR
* Experience working with companies that have a heavy microservice architecture
Education:
Bachelor's degree in Computer Science, CPA license, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience
The hiring range for this position in Glendale, CA and Santa Monica, CA is $141,900 to $190,300 per year and in New York, NY is $148,700 to $199,400 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
About The Walt Disney Company (Corporate):
At Disney Corporate you can see how the businesses behind the Company's powerful brands come together to create the most innovative, far-reaching and admired entertainment company in the world. As a member of a corporate team, you'll work with world-class leaders driving the strategies that keep The Walt Disney Company at the leading edge of entertainment. See and be seen by other innovative thinkers as you enable the greatest storytellers in the world to create memories for millions of families around the globe.
About The Walt Disney Company:
The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise that includes three core business segments: Disney Entertainment, ESPN, and Disney Experiences. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney's stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished.
This position is with Disney Worldwide Services, Inc., which is part of a business we call The Walt Disney Company (Corporate).
Disney Worldwide Services, Inc. is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, religion, color, sex, sexual orientation, gender, gender identity, gender expression, national origin, ancestry, age, marital status, military or veteran status, medical condition, genetic information or disability, or any other basis prohibited by federal, state or local law. Disney champions a business environment where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a constantly evolving world.
Apply Now Apply Later
Current Employees Apply via My Disney Career
Explore Location
Systems Engineer - Physical Security
Security architect job in New York, NY
Hudson River Trading (HRT) is looking for a Systems Engineer with a focus on physical security systems to join our Enterprise Technology team. This role will liaise closely with our Workplace and various Security teams to conduct research, design, and maintain physical security platforms. You'll join a lean and technical team with opportunities to architect, own, and evolve HRT's global physical security infrastructure, driving both strategic vision and hands-on execution, to help HRT stay secure while providing a great employee experience.
Responsibilities
Research, architect, and deploy physical security systems across our offices and supporting sites around the globe
Conduct audits and risk assessments of the physical security of equipment and locations globally
Curate an enjoyable employee experience while helping to maintain safety, security and compliance
Manage user roles, permissions, and system access in compliance with company policies and best practices
Troubleshoot hardware/software issues, perform diagnostics, and provide Level 2/3 support
Create and maintain documentation of configurations, procedures, and system architecture
Help lead technical response and forensic analysis for physical security incidents in collaboration with Workplace and Security Operations teams
Collaborate with internal stakeholders to evaluate and adopt next-generation physical security technologies, such as AI-driven analytics, mobile credentials, or zero-trust physical systems
Qualifications
5+ years of experience in the systems architecture, engineering, and administration of physical security systems (camera infrastructure, badge platforms, biometrics, environmental sensors, access control, etc.)
Experience with open protocols and standards in physical security (OSDP, SNMP, etc.)
Experience with consolidating and automating identity management, configuration, and logging for disparate physical security, access control, and digital IAM platforms
Experience with data center physical security systems (VSS, ACS, IDS, anti-tailgating, anti-passback, mantraps, etc.)
Experience automating through code (Python, Go, PowerShell) and working with SDKs/APIs
Strong knowledge of networking concepts and protocols
Familiarity with securing IP-based physical systems and awareness of modern physical security threats (e.g., firmware supply chain, OT/IT convergence)
Willing to travel 20% of time to visit other offices and facilities as needed
A certification like Certified Protection Professional (CPP) or Physical Security Professional (PSP) is a plus
Experience using Linux is a plus
Experience with public cloud providers (GCP, AWS, Azure) is a plus
The estimated base salary range for this position is $150,000 - $250,000 per year, based on job-related skills and experience. This role will also be eligible for discretionary performance-based bonuses and a competitive benefits package.
Culture
Hudson River Trading (HRT) brings a scientific approach to trading financial products. We have built one of the world's most sophisticated computing environments for research and development. Our researchers are at the forefront of innovation in the world of algorithmic trading.
At HRT we welcome a variety of expertise: mathematics and computer science, physics and engineering, media and tech. We're a community of self-starters who are motivated by the excitement of being at the cutting edge of automation in every part of our organization-from trading, to business operations, to recruiting and beyond. We value openness and transparency, and celebrate great ideas from HRT veterans and new hires alike. At HRT we're friends and colleagues - whether we are sharing a meal, playing the latest board game, or writing elegant code. We embrace a culture of togetherness that extends far beyond the walls of our office.
Feel like you belong at HRT? Our goal is to find the best people and bring them together to do great work in a place where everyone is valued. HRT is proud of our diverse staff; we have offices all over the globe and benefit from our varied and unique perspectives. HRT is an equal opportunity employer; so whoever you are we'd love to get to know you.
Auto-ApplyInformation Security Manager
Security architect job in New York, NY
Historically, US Healthcare has relied on a fee-for-service reimbursement system where providers are paid based on the quantity of patient visits and procedures, rather than the quality of health outcomes.
At Stellar Health, we help primary care providers put patient health first. Our platform - a mix of technology, people, and analytics - supports providers at the point of care, delivering real-time patient information, activating practice staff, and empowering providers and care teams with incentives that reward the work they are already doing to keep patients healthy. Using the Stellar App, our web-based, point-of-care tool; practices receive a simple checklist of recommended actions that support the best quality care. Providers and care teams are then paid monthly for each action they complete, and Payors save money in reduced healthcare costs along the way.
Stellar is a US-based Health-tech backed by Top VCs (
General Atlantic, Point72, & Primary Venture Partners)
with an established product & proven operating model. We've shown that we make a real difference for physician practices and their patients.
About the position:
Stellar Health is looking for an Information Security Manager to help prioritize and drive our Information Security program and investments. We are looking for an individual that is passionate about building out new security processes that are thoughtful in their design for both external users, customers, and teammates.
Stellar Health operates in the HealthTech space and is HITRUST R2 certified. This role will help ensure our security program is proactive as possible by:
Helping reduce the effort to maintain and demonstrate our alignment to HITRUST by automating the collection of evidence, as well as deploy continuous testing of controls.Staying aligned with our cross-functional teams as they deliver on their controls and support our security processes. Bolster and improve our internal security processes as a security team by partnering with our leadership team to set strategic priorities for the team, informed by our organization and platform services' threat models.
How you'll make an impact:
By 3 months you will…
Have a solid foundation of our current security posture, controls, and security processes, what is working well and where there are gaps Have a prioritized list of areas of improvement and/or investments to help reinforce and improve our security posture Implemented 1-2 improvements to current processes and/or automations to ensure a security control is working appropriately, examples of potential improvements:Ensure all Git repos align with our change management standards around PR reviews, automated code testing, deployments and any required security reviews Implement continuous testing of our endpoint configurations to ensure they align to our security standards (e.g. all endpoints are encrypted at rest, have security agents deployed)
By 6 months you will…
Aligned with senior leadership around team skillset and staffing needs to maintain security processes and operations Collaborated with other teams that support our security controls to expand the list of improvements to include non-security pain points in evidence collection or inefficient processes Delivered first quarter of 1-2 projects from the prioritized list of areas of improvement Established a process to review high risk applications and systems with System Owners to ensure they align to any applicable security standards/controls and other security recommendations
What You'll Bring:
4-5 years of security program & engineering experience building and implementing security tooling and processes Strong familiarity and experience helping secure cloud environments and infrastructure, preferably AWSSupported, and preferably led, external audits of security frameworks (e.g. SOC 2 Type 2, ISO 27001, HITRUST) Experience with coding and automation, preferably Python and/or Terraform
Who will love this job:
You enjoy a tight partnership and daily interactions with DevOps and IT engineers to deliver on technical projects and process improvements
You are passionate about designing thoughtful, business-focused solutions to security problems vs implementing a security “best practice” solution when not applicable
You appreciate the need to audit and validate security controls, but would much rather automate the work where possible so you can focus your efforts on creating strong proactive partnerships and further reducing security risks elsewhere
Pay:
The salary range for this role is $170,000 - $200,000 + an annual performance based bonus. Where a new hire falls within this range will be based on their individual skills and experience, and how these competencies compare across other employees in the same role. Stellar's bands are designed to allow for individual compensation growth within the role. As such, new hires typically start at the lower end of the range. Stellar rewards performance and outcomes - should you join the company, you will have the opportunity to grow your salary over time.
Perks & Benefits:
Stellar offers a carefully curated selection of wellness benefits and perks to our employees:
Medical, Dental and Vision Benefits
Flexible PTO
Universal Paid Family Leave
Company sponsored One Medical memberships and Citibike memberships
Medical Travel Benefits
A monthly wellness stipend that gives employees the freedom to choose where they spend their cash, whether it be on wellness, pet care, childcare, WFH items, or charitable donations
Stock Options & a 401k matching program
Career development opportunities like Manager Training, coaching, and an internal mobility program
A broad calendar of company sponsored social events that for our in-office and remote employees
Diversity is the key to our success. Stellar Health is an equal opportunity employer and we are open to all qualified applicants regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or expression, veteran status, or any other legally protected status.
We believe that diverse teams -and the different identities, cultures, and life experiences our team members bring to the table- enable us to create amazing products, find creative solutions to interesting problems, and build an inclusive working environment.
Stellar Health Employment Privacy Notice
At Stellar Health, your privacy and security as a job seeker is a priority no matter where you are in the interview process. As recruiting scams have become more prevalent, please take note of the following practices to ensure the legitimacy of any interaction with our team.
Please note that any communication from our recruiters and hiring managers at Stellar Health about a job opportunity will only be made by a Stellar Health employee with an @stellar.health email address.
Stellar Health does not utilize third-party agencies for recruitment services and does not conduct text message or chat-based interviews. Any other email addresses, agencies, or forums may be phishing scams designed to obtain your personal information.
We will not ask you to provide personal or financial information, including, but not limited to, your social security number, online account passwords, credit card numbers, passport information, and other related banking information until we begin onboarding activities, which will be coordinated by a member of the Stellar Health People Ops Team with an @stellar.health email address.
If you are ever unsure whether you are in contact with a legitimate Stellar Health teammate, please contact people-team@stellar.health. If you believe you've been a victim of a phishing attack, please mark the communication as “spam” and immediately report it by contacting the U.S. Federal Trade Commission.
Auto-ApplyInformation Security Officer
Security architect job in New York, NY
This role is located in New York City and will require a hybrid work schedule of at least 2 days in office per week.
This role is for Vice President level candidates.
About the Bank:
Sumitomo Mitsui Trust Bank, Limited was established through the merger of The Sumitomo Trust and Banking Co., Ltd with Chuo Mitsui Trust and Banking, Ltd. on April 1, 2012. We are one of the largest asset managers in Asia and number one among Japanese financial institutions by AUM, with approximately $850 Billion USD in AUM. The Bank provides an assortment of financial solutions and manages a broad spectrum of financial products across its global branches. Department Overview:
The Americas Division (“AD”) was established in the Sumitomo Mitsui Trust Bank, Limited, New York Branch) (“SMTBNY”) to perform corporate functions and supervise U.S. entities. Established under the AD are the “Global Banking Unit (“GBU”), Americas Division” and “Global Markets Unit (“GMU”), Americas Division” which performs business functions. Information Risk Governance (“IRG”) provides oversight to information and cyber security risk by maintaining and improving branch wide framework that is in-line with the Head Office and regulatory requirements and addresses Confidentiality, Integrity, and Availability for information assets. IRG establishes appropriate policies, procedures, measurement, and monitoring processes to proactively assess and evaluate cyber security and information security risks inherent in the Branch Operations. IRG is directly involved in all information and cyber security related projects, matters, and issues.
Your Role Overview:
To assist the Head of the Department with the day-to-day management and operation of the department. To assume the role of Information Security Officer and take the lead on overseeing the timely completion of the department's critical risk management projects. To provide direct assistance to the Head of the Department with regards to accomplishing the department's goals and objectives. To manage, guide and mentor other staff members with the preparation and completion of their assigned tasks. To contribute significantly to the overall success of the department in all key risk management and cyber security areas.
Directly oversee completion of all critical projects, assist the HOD with implementing desired operational strategies and procedures. Recommend ways to improve efficiency, effectiveness, and productivity. Focus on proactive day-to-day operations. As ISO, assist with overseeing all information and cyber security matters.
Your Duties and Responsibilities:
Maintain and improve the information risk framework with guidance from HOD, address regulatory requirements, residual information risks specific to NY Branch Operations.
Provide Information Security subject-matter-expertise to senior management.
Work with IRT and coordinate incident responses to cyber security events.
Keep abreast of industry wide information risk issues that could potentially have an impact on Branch Operations.
Establish processes for communicating data classification guidelines and its governance.
Oversee employee information security awareness training.
Assesses and evaluates critical risk management projects:
Annual Risk Assessment.
Semi-annual Vulnerability Assessments.
Special Risk Assessments done for a Particular Purpose
Trend analysis of key risk management concepts and principles
Attend the ISSRM and Branch Risk Management related meetings.
Performs key information risk governance related tasks as described below:
Provides User Access Control Governance.
Monitors, analyzes and follows-up on Information Risk events/issues.
Reviews information risk and proactively advises as necessary on: IT Projects/Issues Management process, Change Management Process, significant changes to IT procedures, IT Asset Management Report, key IT Vendor Contracts, IT Disaster Recovery Plan/Process, Record Retention Process, any related audit findings, etc.
Establish and maintain Information Risk Key Risk Indicators (KRI).
Periodically updates IT resources on Information risk related practices.
Manages all information and cyber security policy and procedures manuals.
Assist with the management of all matters related to Information Security and Information Risk Management, including directing appropriate Information/Applications Risk Assessments.
Your Qualifications:
Certification in Information Security (CISSP) required.
8+ years of Information Security related experience, IT Audit experience, preferred.
Knowledge of Information Security principles, terminologies, and technologies required.
Knowledge of Information Risk Management framework and principles required.
Ability to analyze and design information security monitoring procedures and activities preferred.
Detailed Knowledge and expertise in Technology Risk Assessments and Risk Analysis required.
Excellent written and verbal communication skills, required.
Good computer skills in Microsoft Office Excel and Word required.
Strong project management and people management skills. preferred
Why you should join SuMi Trust: SuMi Trust embraces flexible ways of working when the business and role permits. We provide employees with a hybrid working model, allowing for in-office work and work from home. Our diverse and inclusive environment along with our global presence enables us to collaborate and communicate to meet our business needs. We believe that efficient teams need truth, loyalty, and a strong sense of purpose to balance risk and their targets. We make sustainable business decisions to improve our society and the world. We believe that each person brings a unique value that drives the business though their creativity and passion.
The Employee Benefits package includes: Paid Time Off, medical, HSA, vision, dental, FSA, 401(k), profit sharing, legal plan, cancer indemnity plan, disability insurance, life insurance, employee assistance program, commuter benefits, business travel accident, paid volunteer day, paid memberships, paid seminars, and tuition assistance.
We offer many socialization opportunities for wellness, financial wellbeing, runs/walks, team building, happy hours, and activities to support the Sustainable Developmental Goals.
Check out our LinkedIn for our employee experience: ***************************************
We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status or any other characteristic protected by law. SuMi Trust provides reasonable accommodations for employees and applicants with disabilities consistent with applicable law. If you need a reasonable accommodation during the application
Auto-ApplySAP Identity Management
Security architect job in Stamford, CT
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website *****************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Required Skills:
• knowledge of SAP Identity Management 7.2 version
• knowledge of SAP IDM integration points with SAP and non-SAP products/tools
• LDAP/Active Directory, PD-Org, NWBC, Solution Manager 7.1.
• Experience in SAP security, SAP GRC is a plus.
• Basis experience is a plus
• 6+ years of SAP Identity Management Implementation and support experience.
• Experience as the SAP IDM SME in at least 2 implementations
• Experience with gap analysis and strategic roadmap/blueprint development
• Experience in configuring SAP IDM for user provisioning in a complex SAP landscape comprising of ABAP, JAVA and duel stack systems as well as non-SAP systems
• Involve in Onsite-Offshore coordination activities (handover-takeover, off business hour activity tracking, offshore reporting)
• Provide SAP IDM support to SAP implementation as well as support teams and internal customers/clients
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Risk Compliance Manager
Security architect job in New York, NY
Job Title:Information Security Risk Compliance Manager
Descrption
Seeks an Information Security Risk Compliance Manager who will have the responsibility for several functions associated with IT security - from ensuring the security of software to selecting and/or constructing and deploying broader network security systems.
Scope of Work
Objectives:
The Information Security Risk Compliance Manager oversees the organization's efforts in
Risk assessment, Risk mitigation,
Compliance management,
Security governance, incident response, vendor risk management,
Security awareness and training,
Security audits and assessments, reporting and communication, continual improvement, and cross-functional collaboration.
Their role is to ensure that the organization's systems, networks, and processes are secure, compliant with regulations and standards, and aligned with organizational goals and objectives.
Requirements
Responsibilities:
Conduct risk assessments to identify potential threats and vulnerabilities to the organization.
Develop and implement risk management strategies and policies to mitigate identified risks.
Monitor and evaluate risk exposure across various departments and business units.
Coordinate with stakeholders to ensure compliance with regulatory requirements and industry standards.
Communicate risk management strategies and findings to senior management and relevant stakeholders.
Lead the development and maintenance of the organization's risk register and risk management framework.
Provide guidance and support to departments and teams in implementing risk mitigation measures.
Conduct training and awareness programs on risk management principles and practices.
Continuously monitor and review the effectiveness of risk management strategies and adjust as necessary.
Stay updated on emerging risks and industry trends to proactively address potential threats to the organization.
Maintain and enhance the company-wide security awareness program.
Take ownership of establishing and enforcing security standards both within the team and across the organization. Work proactively and collaboratively to achieve change management and buy-in.
Deliverables:
Compliance Management: Ensure compliance with relevant regulations, standards, and frameworks such as GDPR, HIPAA, ISO 27001, NIST, etc., by establishing and maintaining appropriate controls and processes.
Risk Mitigation: Develop and oversee risk mitigation strategies and controls to address identified security risks, including implementing technical controls, security best practices, and security awareness training programs.
Incident Response: Develop and implement incident response plans and procedures to effectively respond to and manage security incidents, including data breaches, cyberattacks, and security breaches.
Vendor Risk Management: Assess and manage risks associated with third-party vendors and service providers, including evaluating their security posture, conducting due diligence assessments, and ensuring contractual compliance.
Cross-functional collaboration: Collaborate with IT teams, legal, HR, compliance, and other departments to ensure a holistic approach to information security risk management and compliance.
Continual Improvement: Monitor industry trends, emerging threats, and regulatory changes to ensure that the organization's information security risk and compliance programs remain up-todate and effective.
Preferred Skills:
Excellent verbal and written communication skills.
Ability to work both independently and as part of a team.
Knowledge of Networking (Firewall, Networking Protocols);
Working knowledge Frameworks
Working knowledge of Information Security Domains
Working knowledge of Security protocols
Working knowledge of Cloud
Manager, Information Security (Monitoring and Investigation)
Security architect job in New York, NY
Toronto, Ontario, Canada **Hours:** 37.5 **Line of Business:** Technology Solutions **Pay Details:** 91,200 - 136,800 CAD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
**Job Description:**
TD Bank is seeking a strategic and technically skilled Manager to join our Information Security team, focused on strengthening our fraud detection, authentication, and CIAM (Customer Identity and Access Management) capabilities. This role will lead the expansion of our monitoring and alerting footprint across enterprise platforms, ensuring control effectiveness, regulatory alignment, and rapid incident response in a complex financial environment.
Key Responsibilities
- Lead the design and deployment of monitoring and alerting strategies using Splunk, Datadog, Dynatrace, and Databricks across TD's digital ecosystem
- Define alert thresholds and tuning logic to minimize false positives while maintaining high sensitivity to fraud and access anomalies
- Oversee triage workflows for triggered alerts, coordinating with global teams to ensure timely investigation and resolution
- Develop governance frameworks for alert lifecycle management, including setup, ownership, escalation, and audit readiness
- Monitor control effectiveness across CIAM, authentication, and fraud domains, driving continuous improvement
- Collaborate with fraud and cybersecurity teams to support incident investigations and mitigation strategies
- Analyze alert trends and performance metrics to inform strategic improvements and risk prioritization
- Champion automation and workflow optimization for alert handling, reporting, and compliance documentation
- Ensure alignment with TD's enterprise risk management and regulatory obligations (e.g., OSFI, OCC)
- Provide mentorship and leadership within the security monitoring team, fostering a culture of accountability and innovation
Required Qualifications & Expertise
- 5+ years of experience in information security, CIAM/fraud detection, or observability engineering within financial services
- Hands-on expertise with Splunk, Datadog, Dynatrace, and Databricks for alert creation, analytics, and dashboarding
- Strong understanding of CIAM, authentication protocols, and fraud risk indicators in regulated environments
- Experience designing governance frameworks and control monitoring programs aligned with financial compliance standards
- Proven ability to lead cross-functional teams and drive incident response processes across geographies
- Excellent communication and documentation skills, with a strategic mindset and attention to regulatory detail
**Who We Are:**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical, and mental well-being goals. Total Rewards at TD includes a base salary, variable compensation, and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off, banking benefits and discounts, career development, and reward and recognition programs. Learn more (**********************************************************************
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Please be advised that this job opportunity is subject to provincial regulation for employment purposes. It is imperative to acknowledge that each province or territory within the jurisdiction of Canada may have its own set of regulations, requirements.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
Your accessibility is important to us. Please let us know if you'd like accommodations (including accessible meeting rooms, captioning for virtual interviews, etc.) to help us remove barriers so that you can participate throughout the interview process.
We look forward to hearing from you!
**Language Requirement (Quebec only):**
Sans Objet
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Security Engineer, Systems Integrity
Security architect job in New York, NY
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're seeking a Systems Integrity Security Engineer to design and implement security architectures for bare-metal infrastructure. You'll work with teams across Anthropic to build firmware, bootloaders, operating systems, and attestation systems to ensure the integrity of our infrastructure from the ground up.
This role requires expertise in low-level systems security and the ability to architect solutions that balance security requirements with the performance demands of training AI models.
What you'll do:
Design and implement secure boot chains from firmware through OS initialization for diverse hardware platforms (CPUs, BMCs, peripherals, embedded microcontrollers)
Architect attestation systems that provide cryptographic proof of system state from hardware root of trust through application layer
Define trust boundaries and security policies for multi-party authorization systems
Develop measured boot implementations and runtime integrity monitoring
Create reference architectures and security requirements for bare-metal deployments
Integrate security controls with infrastructure teams without impacting training performance
Prototype and validate security mechanisms before production deployment
Conduct firmware vulnerability assessments and penetration testing
Build firmware analysis pipelines for continuous security monitoring
Document security architectures and maintain threat models
Collaborate with hardware vendors to ensure security capabilities meet our requirements
Who you are:
8+ years of experience in systems security, with at least 5 years focused on firmware and hardware security (firmware, bootloaders, and OS-level security)
Hands-on experience with secure boot, measured boot, and attestation technologies (TPM, Intel TXT, AMD SEV, ARM TrustZone)
Strong understanding of cryptographic protocols and hardware security modules
Experience with UEFI/BIOS security, bootloader hardening, and chain of trust implementation
Proficiency in low-level programming (C, Rust, Assembly) and systems programming
Knowledge of firmware vulnerability assessment and threat modeling
Track record of designing security architectures for complex, distributed systems
Experience with supply chain security and firmware vulnerability analysis
Ability to work effectively across hardware and software boundaries
Knowledge of NIST firmware security guidelines and hardware security frameworks
Strong candidates may also have:
Experience with confidential computing technologies and hardware-based TEEs
Knowledge of SLSA framework and software supply chain security standards
Experience securing large-scale HPC or cloud infrastructure
Contributions to open-source security projects (coreboot, CHIPSEC, etc.)
Background in formal verification or security proof techniques
Experience with silicon root of trust implementations
Experience working with building foundational technical designs, operational leadership, and vendor collaboration
Previous work with AI/ML infrastructure security
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyDirector of Information Security
Security architect job in Hempstead, NY
Qualifications Bachelor's degree required. Minimum five years of full-time professional experience in information technology, including evidence of successful and progressively responsible roles in information security or related area (including growth in levels of responsibility, complexity of work, numbers, and sophistication of employees) related to the essential responsibilities listed. Demonstrated fluency in written and spoken English with the sophistication necessary to effectively communicate technical details to both technical and non-technical individuals. Demonstrated willingness and ability to carry out the essential responsibilities listed with humility, grace, and optimism. Demonstrated understanding of, sensitivity to, and respect for the academic, cultural, and social diversity in the Hofstra University community.
Preferred Qualifications
Advanced degree in computer science, computer engineering, information security, or related field strongly preferred. One or more relevant professional certifications (e.g., CISSP , CISM /A, etc.) strongly preferred. Experience with state and federal information security regulatory requirements ( GLBA , FERPA , HIPAA , etc.) and other compliance requirements ( PCI , etc.). Knowledge of and experience applying industry-standard IT security frameworks ( NIST , IHECF , etc.). Significant experience in computing and information security, network security issues, and security incident response and recovery in a higher education environment. Significant experience in communicating information security principles and concepts to non-technical stakeholders, and success in improving cybersecurity awareness in a higher education environment. Working knowledge of the information security policy and regulatory environment of information security, particularly in higher education. Demonstrated experience and success in advising and collaborating with key stakeholders relevant to the essential responsibilities listed, including senior leadership, Internal Audit, outside auditors, and consultants. Professional experience in a leadership role in a higher education institution.
Lead SAP Security & GRC admin- Full time perm job
Security architect job in Stamford, CT
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
Job Description
SAP Security & GRC
Additional Information
All your information will be kept confidential according to EEO guidelines.