Channel Manager - Network Security
Security Architect Job 17 miles from Cherry Hill
Are you passionate about growing channel partnerships? Our Channel Manager for Network & Security's primary focus is driving positive results for Arrow in three critical areas: growing established partnerships, developing new business, and engaging partners.
Learn more about our Enterprise Computing Solution (ECS) business at Arrow Electronics (Enterprise Computing Solutions | Arrow ECS NA.)
What you'll be doing
Growing Established Partnerships
Proactively calls and engages with established partners to grow sales for assigned accounts.
Rebuilds underpenetrated and neglected partner relationships.
Sell new suppliers' solutions to partners.
Developing New Business
leverages an internal team of resources to hunt for new software and service opportunities.
Proactively calls and engages potential new partners to grow sales for assigned accounts.
Onboards new partners
Focuses on growing and developing new business by starting at the end customer and working the opportunities back through our channel partners.
Proactively calls and engages partners to adopt/buy new supplier offerings.
Partner Engagement
Conduct outside sales meetings with partners, suppliers, and end customers regularly.
Position Arrow's service offerings to sell “with” the Partner community to the end customers. Sometimes, they even sell Advisory Services to the end customer directly.
What we are looking for
4-year degree
Minimum of 6+ years of customer-facing direct sales roles.
Experience selling in the Channel.
Experience selling Network & Security technologies.
Ability to solve complex problems; takes a new perspective using existing solutions
Process-oriented and analytical.
Strong SF.com proficiency and forecasting accuracy.
Self-starter, gritty & coachable
Team oriented leader
Strong work ethic and proven track record in a KPI based Sales Model
Ability to travel at least 35% of the time.
What's In It For You
At Arrow, we recognize that financial rewards and great benefits are important aspects of an ideal job. That's why we offer competitive financial compensation, including various compensation plans, and a solid benefits package.
Medical, Dental, Vision Insurance
401k, With Matching Contributions
Tuition Reimbursement
Paid Time Off (including sick, holiday, vacation, etc.)
Health Savings Account (HSA)/Health Reimbursement Account (HRA) Options
Growth Opportunities
Short-Term/Long-Term Disability Insurance
And more!
Annual Hiring Range/Hourly Rate: $126,300.00 - $140,252.82
Actual compensation offer to candidate may vary from posted hiring range based upon geographic location, work experience, education, and/or skill level. The pay ratio between base pay and target incentive (if applicable) will be finalized at offer.
Location: US-GA-Georgia (Remote Employees)
Remote work employees may be required to be present at the closest designated Arrow office for work-related purposes, at the Company's request and sole discretion.
Time Type: Full time
Job Category: Sales EEO Statement:
Arrow is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, gender, age, sexual orientation, gender identity, national origin, veteran or disability status. (Arrow EEO/AAP policy)
We anticipate this requisition will be open for a minimum of five days, though it may be open for a longer period of time. We encourage your prompt application.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Security Engineer
Security Architect Job 5 miles from Cherry Hill
Who We Are: USCS is driven to advance, innovate and serve companies seeking the best service, facilities, and logistics in the cold chain. We are employee focused, an equal employment opportunity employer and would love to have you join our team.
The Job Details:
We are seeking a skilled Security Engineer to join our team and help protect our organization's systems, networks, and data from security threats. The ideal candidate will be responsible for implementing security systems, identifying vulnerabilities, and responding to incidents to ensure the confidentiality, integrity, and availability of our IT infrastructure.
Key Responsibilities:
Security Engineering & Architecture
Design, implement, and maintain new and existing security solutions to protect company systems and networks.
Collaborate with teams across the company to integrate security into system architectures.
Manage and configure current security stack including SIEM, PAM, EDR and Identity Management systems
Conduct security assessments of new technologies and recommend secure configurations.
Security Operations & Incident Response
Monitor security events and respond to incidents in a timely manner.
Investigate and report on security breaches and recommend mitigation strategies.
Conduct root cause analysis and forensic investigations to prevent future incidents.
Develop and maintain incident response plans and playbooks.
Governance, Risk, and Compliance (GRC)
Develop and enforce security policies, procedures, and best practices.
Ensure compliance with industry regulations and standards (e.g., ISO 27001, NIST, GDPR, SOC 2).
Conduct security audits and risk assessments to identify vulnerabilities.
Work with legal and compliance teams to address regulatory security requirements.
Threat Intelligence & Security Awareness
Stay up to date with emerging cybersecurity threats and technologies.
Provide training and awareness programs for employees on cybersecurity best practices.
Conduct phishing simulations and social engineering tests to measure awareness.
Analyze threat intelligence reports to proactively strengthen security defenses.
Identity & Access Management (IAM)
Manage user access controls and authentication mechanisms (e.g., MFA, SSO).
Ensure proper role-based access control (RBAC) implementation across systems.
Conduct regular access reviews and audits to prevent privilege misuse.
Monitor and respond to unauthorized access attempts and anomalies.
Cloud & Application Security
Secure cloud environments and ensure adherence to cloud security best practices.
Work with developers to integrate security into the software development lifecycle (SDLC).
Perform application security testing, including static and dynamic code analysis.
Review and implement secure configurations for cloud services and containerized applications.
The Job Specifics:
Location, Department and Work Hours: Camden, Information Security
Reports To: Sr. Manager, Security and Governance
Travel Amount: May vary
Job Type, EEO, and Job Code: Full-Time, Exempt
Salaried, Bi-Weekly Paid
Salary Range: $100,000.00 - $120,000.00 per year
What We Are Looking For:
Education:
Bachelor's degree in computer science, Information Security, or equivalent work experience.
Professional Security certification such as CISSP, CCSP, OSCP, etc.
Experience:
5+ years of experience in information security, with a focus on security tooling and design.
Hands-on experience with cloud platforms, e.g. Azure or Oracle Cloud)
Proficiency in security technologies such as SIEM, EDR, Encryption, Privileged Access Management
Experience implementing Phishing Campaigns and Cyber Training
Knowledge of Zero Trust security models and advanced security solutions (e.g. segmentation, Identity Federation, Conditional Access, etc.)
Experience with administration processes in both Windows and Linux space
Ability to communicate and present security concepts to a wide range of audiences
Familiarity with scripting and automation processes (PowerShell, Python, Bash).
Excellent analytical and problem-solving skills.
Strong communication and teamwork abilities.
Other Abilities You Will Need to Have: The physical demands described below are representative of those required of an individual performing the essential duties of this position. Reasonable accommodation may be made to enable individuals with disabilities to perform their essential duties.
Sit and/or stand for extended periods of time
May require physical effort associated with using the computer to access information, or occasional standing, walking, lifting needed to carry out everyday activities.
Understand and follow verbal instruction, written instruction and company policies.
A starter that can work independently and coordinate with others
Always follow safety procedures.
Ability to manage stress and productivity guidelines
The Standard Details:
Always maintain a professional manner in appearance and communications.
Participate in staff and/or customer meetings if required.
Initiate, recommend, or provide solutions through appropriate channels.
Verify the implementation of solutions.
Follow posted security procedures at all times while in the building.
Participate in Safety and Educational Training.
What's In It for You:
A great company with great people. Full-time employees not under contract are offered: 401K and Educational Assistance after 1 year; If elected, Blue Cross Blue Shield after 30 days of service; Company Life Insurance; and a bunch of other great perks.
Things We Need to Mention:
The above may not include all tasks necessary to complete the job.
Job functions may vary based on area of operation. The job description is a listing of the most common tasks the associate will be required to perform in that job area.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties.
Other Benefits Include:
Medical, Dental, Vision, Prescription, Legal Insurance, Pet Discount, Critical Illness, Accident Insurance, Hospital Indemnity, Long Term Care + Permanent Life Insurance, Identity Theft Protection, Short Term Disability Insurance, Long Term Disability Insurance, Supplemental Disability Insurance, Basic Life Insurance, Accidental Death and Dismemberment Insurance, Supplemental Life Insurance, Supplemental Spouse Life Insurance, Child Life Insurance, Loan Solution, Health Flexible Spending Account, Dependent Flexible Spending Account, Telemedicine, Virtual Primary Care, Prescription Savings Plan, Prescription Specialty Copay Assistance Program, Weight Management Program, Chronic Condition Management, Care Navigator Program, 24/7 Nurse Line, Expert Medical Opinion, Precious Additions Maternity Program, Health Advocacy, Employee Assistance Program, Digital Cognitive Behavioral Therapy, Digital Physical Therapy, Behavioral and Mental Health Platforms, Auto and home discount program, Secure Travel Protection, Discount Programs, 401(k) plan, Education Assistance, Paid Time Off, Referral program & Commuter Benefit (NJ ONLY).
Security Engineer
Security Architect Job 8 miles from Cherry Hill
candidate - must be able to work EST hours
Some feedback received - resumes rejected had experience in Security but not in software engineering and experience executing projects using agile methodologies.
This is with XPKI - Xfinity public key infrastructure Comcast Cybersecurity Group - fall under CSSE (cybersecurity and software engineering) group builds software to support security - highly scalable large applications
Team responsible for building and operating software
75% of the time technical, experience with cybersecurity, PKI, 25% looking for a Scrum master - Agile; familiar with Jira, Confluence
running the Agile ceremonies, Scrum, ensuring delivery according to timelines
product is mature, they are onboarding additional partners to the platform so must have Cybersecurity PKI background; meet with app teams and help to onboard onto the platform - needs an SME
minimum of 3 years hands on experience in Cybersecurity, PKI, infrastructure domain
Must have PKI Cybersecurity Standards experience
Must also have Software Development skills - will act as a SME to onboard the new partners to the platform
SAFE experience
Any Cybersecurity cert also a plus
Job Responsibilities:
• Provide L1/L2 technical support for PKI services, including certificate management and security protocols.
• Manage partner onboarding and user administration on Comcast PKI.
• Troubleshoot issues related to digital certificates, SSL/TLS, code signing, and client authentication.
• Support certificate lifecycle management, including issuance, renewal, and revocation.
• Monitor and work with DevOps to maintain PKI environments, ensuring high availability and security compliance.
• Respond to technical incidents, service requests, and provide root cause analysis.
• Document troubleshooting processes and technical configurations
• Lead PKI-related projects using Agile frameworks (Scrum, Kanban).
• Plan, execute, and monitor project tasks, deliverables, and deadlines.
• Collaborate with cross-functional teams, vendors, and stakeholders.
• Facilitate Agile ceremonies such as sprint planning, daily standups, and retrospectives.
• Ensure project documentation, risk assessments, and reports are up-to-date.
• Work with project team to create and maintain comprehensive project documentation
Skills:
• Proficiency in Agile tools (e.g., Jira, Confluence) and frameworks (e.g., Scrum, SAFe).
• Have great communication skills which include verbal, email and power point presentations
• Knowledge of PKI concepts, including certificate authorities, cryptographic protocols, and HSM-based solutions.
Required Experience:
• 3+ years of experience in cybersecurity, PKI, or IT infrastructure.
• 1+ years of experience in Agile project management (Scrum Master or Agile certifications a plus).
• Strong knowledge of PKI concepts: certificate authorities, SSL/TLS, OCSP, CRLs, and key management.
• Familiarity with PKI tools such as Microsoft CA, OpenSSL, KeyFactor, or DigiCert.
• Experience with certificate lifecycle management platforms.
• Ability to troubleshoot and resolve technical issues related to certificates and system integrations.
• Basic knowledge of network protocols (HTTP, HTTPS, TCP/IP).
• Experience creating user stories, sprint planning, grooming and managing product backlog.
• Proven track record of delivering IT security projects.
• Strong understanding of project management tools like Jira, Trello, or Azure DevOps.
• Experience in vendor management and cross-team collaboration.
Registered Architect - Northern New Jersey
Security Architect Job 24 miles from Cherry Hill
A multidisciplinary architectural, engineering, and environmental consulting firm is seeking a Project Architect based in Northern New Jersey. This role primarily involves architectural CAD production and document coordination.
Join our client's diverse team of architects, engineers, and environmental scientists. Our client is looking for a Project Architect / Project Designer with 10-15+ years of experience in technical design development. You will work alongside your design team to solve problems, coordinate design details, and support the preparation of architectural design drawings and specifications from schematic design to construction documents. The work environment includes a first-class office with the latest CAD, Revit, and BIM tools, as well as fieldwork at client project locations.
Job Responsibilities:
Assist project teams and work on various projects from design through construction administration.
Generate and manage the development of architectural design and project drawings.
Interface and coordinate with architecture and engineering disciplines to develop and execute architectural design concepts.
Function as a designer to ensure projects are completed on schedule and within budget.
Engage in client interaction and teamwork with other disciplines.
Education and Qualifications:
Bachelor's Degree in Architecture from an accredited institution.
Licensed or on the path to licensure with 10-15 years of architectural design experience.
Ability to independently define and detail architectural concepts and perform limited code review and program analysis.
Strong computer skills, including Microsoft Word, Excel, AutoCAD, Revit, and BIM.
Excellent communication skills, both oral and written.
Self-motivated and eager to learn.
The salary range for this role is $110,000 - $140,000 annually.
Azure Architect
Security Architect Job 20 miles from Cherry Hill
As an Azure Cloud Architect, you will play a pivotal role in designing and implementing Azure foundational blocks like APIM, Data Layer with Snowflake and Databricks and DevOps pipelines as well as creating scalable, secure, and efficient cloud solutions on the Microsoft Azure platform. You will collaborate closely with Enterprise Architecture practice, development teams and project managers to deliver transformative cloud architectures that meet business objectives.
Duties and responsibilities
Lead the design and deployment of Azure solutions leveraging best practices and architectural principles.
Conduct assessments of existing applications and infrastructure to recommend migration strategies to Azure.
Collaborate with cross-functional teams to gather technical requirements, define architecture specifications, and create comprehensive design documents.
Provide guidance on Azure services, deployment models, and resource optimization to ensure solutions are cost-effective and scalable.
Develop and maintain architecture diagrams, technical documentation, and solution roadmaps.
Assist in troubleshooting and resolving technical issues during implementation and post-deployment phases.
Stay up to date with Azure advancements, emerging technologies, and industry trends to inform architectural decisions.
Implementation knowledge of Dev Ops, APIM, Snowflake and Databricks on Azure would be preferred.
Azure Hands on knowledge is preferred.
Requirements:
Bachelor's degree in computer science, Information Technology, or related field, or equivalent experience.
Microsoft Certified: Azure Solutions Architect Expert certification is required.
Proven experience in designing and implementing complex cloud solutions on Azure.
In-depth understanding of Azure services, networking, security, and identity management.
Strong knowledge of cloud architecture patterns, best practices, and cost optimization strategies.
Proficiency in scripting and automation using PowerShell, Azure CLI, or similar tools.
Excellent critical thinking skills and the ability to troubleshoot complex technical issues.
Effective communication skills to interact with technical and non-technical stakeholders.
Beneficial to have insurance industry experience.
Deloitte Microsoft Technology Services Practice (DMTSP) - Security Pre-Sales Architect
Security Architect Job 8 miles from Cherry Hill
Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest group of Cyber Risk individuals worldwide.
Microsoft is an audit client for Deloitte - as a result, Deloitte does not and cannot have any form of alliance or partnership with Microsoft. Deloitte, however, can advise on and implement Microsoft products, and interact with Microsoft in certain ways in connection with these activities. When doing so, Deloitte and Microsoft must be sensitive to and mindful of the need for independence.
Recruiting for this role ends on 4.1.25
Work you'll do
As a DMTSP - Security Pre-Sales Architect, you will be at the front lines with our clients who have chosen the Microsoft technology platform and supporting them with their Cloud Cyber Risk needs specifically helping them navigate the journey on securing their Microsoft platform infrastructure such as Azure and Office 365 and the design and deployment of Microsoft Security solutions. This is a Deloitte services pre-sales role and not a project implementation role. This will include:
+ Lead or support proposals and/or also function as proposal lead architect with services potentially including the following Microsoft technologies: Microsoft Defender for Cloud, Azure Policies, Purview, Intune, Sentinel, Entra ID, Defender for Office, Defender for Endpoints and Servers, Defender for Vulnerabilities, Defender for Cloud Apps, Defender XDR and SCCM
+ Assist in business development activities such as defining scope of services, building resource estimates and related pricing, packaging proposals and supporting the delivery of the proposal to the client for security services at clients who may have selected Microsoft infrastructures.
+ Lead the delivery of cloud security analysis, recommendations and configurations of prospective clients' Microsoft Entra ID, Office 365 (O365), Exchange Online, Teams, OneDrive for Business, M365 Copilot and SharePoint Online environments based on Deloitte's Microsoft 365 Cyber Risk Framework. This can include leveraging security solutions services which may include Microsoft's technology products such as Entra, Purview, Defender, Intune, and Sentinel.
+ Support or lead the delivery of Cyber Security workshops with clients(remote/in-person) including building demo labs, PowerPoint decks and Deloitte best practice perspectives
+ Function as a Cyber security architect (experienced in applicable Microsoft technologies) supporting Deloitte project teams for practice development and eminence
+ Function as deep subject matter expert on Microsoft security and securing Microsoft solutions staying abreast of Gartner research and Microsoft product roadmaps and advising Deloitte teams and clients on new developments.
+ Function as the primary client day-to-day interface building rapport and trust with the client.
+ Perform technical health checks of client's Microsoft platforms/environments as part of client development activities prior to broader deployments.
+ When clients have expressed a desire to discuss Microsoft technologies, assist clients in a pre-sales role, with transitions to the Microsoft 365 security services such as solution setup and service configuration, focused on risk mitigation. Additional technologies include MFA, Conditional Access, Purview Compliance Manager, M365 Defender, Defender for O365, Defender for Cloud Apps (MDCA), Purview Information Protection (MPIP), Purview Data Loss Prevention (DLP).
+ Implement industry leading practices around M365 E5 cyber risks and cloud security for clients.
+ As part of the Deloitte Microsoft Technology Services security practice development and eminence activities; Design and develop cloud-specific security policies, standards and procedures e.g., O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management.
+ Provide internal technical training to Advisory personnel as needed.
+ Act as a subject matter expert on cloud cyber risk for Microsoft Purview, Microsoft Intune, Entra ID, Azure security, Microsoft Defender, and Microsoft Sentinel capabilities.
+ Lead the development of Point-of-Views (PoVs) on providing leading practices to our clients on Cyber, including the Microsoft security challenges they face.
+ Support talent process in the architect role such as for recruiting and coaching.
+ Function as an expert in CNAPP, CWPP and CSPM technologies and security risk frameworks relevant to cloud as well as the Microsoft Cloud Security Benchmark
The successful candidate will possess:
+ Strong critical thinking, analysis, and problem-solving skills
+ Strong written and oral communication skills
+ Experience working independently as well as collaboratively across large teams
The team
Deloitte Advisory's Cloud Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice.
Qualifications
Required:
+ 5+ years of experience in technical consulting, client problem solving, architecting and designing solutions in a consulting role with project leadership and/or architect experience with Microsoft technologies
+ 5+ years of hands-on technical experience with securing Microsoft 365 enterprise-level messaging and collaboration and/or Azure Infrastructure in implementation and operations.
+ 5+ years of hands-on technical experience with enterprise-level systems management systems such as SCCM, End point security and Intune and endpoint engineering (MEM) and mobile device management (MAM & MDM)) implementation or operations.
+ 5+ years of hands-on technical and project / professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (e.g. Defender for Endpoints and Defender for Servers), Microsoft Sentinel, Microsoft's email security platform (Defender for Office), Microsoft Purview, Azure security & Entra ID
+ Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve
+ Limited sponsorship may be available
Preferred:
+ BA/BS Degree preferred. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.
+ Microsoft Certifications such as: (SC-900, SC-100, SC-200, SC-300, SC-400, AZ 500),
+ Cyber Certifications such as: CCSP, CCSK, CISSP, CCNP, and CCNA.
Ideally the following technical experience is a plus in any of the technologies below:
+ Microsoft Security Copilot
+ Defender for Vulnerabilities
+ Defender for Cloud Apps
+ Defender XDR
+ Experience with Azure data, analytics, or AI/ML services (Azure SQL, HDInsight, Databricks, Data Factory, Data Lake Storage, Azure Analysis Services, Synapse Analytics, Azure Machine Learning, etc.)
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500.00 to $210,600.00.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation:Hyperlink: ************************************************************************************************************
#DeloitteNDO, #SalesOpsGreenDot
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Enterprise Cloud Security Architect
Security Architect Job 10 miles from Cherry Hill
As the Enterprise Cloud Security Architect you will promote and lead the adoption of “secure by design” practices. You will develop, maintain, and evolve enterprise cloud security architecture, and coordinate and manage the successful delivery of cybersecurity architecture services for IT projects to ensure enterprise cloud technology solutions comply with security policies, standards, and requirements. This role will work with project teams to define the cybersecurity scope, work effort, and deliverables and execute multiple projects in parallel. The architect is expected to effectively exercise leadership and provide guidance to enable the team's success. This role is also responsible for the continued improvement and development of the cloud cybersecurity architecture service. The architect must be able to draw from a deep background in cloud technology and security principles and solutions, as well as their understanding of the business, to clearly articulate and discuss identified business risks and various options for mitigating those risks.
A Day In The Life
Develop, deploy and maintain Burlington's cloud cybersecurity architecture standards, including cybersecurity reference architectures and design patterns.
Identify security control requirements for cloud technology initiatives and deliver effective and practical solutions to meet those requirements in alignment with the overall objectives of the project and the business.
Lead the cybersecurity architecture aspects of enterprise cloud initiatives, in particularly in the increasing adoption of various cloud services (IaaS, PaaS, and SaaS) from key cloud service providers.
Develop and improve cloud cybersecurity architecture service in conjunction and alignment with other cybersecurity architecture services.
Assess the business impact of cloud cybersecurity risks in the enterprise and identify options and recommendations for mitigating those risks.
Contribute to the development and maintenance of information security strategy and architecture, promote and adopt “secure by design” practices.
Evaluate and develop secure cloud solutions based on approved security architectures.
To Be Successful You Should Possess
Bachelor degree in Computer Science or a similar field is preferred.
Minimum of ten-year experience in a related field, at least five years in cloud cybersecurity architecture.
In-depth knowledge of cybersecurity frameworks including but not limited to NIST, ISO/IEC 27001 and PCI DSS.
Expert knowledge of TOGAF and SABSA frameworks and their respective application.
Thorough understanding of enterprise risk management principles and processes.
Experience in the information security field and expertise in platform, application, storage, data, network, virtualization, cloud and mobile security, accentuated with in-depth knowledge of security capabilities of one or more public cloud platforms (Azure, GCP, AWS).
A strong understanding of enterprise technologies, operations, and architectural principles and models. Knowledge of virtualized data center architectures and operations, SOA-type deployments, web services and multi-tier web applications, directory services, cloud services, and WAN/MAN/LAN wired and wireless protocols and technologies supporting a diverse set of business use cases.
A solid record of successfully designing and deploying numerous enterprise technical security services such as SIEM, DLP, PKI, IDS/IPS, and enterprise authentication/authorization frameworks and models.
Experience in cloud migration and operational optimization.
Come join our team. You're going to like it here!
You will enjoy a competitive wage, flexible hours, and an associate discount. Burlington's benefits package includes medical, dental and vision coverage including life and disability insurance. Full time associates are also eligible for paid time off, paid holidays and a 401(k) plan.
We are a rapidly growing brand and provide a variety of training and development opportunities so our associates can grow with us. Our teams work hard and have fun together! Burlington associates make a difference in the lives of customers, colleagues, and the communities where we live and work every day. Burlington Stores, Inc. is an equal opportunity employer committed to workplace diversity.
#LI-TG1
Cloud Security Architect - FedRAMP
Security Architect Job 24 miles from Cherry Hill
**About the team:** The Information Security organization advances the overall state of security at Rubrik through purposeful initiatives and coordination of large security projects. Information Security builds technologies, tools, and processes to better enable teams at Rubrik to develop secure software and protect data and systems with appropriate security controls. Information Security also develops systems to monitor and respond to attacks against our systems, provides awareness education to teams on security best practices for data protection, and ensures data sharing relationships with third parties in order to securely protect Rubrik information.
**What you'll do:**
+ Partner with engineering teams across Rubrik to create secure cloud infrastructure design and deployment architectures utilizing threat models and risk analysis documentation specific to a FedRAMP and IL4+ environment
+ Work with development teams, operations, governance, and other stakeholders to draft security standards and controls and implement monitoring, alerting and governance to adhere to those specifications
+ Support incident responders in analyzing applicable threats, vulnerabilities, controls and residual risks inside and out of the FedRAMP boundary
+ Analyze and harden existing applications, infrastructure, automation, and deployment processes partnering with multiple teams to design & implement solutions within the space
+ Execute Security impact Analysis reviews for all FedRAMP changes coming in to the change management process
**Experience you'll need:**
+ Bachelor's degree required; BS or MS in Computer Science, Information Technology, or a related field
+ 15 years of experience including cloud technologies, technical architecture and application development
+ 8+ years experience in cloud security, with experience across AWS, GCP and/or Azure infrastructure design
+ 2+ years experience in VMWare and/or Network security modeling
+ Broad knowledge of private and public cloud attack vectors and exploits
+ Subject matter expertise in CI/CD, Cloud APIs and Identity management
+ Deep understanding of compute, network and storage technologies in AWS, GCP and/or Azure
+ Programming experience in Python, Go or Java
+ Deep security policy subject matter expertise in at least one major public cloud provider (AWS, GCP, Azure)
+ Experience with deploying and securing SaaS applications and cloud environments at scale
+ Working experience with CI/CD pipeline, containerization (Kubernetes, Docker, etc) and MicroServices
+ Knowledge of of IaC (Infrastructure as Code) concepts and implementing standards within them
+ Understanding of cloud security maturity model frameworks and how to apply them
+ Strong written and verbal communication skills
**Additional Requirements:**
Due to the criteria and security levels for Rubrik's FedRAMP program, this position will require the following:
+ U.S. citizenship at the time of hire
+ Residence within the contiguous United States (i.e., the lower 48 states and the District of Columbia); and
+ Willingness to undergo a Single Source Background Investigation if required.
\#LI-Remote
**Security and Privacy Responsibilities** :
This position carries special Security and Privacy Responsibilities for protecting the U.S. Federal Government's interests:
+ Know, acknowledge, and follow system-specific security policies and procedures;
+ Protect data and individual privacy per requirements and regulations;
+ Perform ongoing activities in compliance with service and contractual obligations;
+ Participate in role-based training, completing assignments on a timely basis;
+ Report security issues promptly, and aid investigation when needed;
+ Support controlled changes and vulnerability remediation activities; and
+ Work collaboratively with Information Security in designing, implementing, assessing or enhancing system-specific security and privacy controls.
**Position Risk Designation** :
This position carries duties and responsibilities involving the U.S. Federal Government's interests. The selected incumbent may be subject to one or both of the additional background checks with periodic re-screening as noted below:
**Position Risk Designation: Non-Sensitive, Low Risk, Tier 1**
_Incumbents without access to U.S. Government data may be required to complete Standard Form 85 and undergo a Tier 1 Investigation (T1) for non-sensitive positions of Low Risk. (Baseline screening; formerly National Agency Check and Inquiries (NACI))._ **Position Risk Designation: Non-Sensitive, Moderate Risk, Tier 2 (Public Trust)**
_Incumbents with access to U.S. Government data may be required to complete Standard Form 85P and undergo Tier 2 (T2) Investigation for non-sensitive positions designated Moderate Risk._
**Position Risk Designation:Moderate Risk Law Enforcement (CJIS)**
_When hired for a position where access to Moderate Risk criminal justice information is required, the employee must complete a fingerprint-based national criminal history background check within 30 days after the employee's start date._
The minimum and maximum base salaries for this role are posted below; additionally, the role is eligible for bonus potential, equity and benefits. The range displayed reflects the minimum and maximum target for new hire salaries for the role based on U.S. location. Within the range, the salary offered will be determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
US (SF Bay Area, DC Metro, NYC) Pay Range
$206,600-$310,000 USD
The minimum and maximum base salaries for this role are posted below; additionally, the role is eligible for bonus potential, equity and benefits. The range displayed reflects the minimum and maximum target for new hire salaries for the role based on U.S. location. Within the range, the salary offered will be determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
US2 (all other US offices/remote) Pay Range
$186,000-$279,000 USD
**Join Us in Securing the World's Data**
Rubrik (NYSE: RBRK) is on a mission to secure the world's data. With Zero Trust Data Security, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.
Linkedin (******************************************************************** | X (formerly Twitter) (****************************** | Instagram (************************************* | Rubrik.com
**Inclusion @ Rubrik**
At Rubrik, we are dedicated to fostering a culture where people from all backgrounds are valued, feel they belong, and believe they can succeed. Our commitment to inclusion is at the heart of our mission to secure the world's data.
Our goal is to hire and promote the best talent, regardless of background. We continually review our hiring practices to ensure fairness and strive to create an environment where every employee has equal access to opportunities for growth and excellence. We believe in empowering everyone to bring their authentic selves to work and achieve their fullest potential.
**Our inclusion strategy focuses on three core areas of our business and culture:**
+ Our Company: We are committed to building a merit-based organization that offers equal access to growth and success for all employees globally. Your potential is limitless here.
+ Our Culture: We strive to create an inclusive atmosphere where individuals from all backgrounds feel a strong sense of belonging, can thrive, and do their best work. Your contributions help us innovate and break boundaries.
+ Our Communities: We are dedicated to expanding our engagement with the communities we operate in, creating opportunities for underrepresented talent and driving greater innovation for our clients. Your impact extends beyond Rubrik, contributing to safer and stronger communities.
**Equal Opportunity Employer/Veterans/Disabled**
Rubrik is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Rubrik provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Rubrik complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please contact us at ************* if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment.
EEO IS THE LAW (***********************************************************************************************
NOTIFICATION OF EMPLOYEE RIGHTS UNDER FEDERAL LABOR LAWS
Senior Security Architect - Azure Cloud
Security Architect Job 18 miles from Cherry Hill
We are seeking a highly skilled and experienced **Azure Security Architect** to lead the design, implementation, and management of secure cloud solutions on Microsoft Azure. As an Azure Security Architect, you will be responsible for ensuring the security of cloud-based applications and services, implementing security best practices, and mitigating risks across the Azure environment. You will collaborate with cross-functional teams, including IT, DevOps, and development teams, to design and enforce security policies, frameworks, and solutions.
Req.#776574920
**\#LI-DNI**
**Responsibilities**
+ Design and implement secure cloud architectures for Microsoft Azure environments
+ Define security standards, best practices, and policies to ensure cloud systems meet compliance and regulatory requirements (e.g., GDPR, HIPAA)
+ Develop and maintain Azure security policies, governance frameworks, and technical security controls
+ Perform security assessments, identify vulnerabilities, and lead remediation efforts to address risks and threats within the Azure environment
+ Architect and implement identity and access management (IAM), encryption, and security monitoring solutions
+ Collaborate with DevOps and development teams to integrate security into the CI/CD pipeline
+ Conduct risk assessments, threat modeling, and security reviews for cloud-based solutions
+ Stay current with Azure security technologies and industry best practices and recommend improvements or new tools as necessary
+ Ensure the security of Azure-based services such as Azure AD, Azure Key Vault, Azure Security Center, and Azure Sentinel
+ Provide guidance and mentorship to team members on security best practices
+ Assist in incident response activities and security investigations
**Requirements**
+ Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience)
+ 5+ years of experience in cloud security with a focus on Azure security architecture and design
+ Strong understanding of Azure services and security capabilities, including Azure AD, Azure Key Vault, Azure Policy, and Azure Security Center
+ Experience with identity and access management (IAM), multi-factor authentication (MFA), and role-based access control (RBAC) in Azure
+ Proficiency in implementing security tools, such as Azure Sentinel, Microsoft Defender for Cloud, and Azure Firewall
+ Deep knowledge of network security, including firewalls, VPNs, and encryption protocols
+ Strong understanding of compliance frameworks such as GDPR, HIPAA, PCI-DSS, and other industry-specific standards
+ Excellent communication skills with the ability to articulate complex security concepts to non-technical stakeholders
+ Relevant certifications such as Microsoft Certified: Azure Solutions Architect Expert, Microsoft Certified: Azure Security Engineer Associate, CISSP, or CISM are a plus
+ Experience with infrastructure-as-code (IaC) tools like Terraform, ARM templates, or Azure Resource Manager
+ Knowledge of scripting and automation languages such as PowerShell, Python, or Bash
+ Familiarity with DevSecOps practices and integrating security into CI/CD pipelines
+ Experience with hybrid cloud security and securing multi-cloud environments
+ Travel to client site 2 weeks out of every month in Taylor, TX
**We offer**
+ Medical, Dental and Vision Insurance (Subsidized)
+ Health Savings Account
+ Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
+ Short-Term and Long-Term Disability (Company Provided)
+ Life and AD&D Insurance (Company Provided)
+ Employee Assistance Program
+ Unlimited access to LinkedIn learning solutions
+ Matched 401(k) Retirement Savings Plan
+ Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time)
+ Paid Holidays - nine (9) total per year
+ Legal Plan and Identity Theft Protection
+ Accident Insurance
+ Employee Discounts
+ Pet Insurance
+ Employee Stock Purchase Program
+ If otherwise eligible, participation in the discretionary annual bonus program
+ If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program
**This Remote Position Cannot be Performed in New York City.**
EPAM is a leading global provider of digital platform engineering and development services. We are committed to having a positive impact on our customers, our employees, and our communities. We embrace a dynamic and inclusive culture. Here you will collaborate with multi-national teams, contribute to a myriad of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow. No matter where you are located, you will join a dedicated, creative, and diverse community that will help you discover your fullest potential.
YouTube video player (***************************************************************
This posting includes a good faith range of the salary EPAM would reasonably expect to pay the selected candidate. The range provided reflects base salary only. Individual compensation offers within the range are based on a variety of factors, including, but not limited to: geographic location, experience, credentials, education, training; the demand for the role; and overall business and labor market considerations. Most candidates are hired at a salary within the range disclosed. Salary range: $175,000 - $200,000. In addition, the details highlighted in this job posting above are a general description of all other expected benefits and compensation for the position.
Applications will be accepted on a rolling basis.
In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 27 24 (lacounty.gov)
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone.
At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
Sr. Security Architect I (II)
Security Architect Job 26 miles from Cherry Hill
*Flexible Work Arrangement: Hybrid* Cyber threats change at a rapid pace, and cybersecurity approaches must transform to provide effective protection and enable business innovation. As part of the Security Engineering and Architecture department, the Sr. Security Architect I (II) plays a key role in development of the security strategy, defining roadmaps for achieving security objectives, architect secure solutions in partnership with enterprise architecture and application architecture, and build security into systems by collaborating with development teams and other internal technology groups. This individual will solve security challenges with implementing and integrating cloud-based services into PJM's business processes, implementing zero trust architecture principals, managing and controlling big data, and leveraging machine learning processes to solve complex business problems.
Essential Functions:
Researches and supports development and advancement of a comprehensive security strategy and strategic roadmap.
Develops and maintains high quality documentation for cyber security policies, architectures, and standards.
Works across the organization to communicate security approaches and that internal and external stakeholders support the changes.
Supports cross-functional programs that advance security, such as zero-trust architecture, cloud security, data and analytics, machine learning, and security automation.
Monitors technical advancements and makes recommendations to improve network, system and application security architectures.
Supports enterprise architecture and application architecture initiatives and creates corresponding security design patterns.
Consults with project teams to design secure architecture for new projects in alignment with agreed upon security design patterns.
Supports application security assessments by developing improved tools and approaches for assessing security.
Defines data security policies and processes to protect corporate data.
Develops security solutions based on NIST Cybersecurity Framework (CSF) guidelines.
Supports architectural guidance team to evaluate project proposals for architectural fit.
Assists in prioritizing security efforts to balance security risks with operational and business risks.
Assists team and department management in developing work plans, including scope, milestones, schedule, releases, resources and deliverables.
Builds strong relationships with stakeholders by providing superior customer support as demonstrated by clearly owning, resolving and communicating issues and problems, and being responsive to needs, requirements, and deadlines.
Supports the Cyber Security Incident Response Team (CSIRT) process by participating in various responder roles.
Characteristics & Qualifications:
Required:
Bachelor's Degree in Computer Engineering, Computer Science, Information Technology or equivalent work experience
At least 5 years of experience overall IT/IS experience
At least 2 years of experience with security engineering/architecture
Two or more of the following: applications (on-prem or cloud-based), networks, operating systems, or DevOps. Cloud security experience such as implementing landing zone, encryption, identity and access management, security monitoring, infrastructure as code (IaC), cloud workload protection platform (CWPP), control plane configuration and cloud security posture management (CSPM) solutions.
Ability to produce high-quality work products with attention to detail
Ability to visualize and solve complex problems
Experience with NERC Critical Infrastructure Protection (CIP) Standards
Ability to collaborate, influence, and partner with business units
Experience using Microsoft Project
Experience with Operating Systems, networks, storage technologies, software development, databases, and security concepts
Experience using effective verbal and written communications skills
Preferred:
Experience with PJM operations, markets, and planning functions
Experience implementing zero trust architecture, data and analytics, machine learning, and security automation.
Experience with defining data security policies and processes to protect corporate data as part of Data Security Governance.
Experience working in a regulated industry (especially NERC CIP).
Experience with NIST CSF.
Experience working with varying levels of classified data.
Knowledge and experience of importance of diversity and inclusion at workplace and its effective use to improve PJM's business functions as it relates to assigned responsibilities.
Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Director - Information Security
Security Architect Job 5 miles from Cherry Hill
The Director - Information Security is a "CISO" type role. This is the role of a strategic leader responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. This role will report directly to the CIO and will be responsible for directing staff in identifying, developing, implementing, and maintaining processes across the organization to reduce information and information technology (IT) risks, respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. Leads company's IT technological strategies in support of the company's mission and core objectives, providing leadership, vision, and management of IT Teams. Ensures the effective operation of all IT systems and functions. Accountable for the management, mentoring, and career development of the IT staff members.
PRIMARY RESPONSIBILITIES
Strategic Planning and Financial Oversight
Develops and maintains a culture of security that emphasizes the enterprise-wide responsibility for ALL COMPANY employees.
Develops and maintains a comprehensive cloud security strategy aligned with the organization's overall security objectives and the larger organizational cloud strategy.
Assures the alignment of IT and business strategy with particular focus on thought leadership and innovation. Must be able to design and execute multi-year road maps in order to transform COMPANY environment and collaborate with COMPANY, SBR and copany entities for technological efficiencies.
Develops strategic annual and long-term business plans and operational budgets for responsible IT areas.
Tracks implementations to ensure financial and service targets are met according to timelines.
Leadership and Operations Management
Creates a security strategy and roadmap to drive the organization towards a more secure future.
Directs and manages IT Department activities and operations. Leads multiple teams of various levels of employees and consultants through the prioritization and implementation of project-related activities.
Provides motivational career development and assessment of team members.
Fosters and encourages a diverse, inclusive team.
Service Delivery and Stakeholder Management
Drives the incident response plan for the organization enrolling leadership to follow a well-rehearsed plan when a cyber event occurs.
Oversees and negotiates service level agreements with internal and external stakeholders.
Tracks service delivery to ensure agreed targets and standards are met.
Directs relationships with vendors and ensures that vendors meet COMPANY business objectives/objectives, SLAs, and deliverables in a timely manner and within budget guidelines.
Interacts with major suppliers, overseeing RFPs, bids, contracts, and service agreements.
Project Planning and Resource Allocation
Directs the design and implementation of security solutions that are secure, scalable, reliable, and cost-effective.
Determines the value and ROI of every IT-related project. Prioritizes the scheduling and implementation of major IT projects to ensure the efficient utilization of resources.
Identifies IT resources required to meet defined business objectives.
Develops and defends opportunities for continuous creative improvement of processes and systems. Acts as a change agent for new technologies and processes in the COMPANY environment.
Oversees the creation and maintenance of policies and procedures that protect the organization's computing infrastructure and data.
Policy Development and Implementation
Collaborates with Legal and Government Relations/Compliance teams to ensure compliance with relevant laws, regulations, and policies.
Advocates for changes in other departments' practices to ensure compliance with security policies.
Directs the planning, production, and implementation of information and for COMPANY technology-related systems policies, procedures, and regulations.
QUALIFICATIONS
Demonstrated senior-level IT management experience, adept at shaping and executing complex IT strategies.
Executive presence in gaining consensus across all parties.
Proven track record managing budgets ranging from $4 million to $10 million, showcasing financial acumen in IT operations.
Proficiency in articulating intricate technical concepts to non-technical stakeholders in a clear concise manner.
Proficient in leading multiple IT disciplines, including software development, technical support, and systems architecture, showcasing adept project management skills.
In-depth understanding of computer systems, applications, operating systems, and robust knowledge of data security protocols. Ability to ensure all systems are secured at all times.
Strong negotiation skills and a collaborative approach in dealings with third-party IT business partners.
Critical Thinking and Decision-Making (proficiency: High): Advanced decision-making and problem-solving skills, essential for navigating complex IT landscapes and quickly addressing challenges.
Sr. Security Architect I (II)
Security Architect Job 4 miles from Cherry Hill
* Flexible Work Arrangement: Hybrid* Cyber threats change at a rapid pace, and cybersecurity approaches must transform to provide effective protection and enable business innovation. As part of the Security Engineering and Architecture department, the Sr. Security Architect I (II) plays a key role in development of the security strategy, defining roadmaps for achieving security objectives, architect secure solutions in partnership with enterprise architecture and application architecture, and build security into systems by collaborating with development teams and other internal technology groups. This individual will solve security challenges with implementing and integrating cloud-based services into PJM's business processes, implementing zero trust architecture principals, managing and controlling big data, and leveraging machine learning processes to solve complex business problems.
Essential Functions:
* Researches and supports development and advancement of a comprehensive security strategy and strategic roadmap.
* Develops and maintains high quality documentation for cyber security policies, architectures, and standards.
* Works across the organization to communicate security approaches and that internal and external stakeholders support the changes.
* Supports cross-functional programs that advance security, such as zero-trust architecture, cloud security, data and analytics, machine learning, and security automation.
* Monitors technical advancements and makes recommendations to improve network, system and application security architectures.
* Supports enterprise architecture and application architecture initiatives and creates corresponding security design patterns.
* Consults with project teams to design secure architecture for new projects in alignment with agreed upon security design patterns.
* Supports application security assessments by developing improved tools and approaches for assessing security.
* Defines data security policies and processes to protect corporate data.
* Develops security solutions based on NIST Cybersecurity Framework (CSF) guidelines.
* Supports architectural guidance team to evaluate project proposals for architectural fit.
* Assists in prioritizing security efforts to balance security risks with operational and business risks.
* Assists team and department management in developing work plans, including scope, milestones, schedule, releases, resources and deliverables.
* Builds strong relationships with stakeholders by providing superior customer support as demonstrated by clearly owning, resolving and communicating issues and problems, and being responsive to needs, requirements, and deadlines.
* Supports the Cyber Security Incident Response Team (CSIRT) process by participating in various responder roles.
Characteristics & Qualifications:
Required:
* Bachelor's Degree in Computer Engineering, Computer Science, Information Technology or equivalent work experience
* At least 5 years of experience overall IT/IS experience
* At least 2 years of experience with security engineering/architecture
* Two or more of the following: applications (on-prem or cloud-based), networks, operating systems, or DevOps. Cloud security experience such as implementing landing zone, encryption, identity and access management, security monitoring, infrastructure as code (IaC), cloud workload protection platform (CWPP), control plane configuration and cloud security posture management (CSPM) solutions.
* Ability to produce high-quality work products with attention to detail
* Ability to visualize and solve complex problems
* Experience with NERC Critical Infrastructure Protection (CIP) Standards
* Ability to collaborate, influence, and partner with business units
* Experience using Microsoft Project
* Experience with Operating Systems, networks, storage technologies, software development, databases, and security concepts
* Experience using effective verbal and written communications skills
Preferred:
* Experience with PJM operations, markets, and planning functions
* Experience implementing zero trust architecture, data and analytics, machine learning, and security automation.
* Experience with defining data security policies and processes to protect corporate data as part of Data Security Governance.
* Experience working in a regulated industry (especially NERC CIP).
* Experience with NIST CSF.
* Experience working with varying levels of classified data.
* Knowledge and experience of importance of diversity and inclusion at workplace and its effective use to improve PJM's business functions as it relates to assigned responsibilities.
* Certified Information Systems Auditor (CISA)
* Certified Information Systems Security Professional (CISSP)
* Certified Information Security Manager (CISM)
Director of Information Security
Security Architect Job 8 miles from Cherry Hill
A best-in-class city that attracts best-in-class talent, Philadelphia is an incredible place to build a career. From our thriving arts scene and rich history to our culture of passion and grit, there are countless reasons to love living and working here. With a workforce of over 30,000 people, and more than 1,000 different job categories, the City of Philadelphia offers boundless opportunities to make an impact.
As an employer, the City of Philadelphia values inclusion, integrity, innovation, empowerment, and hard work above all else. We offer a vibrant work environment, comprehensive health care and benefits, and the experience you need to grow and excel. If you're interested in working with a passionate team of people who care about the future of Philadelphia, start here.
What We Offer:
• Impact - The work you do here matters to millions.
• Growth - Philadelphia is growing, why not grow with it?
• Diversity & Inclusion - Find a career in a place where everyone belongs.
• Benefits - We care about your well-being.
The Office of Innovation & Technology (OIT) is the central IT agency for the City of Philadelphia headed by the Chief Information Officer (CIO). OIT oversees all major information and communications technology initiatives for the City of Philadelphia - increasing the effectiveness of the information technology infrastructure, where the services provided are advanced, optimized, and responsive to the needs of the City of Philadelphia's businesses, residents, and visitors. OIT responsibilities include: identifying the most effective approach for implementing new information technology directions throughout city government; improving the value of the city's technology assets and the return on the city's technology investments; ensuring data security continuity; planning for continuing operations in the event of disruption of information technology or communications services; and supporting accountable, efficient and effective government across every city department, board, commission and agency.
Job Description
The Philadelphia International Airport is managed by the Department of Aviation of the City of Philadelphia. The airport handles approximately 82,000 travelers per day. The airport Information Technology department is headed by the Chief Information Officer (CIO). As the Director of Information Security, you will play a pivotal role in safeguarding the confidentiality, integrity, and availability of Philadelphia International Airport's information assets. Reporting directly to the Chief Information Security Officer (CISO), you will be tasked with leading strategic initiatives to mitigate cyber threats, ensure compliance with industry regulations & standards. Must have a sound business acumen to help identify, evaluate and report information security risks in a manner that supports the risk posture of the organization.
Essential Functions and Responsibilities:
Strategic Leadership - Collaborate with the CISO and senior leadership to develop and maintain the organization's information security strategy, policies, and procedures. Provide strategic direction and guidance to the information security team, aligning security initiatives with business objectives and risk tolerance.
Risk Management - Lead the identification, assessment, and prioritization of information security risks, threats, and vulnerabilities across the organization's IT infrastructure and systems. Implement risk mitigation strategies and controls to address identified risks effectively. Develop capabilities to manage third party Cybersecurity risks.
Security Governance & Compliance - Lead the identification, assessment, and prioritization of information security risks, threats, and vulnerabilities across the organization's IT infrastructure and systems. Develop risk mitigation strategies and controls to address identified risks effectively.
Threat Management - Execute strategies for continuous monitoring of network traffic, system logs, and user activities to identify unauthorized or suspicious behavior. Review security monitoring tools, technologies to detect and alert potential security incidents and anomalies. Maintain incident response plans and procedures to effectively respond to and mitigate security incidents. Lead the investigation of security breaches and incidents, coordinating response efforts and implementing corrective actions as necessary.
Third Party Risk Management -Assess and manage risks associated with third-party vendors and service providers, ensuring contractual obligations and security requirements are met. Develop processes for evaluating monitoring vendor security posture and performance.
Security Operations & Technology -Oversee the implementation and maintenance of security technologies and tools, ensuring they effectively identify, protect, detect, respond, and recover to security threats & vulnerabilities.
Change Management -Lead change management committee for reviewing, approving, and implementing changes and ensuring security controls, configurations are updated and maintained. Foster open communication and collaboration among stakeholders, creating forums for dialogue to facilitate decision-making and address concerns related to change initiatives.
Experience/Required skills:
Strong leadership and management skills are essential for effectively leading a team of security professionals.
Proficiency in risk management is necessary for identifying, assessing, and mitigating information security risks.
In-depth knowledge of security architecture and design is necessary for developing and implementing robust security controls.
Expertise in security operations is essential for monitoring, detecting, and responding to security threats and incidents.
A comprehensive understanding of compliance and regulatory requirements is crucial for ensuring that the organization's security practices align with relevant standards and regulations.
Excellent communication and presentation skills are needed for effectively conveying complex security concepts to non-technical stakeholders.
Strategic planning and execution skills are essential for developing and implementing a comprehensive information security strategy aligned with business objectives.
Proficiency in vendor management is necessary for evaluating and selecting security vendors and managing vendor relationships effectively.
Strong team building, and development skills are crucial for fostering a collaborative and high-performing security team.
Desired Experience and Abilities:
Proficiency in analyzing, evaluating security threats and vulnerabilities, as well as assessing the potential impact on the organization.
Extensive experience in conducting thorough risk assessments, vulnerability assessments, and penetration testing to identify and prioritize security risks.
Ability to architect and integrate security solutions into the organization's infrastructure, ensuring the confidentiality, integrity, and availability of information assets.
Commitment to staying updated on emerging security threats, trends, and technologies.
Ability to adapt to evolving security challenges and requirements, proactively adjusting security strategies and tactics to address new threats and vulnerabilities.
Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
Familiarity with cybersecurity principles, tools, and best practices.
Qualifications
Bachelor's degree in Computer Science, Information Technology, Information Systems or a related field; Master's degree preferred.
Minimum of 10 years of progressive experience in information security, with 5 years of leadership or managerial experience.
Proven track record of developing and implementing information security strategies and initiatives in alignment with NIST Cybersecurity Framework.
Experience with conducting risk assessments, vulnerability assessments, and developing risk mitigation strategies.
Excellent leadership and communication skills, with the ability to collaborate effectively with cross-functional teams and influence stakeholders at all levels of the organization.
Strong analytical and problem-solving abilities, with a keen attention to detail and the ability to prioritize and manage multiple tasks simultaneously.
In-depth knowledge of cybersecurity principles, technologies, and best practices.
Strong understanding of regulatory requirements and compliance frameworks.
Excellent leadership, communication, and stakeholder management skills.
Relevant certifications such as CISSP, CISM, or CRISC are highly desirable.
Experience with security compliance frameworks (e.g., CIS, NIS CSF, NIST RMF, ISO 27001) is a plus.
Additional Information
Salary Range: $120,000 - $130,000
Starting salary to be determined based on experience and qualifications.
Important: To apply, candidates must provide a cover letter and a resume.
SPECIAL REQUIREMENTS:
Must be a Philadelphia resident. Successful candidate must be a city of Philadelphia resident within six months of hire. Candidate must pass a background check.
PHYSICAL AND MENTAL DEMANDS:
Position requires a high level of mental concentration and commitment.
Discover the Perks of Being a City of Philadelphia Employee
:
• We offer Comprehensive health coverage for employees and their eligible dependents
• Our wellness program offers eligibility into the discounted medical plan
• Employees receive paid vacation, sick leave, and holidays
• Generous retirement savings options are available
•
Pay off your student loans faster
- As a qualifying employer, City of Philadelphia employees are eligible to participate in the Public Service Loan Forgiveness program. Join the ranks of hundreds of employees who have already benefited from this program and achieved student loan forgiveness.
•
Enjoy a Free Commute on SEPTA
- Starting September 1, 2023, eligible City employees will no longer have to worry about paying for SEPTA public transportation. Whether you're a full-time, part-time, or provisional employee, you can seize the opportunity to sign up for the SEPTA Key Advantage Program and receive free Key cards for free rides on SEPTA buses, trains, trolleys, and regional rails.
•
Unlock Tuition Discounts and Scholarships
- The City of Philadelphia has forged partnerships with over a dozen esteemed colleges and universities in the area, ensuring that our employees have access to a wide range of tuition discounts and scholarships. Experience savings of 10% to 40% on your educational expenses, extending not only to City employees but in some cases, spouse and dependents too!
Join the City of Philadelphia team today and seize these incredible benefits designed to enhance your financial well-being and personal growth!
*The successful candidate must be a city of Philadelphia resident within six months of hire
Effective May 22, 2023, vaccinations are no longer required for new employees that work in non-medical, non-emergency or patient facing positions with the City of Philadelphia. As a result, only employees in positions providing services that are patient-facing medical care (ex: Nurses, doctors, emergency medical personnel), must be fully vaccinated.
The City of Philadelphia is an Equal Opportunity employer and does not permit discrimination based on race, ethnicity, color, sex, sexual orientation, gender identity, religion, national origin, ancestry, age, disability, marital status, source of income, familial status, genetic information or domestic or sexual violence victim status. If you believe you were discriminated against, call the Philadelphia Commission on Human Relations at ************ or send an email to
[email protected]
.
Lead Security Analyst - Information System Security Officer (ISSO)
Security Architect Job In Cherry Hill, NJ
Description & Requirements Reporting to the Sr. Manager for the Program Security Services team (US Services), the Lead Security Analyst-ISSO is responsible for managing the overall security posture of their assigned projects. Acting as an independent contributor, the Lead Analyst-ISSO will document and validate security compliance requirements, as defined in client contracts and established regulatory frameworks (NIST 800-53, HIPAA, IRS 1075, CMS MARS-E/ARC-AMPE, PCI-DSS). This position requires broad knowledge of Information Technology, including cloud providers such as Azure and AWS. This role will also manage stakeholder relationships with both internal and external customers. US citizenship is required per contract/client, at least one of the following certifications is required: CISSP (preferred), CISA or CISM. Experience with NIST 800-53 and the ability to travel up to 10% is required.
Essential Duties and Responsibilities:
- Responsible for ensuring information security for an assigned area of Business/Project focusing on key areas of risk, as outlined in the Information Security policy, under the direction of the Information Security management team.
- Conduct Information Security risk assessments and compliance evaluations for infrastructure and application assets within required timeframes and to industry standards and regulatory specifications.
- Ensure controls are properly and fully implemented to address identified Information Security risks for assigned area of responsibility.
- Define, create and maintain the documentation for certification and accreditation of each information system in accordance with regulatory requirements.
- Lead and support audits and client reviews of security posture; coordinate the collection, review and submission of Information Security deliverables and track the remediation of audit findings and exceptions.
- Manage expectations with multiple stakeholders on projects and programs in conjunction with the Information Security team.
- Promotion of Information Security awareness through various communication channels within the organization.
- Collaborate with the Information Security team members on process improvements, secure design and recertification of MAXIMUS assets.
Identify potential security control gaps by reviewing evidence provided by stakeholders, system generated reports and/or control implementation statements.
Perform risk assessments using vulnerability management and application security testing reports.
Initiate formal security exception process, when required.
Develop Plan of Action and Milestones (POA&M) as necessary.
Minimum Requirements
- Please refer to the additional information section of the job requisition for this opening to determine clearance eligibility required.
- Bachelor's degree and 7+ years of relevant professional experience required, or equivalent combination of education and experience.
US Citizenship is REQUIRED per contract/client.
At least one of the following certifications is REQUIRED: CISSP (preferred), CISA or CISM
Experience with NIST 800-53 is REQUIRED
Ability to travel nationally up to 10% is REQUIRED
HIPAA experience is preferred
Experience with Cloud providers, such as Azure and AWS
Knowledge of any of the following security frameworks is preferred: IRS 1075, CMS MARS-E/ARC-AMPE, PCI-DS
Demonstrates excellent interpersonal, presentation and verbal/written communication skills
Demonstrates strong customer service skills
Ability to communicate technical information to non-technical staff
Ability to work collaboratively with a broad range of staff (including analysts, engineers and leadership)
Proficiency with Microsoft Office
SmartSheet experience is a plus
Ability to perform comfortably in a fast-paced, deadline-oriented work environment
Ability to organize and execute complex tasks
Ability to work as a team member as well as independently
#LI-JH1 #maxcorp #LeadSecurityAnalyst #HotJobs0311LI #HotJobs0311FB #HotJobs0311X #HotJobs0311TH #TrendingJobs
EEO Statement
Active military service members, their spouses, and veteran candidates often embody the core competencies Maximus deems essential, and bring a resiliency and dependability that greatly enhances our workforce. We recognize your unique skills and experiences, and want to provide you with a career path that allows you to continue making a difference for our country. We're proud of our connections to organizations dedicated to serving veterans and their families. If you are transitioning from military to civilian life, have prior service, are a retired veteran or a member of the National Guard or Reserves, or a spouse of an active military service member, we have challenging and rewarding career opportunities available for you. A committed and diverse workforce is our most important resource. Maximus is an Affirmative Action/Equal Opportunity Employer. Maximus provides equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disabled status.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Minimum Salary
$
111,605.00
Maximum Salary
$
145,000.00
Director, Information Security
Security Architect Job 8 miles from Cherry Hill
Director, Information Security
Time Type:
Full time
and Qualifications:
The Director, Information Security assists the CISO in developing an information security vision and strategy that is aligned to organizational priorities.
They will manage the day to day operations and staff of the Information Security department. This area focuses on identity and access management, GRC (governance, risk and compliance) as well as network security/operations.
They will assist the CISO in the management and coordination of security standards, along with implementation and execution to ensure compliance to security standards and policies and provide expertise in managing audits, vulnerability remediation and incident response.
They will assist in managing the University information security awareness program and promote best practices in security and compliance management.Note to applicants: In the Resume/CV upload field, please submit a resume, a cover letter, and 3 references that can speak to your direct experience in information security and management Essential Duties & Responsibilities
Manages the day to day operations and staff of the Information Security department. This area focuses on identity and access management, GRC (governance, risk and compliance) as well as network security/operations.
Assists the IAM Analyst with the management of the security awareness program to ensure that there is an appropriate awareness of information security and safe computing practices across the University.
Provides support in managing vendor relationships pertaining to information security, including the formal review of university contracts which have technology components. Using a vendor questionnaire, assesses each vendor's overall capabilities including infrastructure, controls, security practices, regulatory compliance, ability to protect University information assets, etc. Issue a security opinion on the suitability of each vendor.
Provides support in investigating and assessing security incidents in collaboration with technology managers in IT, and in partnership with the Office of General Counsel. Responds to alleged policy violations and complaints received from external parties. Documents findings via a formal security incident report.
Serves as the backup point of contact for security threats, potential breaches, and privacy issues, including matters involving law enforcement. Works with internal and external auditors and agencies on security and compliance matters, including incident response.
Assists the IT Audit Analyst in developing a strategy for addressing audits, assessments and compliance efforts.
Assists the CISO in establishing annual and long term security and compliance goals. Creates and implements security strategies, metrics, and reporting processes.
Develops, maintains, promotes and enforces data management and information security policies, standards, guidelines, and procedures, including those for end users, system and application administrators, service providers, and legal/regulatory compliance.
Assists in developing communication and education initiatives around the awareness of information security risks as well as mitigation strategies and protections that are in place at the university.
Understands and interacts with IT advisory councils, administrative and academic units through committees, to ensure the development of and consistent application of policies and standards across technology projects, systems and services, including privacy, risk management, compliance and business continuity management.
Works collaboratively with others to conduct risk assessments and business impact analysis to identify vulnerabilities and risk exposure.
Where risks have been identified, provides recommendations on managing that risk, including acceptance, avoidance, transference, and mitigation techniques to minimize potential impact on the university.
Keeps current with emerging governmental regulatory initiatives and security alerts and issues which could have an impact on the university environment.
Provides guidance, planning, and monitoring for compliance with various industry requirements (e.g. FERPA, , HIPAA, PCI), which impact the way in which various systems are implemented. Prepares and submits required reports to external agencies.
Direct supervisor for: Identity Access Management Analyst; IT Audit Analyst; Graduate Assistant as funding permits; and future incumbents as identified by the University
Minimum Qualifications
Bachelor's degree, preferably in computer science, OR an equivalent combination of education, training and experience.
Minimum of 6 years of progressive professional experience with information technology, including 3 years minimum in a formal information security position (i.e Identity and Access management, Risk Management, Privacy, etc.) with 3 years minimum of management experience.
Strong written, oral communication, and presentation skills.
Ability to communicate technical/security information effectively to individuals with varying degrees of experience and skill.
Experience working with compliance and regulatory matters such as FERPA, PCI, HIPAA and HEOA. Experience and knowledge of NIST, GLBA and GDPR.
Superior troubleshooting and problem solving skills.
Experience in writing security policies and related documents.
Ability to work independently and with others in a collaborative environment.
Demonstrated ability to work and effectively manage multiple work streams while meeting internal deadlines.
Preferred
Microsoft experience - Azure, Security, IAM, CASB, SSO, MFA.
Certified Information Systems Security Professional (CISSP) OR Certified Information Security Manager (CISM) OR Certified Information Systems Auditor (CISA).
Any Microsoft “SC” specific certifications.
Experience with contract and vendor vetting, negotiations and document reviews.
Experience working with General/External Counsel and Law enforcement agencies.
Physical Requirements
Will require long periods of work at a computer
This position may be eligible for a flexible work arrangement per the University's guidelines and meeting performance expectations
Unusual Work Hours
Will require occasional evening and weekend hours. Must be available to respond to emergencies on a 7x24 basis and participate in the IT On Call process
Saint Joseph's University is a private, Catholic, Jesuit institution and we expect members of our community to be knowledgeable about - and to make a positive contribution to - our mission. Saint Joseph's University is an equal opportunity employer that seeks to recruit, develop and retain a talented and diverse workforce. The University is committed to the diversity of its faculty and staff so that our students, our disciplines and our community as a whole can benefit from the multiple perspectives it offers. The University seeks qualified candidates who share our commitment to equity, diversity and inclusion. EOE
Saint Joseph's University prohibits discrimination on the basis of sex in its programs and activities, including admission and employment, in accordance with Title IX of the Education Amendments of 1972. The Title IX Coordinator is responsible for overseeing compliance with Title IX and other civil rights laws and regulations. To contact the Title IX Coordinator, e-mail ***************, visit Campion Student Center suite 243, or call ************. To learn more about the University's Title IX policies, the process for filing a report or formal complaint of sex discrimination, sexual harassment, or other form of sexual misconduct, and the University's response to reports and/or formal complaints, please visit ******************** Inquiries may also be directed to the Federal agency responsible for enforcing Title IX, the U.S. Department of Education Office for Civil Rights.
Information System Security Officer III
Security Architect Job 8 miles from Cherry Hill
Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization.
**This position is contingent upon award of contract**
Key Responsibilities:
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Required Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field.
A minimum of 6 years of relevant experience in cybersecurity or information systems security.
Prior experience supporting Navy programs.
Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M.
At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary.
Proficiency in cybersecurity frameworks, risk management processes, and security controls.
Strong analytical and problem-solving skills with attention to detail.
Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team.
Preferred Qualifications:
Experience with DoD security requirements and systems.
Familiarity with NIST, RMF, and other relevant cybersecurity standards.
Ability to work in a potentially remote environment with occasional on-site requirements.
Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment.
About Us:
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Senior Security Engineer 4 - Infrastructure and Automation
Security Architect Job 24 miles from Cherry Hill
PagerDuty empowers teams of all kinds to do the critical work that moves business forward through the PagerDuty Operations Cloud. Visit our careers site (*********************************** to explore life at PagerDuty, discover opportunities, and sign-up for job alerts!
PagerDuty is seeking a **Senior Security Engineer (Infrastructure & Identity Security)** to join our diverse, customer-focused team! As a Senior Security Engineer, you will be a key technical leader driving security initiatives across PagerDuty's SaaS offerings, with deep expertise in Identity and Access Management. While you'll spearhead our IAM modernization efforts and implement robust authentication patterns, you'll also be instrumental in maintaining our overall security posture through architecture reviews, threat modeling, and automated security solutions. We're looking for a security generalist who excels in IAM - someone who can tackle diverse security challenges across our infrastructure while bringing specialized knowledge in identity and access patterns. Since we own and operate what we build, you'll collaborate with 30+ engineering teams to implement secure, scalable solutions that enhance security while maintaining developer productivity. This is an exciting opportunity to not only revolutionize our IAM strategy but also contribute to the broader security landscape of our SaaS platform.
**KEY RESPONSIBILITIES**
+ Lead and implement comprehensive IAM strategy across cloud infrastructure
+ Work closely with Product Engineering teams and conduct architecture reviews and threat modeling sessions focusing on but not limited to identity and access patterns
+ Design and implement modern service-to-service authentication patterns using technologies such as IRSA (IAM Roles for Service Accounts) and pod identity
+ Develop and maintain a robust secrets management framework and strategy
+ Drive adoption of principle of least privilege across all services and applications
+ Design and implement automated workflows for access reviews and certification
+ Design and implement security controls for AWS cloud infrastructure and containerized environments
+ Develop metrics and monitoring for IAM-related security events and access patterns
+ Monitor and maintain security tooling supporting infrastructure security controls
+ Design and implement security automations and tool integrations
+ Develop automated vulnerability management workflows to drive timely remediation
+ Implement automated incident response playbooks
**Additional Responsibilities:**
+ Mentor and guide team members on security best practices and implementation approaches
+ Participate in our team's on-call rotation, triaging and addressing security issues as they arise.
+ Contribute to roadmap and annual planning discussions
**BASIC QUALIFICATIONS**
+ 5+ years of experience as a full-stack Security Engineer in an AWS native, micro-service SaaS environment with focus on IAM.
+ Deep expertise in cloud security, particularly AWS services including but not limited to:
+ GuardDuty, CloudTrail, Config
+ IAM family, Secrets Manager, KMS
+ EKS, Service Mesh architectures
+ Strong expertise and experience implementing and managing identity providers, specifically Okta and/or Microsoft Entra at scale (1000+ users).
+ Strong understanding of zero trust principles and modern authentication patterns
+ Experience working with multiple development teams and technology stacks
+ 5+ years experience leading technical security initiatives, with proven ability to scope ambiguous projects, break down complex work into actionable items, and successfully delegate responsibilities while maintaining project momentum
+ Proficiency with security tools:
+ Vulnerability Management & EDR: Wiz, Snyk, Qualys/Nessus, Crowdstrike
+ SIEM: SumoLogic or Splunk
+ Experience with Infrastructure as Code and CI/CD:
+ Terraform, Helm, Chef, Ansible, Buildkite, Jenkins, ArgoCD
+ 4+ years of experience and proficiency in at least one programming language and framework (Python, Java, or similar)
+ Strong understanding of Threat Modeling principles
+ Experience with Security Incident Response & Risk Management
+ High appetite for challenging problems with a high degree of ownership.
**PREFERRED QUALIFICATIONS**
+ Hands-on experience implementing IAM solutions at scale
+ Experience working at a SaaS company larger than 1000 employees and 100M in revenue
+ Current or past experience with obtaining and maintaining FedRAMP authorization and other compliance frameworks (SOC 2, ISO 27001)
+ Strong problem-solving abilities with effective change management skills
+ Possesses a strong sense of ownership and a keen discernment for excellence in security systems within a SaaS environment, demonstrating the ability to distinguish what constitutes a truly robust and effective safeguarding infrastructure.
+ Demonstrated history of mentoring and coaching
+ Strong written and verbal communication skills
+ Working knowledge and experience with PagerDuty Incident Management and Process Automation products.
+ Familiarity with Corporate security needs and solutions, and ability to provide oversight and mentorship to the Corporate Security team to ensure alignment with CISO strategic initiatives and mandates.
The base salary range for this position is 176,000 - 281,000 USD. This role may also be eligible for bonus, commission, equity, and/or benefits.
Our base salary ranges are determined by role, level, and location. The range, which is subject to change based on primary work location, reflects the minimum and maximum base salary we expect to pay newly hired employees for the position. Within the range, we determine pay for an individual based on a number of factors including market location, job-related knowledge, skills/competencies and experience.
Your recruiter can share more about the specific offerings for this role, as well as the salary range for your primary work location during the hiring process.
The successful applicant will be performing work in FedRAMP environments, and therefore, must be a U.S. Person (i.e. U.S. citizen, U.S. national, lawful permanent resident, asylee, or refugee). **This position may also perform work that the U.S. government has specified can only be performed by a U.S. citizen on U.S. soil.**
**Not sure if you qualify?**
Apply anyway! We extend opportunities to a broad array of candidates, including those with diverse workplace experiences and backgrounds. Whether you're new to the corporate world, returning to work after a gap in employment, or simply looking to take the next step in your career path, we are excited to connect with you.
**Where we work**
PagerDuty currently has offices in Atlanta, Lisbon, London, San Francisco, Santiago, Sydney, Tokyo, and Toronto. We offer a hybrid, flexible workplace. We also provide ample opportunities for in-person and virtual connection, like team offsites and volunteering events.
**How we work**
Our values are deeply embedded in how we operate and the people we bring on board. You will see our values ingrained in how we support our customers, collaborate with our colleagues, develop our products and foster an inclusive and empathetic work culture.
+ Champion the Customer | Put users first to design great products and experiences.
+ Run Together | Build strong teams that amplify our impact on users.
+ Take the Lead | Disrupt and invent to be the first choice for users.
+ Ack + Own | Take ownership and action to deliver more efficiently to users.
+ Bring Your Self | Bring your best self to build empathy and trust with users.
**What we offer**
**One way we ensure our employees are inspired to do their best is through a comprehensive total rewards approach that supports them and their loved ones. As a global organization, our programs are competitive with industry standards and aligned with local laws and regulations. Learn more, including country-specific offerings, on our** benefits site (********************************************** **.**
**Your package may include:**
+ Competitive salary
+ Comprehensive benefits package from day one
+ Flexible work arrangements
+ Generous paid vacation time
+ Paid holidays and sick leave
+ Dutonian Wellness Days - scheduled company-wide paid days off in addition to PTO
+ Company equity*
+ ESPP (Employee Stock Purchase Program)*
+ Retirement or pension plan*
+ Paid parental leave - up to 22 weeks for pregnant parent, up to 12 weeks for non-pregnant parent (some countries have longer leave standards and we comply with local laws)*
+ HibernationDuty - an annual company paid week off when everyone at PagerDuty, with the exception of a small, coverage crew, is asked to take a much needed break to truly disconnect and recharge
+ Paid volunteer time off - 20 hours per year
+ Company-wide hack weeks
+ Mental wellness programs
_*Eligibility may vary by role, region, and tenure_
**About PagerDuty**
PagerDuty, Inc. (NYSE:PD) is a global leader in digital operations management. The PagerDuty Operations Cloud revolutionizes how critical work gets done, and powers the agility that drives digital transformation. Customers rely on the PagerDuty Operations Cloud to compress costs, accelerate productivity, win revenue, sustain seamless digital experiences, and earn customer trust. More than half of the Fortune 500 and more than two thirds of the Fortune 100 trust PagerDuty including Cisco, Cox Automotive, DoorDash, Electronic Arts, Genentech, Shopify, Zoom and more.
Led by CEO Jennifer Tejada, PagerDuty's Board of Directors is 50% female and 62% URP representation. We strive to build a more equitable world by investing 1% each of company equity, product, and employee volunteer time.
PagerDuty is Great Place to Work-certified, a Fortune Best Workplace for Millennials, a Fortune Best Medium Workplace, a Fortune Best Workplace in Technology, and a top rated product on TrustRadius and G2.
Go behind-the-scenes on our careers site (*********************************** and @pagerduty on Instagram.
**Additional Information**
PagerDuty is committed to creating a diverse environment and is an equal opportunity employer. PagerDuty does not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, parental status, veteran status, or disability status.
PagerDuty is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application process. Should you require accommodation, please email accommodation@pagerduty.com and we will work with you to meet your accessibility needs.
PagerDuty uses the E-Verify employment verification program.
Azure Architect
Security Architect Job 20 miles from Cherry Hill
Duties and responsibilities
Lead the design and deployment of Azure solutions leveraging best practices and architectural principles.
Conduct assessments of existing applications and infrastructure to recommend migration strategies to Azure.
Collaborate with cross-functional teams to gather technical requirements, define architecture specifications, and create comprehensive design documents.
Provide guidance on Azure services, deployment models, and resource optimization to ensure solutions are cost-effective and scalable.
Develop and maintain architecture diagrams, technical documentation, and solution roadmaps.
Assist in troubleshooting and resolving technical issues during implementation and post-deployment phases.
Stay up to date with Azure advancements, emerging technologies, and industry trends to inform architectural decisions.
Implementation knowledge of Dev Ops, APIM, Snowflake and Databricks on Azure would be preferred.
Azure Hands on knowledge is preferred.
Requirements:
Bachelor's degree in computer science, Information Technology, or related field, or equivalent experience.
Microsoft Certified: Azure Solutions Architect Expert certification is required.
Proven experience in designing and implementing complex cloud solutions on Azure.
In-depth understanding of Azure services, networking, security, and identity management.
Strong knowledge of cloud architecture patterns, best practices, and cost optimization strategies.
Proficiency in scripting and automation using PowerShell, Azure CLI, or similar tools.
Excellent critical thinking skills and the ability to troubleshoot complex technical issues.
Effective communication skills to interact with technical and non-technical stakeholders.
Beneficial to have insurance industry experience
Work Environment:
Hybrid (3 days onsite per week in Blue Bell, PA)
Deloitte Microsoft Technology Services Practice (DMTSP) - Security Pre-Sales Architect
Security Architect Job 8 miles from Cherry Hill
Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest group of Cyber Risk individuals worldwide.
Microsoft is an audit client for Deloitte - as a result, Deloitte does not and cannot have any form of alliance or partnership with Microsoft. Deloitte, however, can advise on and implement Microsoft products, and interact with Microsoft in certain ways in connection with these activities. When doing so, Deloitte and Microsoft must be sensitive to and mindful of the need for independence.
Recruiting for this role ends on 4.1.25
Work you'll do
As a DMTSP - Security Pre-Sales Architect, you will be at the front lines with our clients who have chosen the Microsoft technology platform and supporting them with their Cloud Cyber Risk needs specifically helping them navigate the journey on securing their Microsoft platform infrastructure such as Azure and Office 365 and the design and deployment of Microsoft Security solutions. This is a Deloitte services pre-sales role and not a project implementation role. This will include:
* Lead or support proposals and/or also function as proposal lead architect with services potentially including the following Microsoft technologies: Microsoft Defender for Cloud, Azure Policies, Purview, Intune, Sentinel, Entra ID, Defender for Office, Defender for Endpoints and Servers, Defender for Vulnerabilities, Defender for Cloud Apps, Defender XDR and SCCM
* Assist in business development activities such as defining scope of services, building resource estimates and related pricing, packaging proposals and supporting the delivery of the proposal to the client for security services at clients who may have selected Microsoft infrastructures.
* Lead the delivery of cloud security analysis, recommendations and configurations of prospective clients' Microsoft Entra ID, Office 365 (O365), Exchange Online, Teams, OneDrive for Business, M365 Copilot and SharePoint Online environments based on Deloitte's Microsoft 365 Cyber Risk Framework. This can include leveraging security solutions services which may include Microsoft's technology products such as Entra, Purview, Defender, Intune, and Sentinel.
* Support or lead the delivery of Cyber Security workshops with clients(remote/in-person) including building demo labs, PowerPoint decks and Deloitte best practice perspectives
* Function as a Cyber security architect (experienced in applicable Microsoft technologies) supporting Deloitte project teams for practice development and eminence
* Function as deep subject matter expert on Microsoft security and securing Microsoft solutions staying abreast of Gartner research and Microsoft product roadmaps and advising Deloitte teams and clients on new developments.
* Function as the primary client day-to-day interface building rapport and trust with the client.
* Perform technical health checks of client's Microsoft platforms/environments as part of client development activities prior to broader deployments.
* When clients have expressed a desire to discuss Microsoft technologies, assist clients in a pre-sales role, with transitions to the Microsoft 365 security services such as solution setup and service configuration, focused on risk mitigation. Additional technologies include MFA, Conditional Access, Purview Compliance Manager, M365 Defender, Defender for O365, Defender for Cloud Apps (MDCA), Purview Information Protection (MPIP), Purview Data Loss Prevention (DLP).
* Implement industry leading practices around M365 E5 cyber risks and cloud security for clients.
* As part of the Deloitte Microsoft Technology Services security practice development and eminence activities; Design and develop cloud-specific security policies, standards and procedures e.g., O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management.
* Provide internal technical training to Advisory personnel as needed.
* Act as a subject matter expert on cloud cyber risk for Microsoft Purview, Microsoft Intune, Entra ID, Azure security, Microsoft Defender, and Microsoft Sentinel capabilities.
* Lead the development of Point-of-Views (PoVs) on providing leading practices to our clients on Cyber, including the Microsoft security challenges they face.
* Support talent process in the architect role such as for recruiting and coaching.
* Function as an expert in CNAPP, CWPP and CSPM technologies and security risk frameworks relevant to cloud as well as the Microsoft Cloud Security Benchmark
The successful candidate will possess:
* Strong critical thinking, analysis, and problem-solving skills
* Strong written and oral communication skills
* Experience working independently as well as collaboratively across large teams
The team
Deloitte Advisory's Cloud Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice.
Qualifications
Required:
* 5+ years of experience in technical consulting, client problem solving, architecting and designing solutions in a consulting role with project leadership and/or architect experience with Microsoft technologies
* 5+ years of hands-on technical experience with securing Microsoft 365 enterprise-level messaging and collaboration and/or Azure Infrastructure in implementation and operations.
* 5+ years of hands-on technical experience with enterprise-level systems management systems such as SCCM, End point security and Intune and endpoint engineering (MEM) and mobile device management (MAM & MDM)) implementation or operations.
* 5+ years of hands-on technical and project / professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (e.g. Defender for Endpoints and Defender for Servers), Microsoft Sentinel, Microsoft's email security platform (Defender for Office), Microsoft Purview, Azure security & Entra ID
* Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve
* Limited sponsorship may be available
Preferred:
* BA/BS Degree preferred. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.
* Microsoft Certifications such as: (SC-900, SC-100, SC-200, SC-300, SC-400, AZ 500),
* Cyber Certifications such as: CCSP, CCSK, CISSP, CCNP, and CCNA.
Ideally the following technical experience is a plus in any of the technologies below:
* Microsoft Security Copilot
* Defender for Vulnerabilities
* Defender for Cloud Apps
* Defender XDR
* Experience with Azure data, analytics, or AI/ML services (Azure SQL, HDInsight, Databricks, Data Factory, Data Lake Storage, Azure Analysis Services, Synapse Analytics, Azure Machine Learning, etc.)
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500.00 to $210,600.00.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation:Hyperlink: ************************************************************************************************************
#DeloitteNDO, #SalesOpsGreenDot
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our client most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our clients, our people, and in our communities. We are creating trust and confidence in a more equitable society. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. We are focusing our collective efforts to advance sustainability, equity, and trust that come to life through our core commitments. Learn more about Deloitte's purpose, commitments, and impact.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte Advisory" means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. These entities are separate subsidiaries of Deloitte LLP.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Deloitte will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance. See notices of various ban-the-box laws where available.
Requisition code: 211073
Senior Security Architect - Azure Cloud
Security Architect Job 22 miles from Cherry Hill
We are seeking a highly skilled and experienced **Azure Security Architect** to lead the design, implementation, and management of secure cloud solutions on Microsoft Azure. As an Azure Security Architect, you will be responsible for ensuring the security of cloud-based applications and services, implementing security best practices, and mitigating risks across the Azure environment. You will collaborate with cross-functional teams, including IT, DevOps, and development teams, to design and enforce security policies, frameworks, and solutions.
Req.#776574920
**\#LI-DNI**
**Responsibilities**
+ Design and implement secure cloud architectures for Microsoft Azure environments
+ Define security standards, best practices, and policies to ensure cloud systems meet compliance and regulatory requirements (e.g., GDPR, HIPAA)
+ Develop and maintain Azure security policies, governance frameworks, and technical security controls
+ Perform security assessments, identify vulnerabilities, and lead remediation efforts to address risks and threats within the Azure environment
+ Architect and implement identity and access management (IAM), encryption, and security monitoring solutions
+ Collaborate with DevOps and development teams to integrate security into the CI/CD pipeline
+ Conduct risk assessments, threat modeling, and security reviews for cloud-based solutions
+ Stay current with Azure security technologies and industry best practices and recommend improvements or new tools as necessary
+ Ensure the security of Azure-based services such as Azure AD, Azure Key Vault, Azure Security Center, and Azure Sentinel
+ Provide guidance and mentorship to team members on security best practices
+ Assist in incident response activities and security investigations
**Requirements**
+ Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience)
+ 5+ years of experience in cloud security with a focus on Azure security architecture and design
+ Strong understanding of Azure services and security capabilities, including Azure AD, Azure Key Vault, Azure Policy, and Azure Security Center
+ Experience with identity and access management (IAM), multi-factor authentication (MFA), and role-based access control (RBAC) in Azure
+ Proficiency in implementing security tools, such as Azure Sentinel, Microsoft Defender for Cloud, and Azure Firewall
+ Deep knowledge of network security, including firewalls, VPNs, and encryption protocols
+ Strong understanding of compliance frameworks such as GDPR, HIPAA, PCI-DSS, and other industry-specific standards
+ Excellent communication skills with the ability to articulate complex security concepts to non-technical stakeholders
+ Relevant certifications such as Microsoft Certified: Azure Solutions Architect Expert, Microsoft Certified: Azure Security Engineer Associate, CISSP, or CISM are a plus
+ Experience with infrastructure-as-code (IaC) tools like Terraform, ARM templates, or Azure Resource Manager
+ Knowledge of scripting and automation languages such as PowerShell, Python, or Bash
+ Familiarity with DevSecOps practices and integrating security into CI/CD pipelines
+ Experience with hybrid cloud security and securing multi-cloud environments
+ Travel to client site 2 weeks out of every month in Taylor, TX
**We offer**
+ Medical, Dental and Vision Insurance (Subsidized)
+ Health Savings Account
+ Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
+ Short-Term and Long-Term Disability (Company Provided)
+ Life and AD&D Insurance (Company Provided)
+ Employee Assistance Program
+ Unlimited access to LinkedIn learning solutions
+ Matched 401(k) Retirement Savings Plan
+ Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time)
+ Paid Holidays - nine (9) total per year
+ Legal Plan and Identity Theft Protection
+ Accident Insurance
+ Employee Discounts
+ Pet Insurance
+ Employee Stock Purchase Program
+ If otherwise eligible, participation in the discretionary annual bonus program
+ If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program
**This Remote Position Cannot be Performed in New York City.**
EPAM is a leading global provider of digital platform engineering and development services. We are committed to having a positive impact on our customers, our employees, and our communities. We embrace a dynamic and inclusive culture. Here you will collaborate with multi-national teams, contribute to a myriad of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow. No matter where you are located, you will join a dedicated, creative, and diverse community that will help you discover your fullest potential.
YouTube video player (***************************************************************
This posting includes a good faith range of the salary EPAM would reasonably expect to pay the selected candidate. The range provided reflects base salary only. Individual compensation offers within the range are based on a variety of factors, including, but not limited to: geographic location, experience, credentials, education, training; the demand for the role; and overall business and labor market considerations. Most candidates are hired at a salary within the range disclosed. Salary range: $175,000 - $200,000. In addition, the details highlighted in this job posting above are a general description of all other expected benefits and compensation for the position.
Applications will be accepted on a rolling basis.
In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 27 24 (lacounty.gov)
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone.
At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.