Post job

Security architect jobs in Delaware

- 68 jobs
  • Lead Security Architect DevSecOps/AppSec

    Lumen 3.4company rating

    Security architect job in Dover, DE

    Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. **The Role** The Lead Information Security Architect is a member of the Global Security Services organization who is responsible for conducting security risk assessments in coordination with the Lumen business owners, the Governance, Risk, and Compliance team, and the Product and Platform Security team. The purpose is to ensure compliance with corporate policy, standards, procedures, and industry best practices. The deliverables include metrics, reports, and mitigations associated with potential findings, issues, and risks, that could impact Lumen or its customers. The successful candidate will have broad technical knowledge of current and emerging cyber threats, as well as security technologies and methods used to protect both corporate and customer-facing network infrastructures. This candidate must be able to work independently and lead as a team member to consult with internal clients on security topics, providing designs, reviews, and recommendations. **The Main Responsibilities** + Lead assessments of potential risks across enterprise and product infrastructure to include applications, databases, cloud, networks, and provide security requirements and recommendations for risk mitigation. + Develop and design new security solutions that reduce risk and align business requirements with security standards, particularly focusing on CI/CD pipeline integration. + Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. + Consult as a DevSecOps security subject matter expert with architects, engineers, third parties and others on potential solutions.Recommend new DevSecOps-oriented information security systems and controls to mitigate emerging threats and risks across the company. + Ensure reports and findings are delivered in a timely and appropriate manner to management, operations, and executive leadership. + Recommend new security policy, standards, best practices, and system configuration standards. Consult with internal clients on security topics and policy interpretation. + Coordinate activities across multiple departments and business units, emphasizing DevSecOps principals and practices. + Stay up-to-date with emerging security trends, vulnerabilities, and best practices, and recommend adjustments to security strategies as needed. **What We Look For in a Candidate** + 7+ years of relevant experience, including threat modeling, security design reviews, and security architecture and deployment models + Experience with CI/CD pipelines, such as Jenkins, Azure DevOps Pipelines, AWS CodeBuild, and GitHub Actions, including pipeline configuration, scripting, and security stage management. + Extensive knowledge of secure software development principles and threat modeling. Ability to guide and enforce secure coding practices throughout the development lifecycle. + Proficient use of Git-based workflows, including branch management, code reviews, and integrating security checks into pull requests. + Understanding of core GitHub security features such as branch protection rules and GitHub Actions secrets management. + Skilled in scripting languages such as Python, Bash, or Groovy for automating security tasks and pipeline operations. Experienced with Infrastructure-as-Code tools like Terraform and Application Deployment tools like Helm. Ability to write custom plugins or integrations to extend CI/CD functionality. + Knowledge of integrating Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) tools into CI/CD pipelines using an enterprise-wide approach. Experience with tools such as SonarQube, Checkmarx, OWASP ZAP, Snyk, or other security scanners. + Proficiency in containerization technologies, such as Docker, and orchestration platforms, like Kubernetes, with an emphasis on securing container images and runtime environments. An understanding of cloud security best practices within environments including AWS, Azure, or GCP, particularly concerning application security and CI/CD processes. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors Location Based Pay Ranges: $103,711 - $138,281 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $108,896 - $145,195 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $114,082 - $152,109 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. \#GSS \#LI-MG1 Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process. Learn more about Lumen's: + Benefits (**************************************************** + Bonus Structure \#LI-Remote Requisition #: 340112 **Background Screening** If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. **Equal Employment Opportunities** We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. **Disclaimer** The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions. In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information. Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name. **Application Deadline** 11/11/2025
    $114.1k-152.1k yearly 34d ago
  • PCI Security Architect / InfoSec Engineer

    Baylor Scott & White Health 4.5company rating

    Security architect job in Dover, DE

    **About Us** Here at Baylor Scott & White Health we promote the well-being of all individuals, families, and communities. Baylor Scott and White is the largest not-for-profit healthcare system in Texas that empowers you to live well. **Our Core Values are:** + We serve faithfully by doing what's right with a joyful heart. + We never settle by constantly striving for better. + We are in it together by supporting one another and those we serve. + We make an impact by taking initiative and delivering exceptional experience. **Benefits** Our benefits are designed to help you live well no matter where you are on your journey. For full details on coverage and eligibility, visit the Baylor Scott & White Benefits Hub to explore our offerings, which may include: + Immediate eligibility for health and welfare benefits + 401 (k) savings plan with dollar-for-dollar match up to 5% + Tuition Reimbursement + PTO accrual beginning Day 1Note: Benefits may vary based upon position type and/or level **Job Summary** : The PCI Security Analyst / Technical Engineer is responsible for supporting PCI DSS compliance initiatives from both a technical and operational perspective. This role involves conducting security assessments, implementing security controls, analyzing technical configurations, and supporting audits and compliance projects. The ideal candidate has experience as a former Qualified Security Assessor (QSA) or Internal Security Assessor (ISA) and possesses deep technical expertise in securing cardholder data environments (CDEs). **Salary:** The pay range for this position is $41.97/hour ($87,297/year) for those with entry-level qualifications up to $72.62 ($151,0493) for those highly experienced. The specific rate will depend upon the successful candidate's specific qualifications and prior experience. **Key Responsibilities:** + Perform security assessments of systems, networks, and applications to ensure compliance with PCI DSS. + Design, implement, and maintain security controls to protect payment card data. + Conduct vulnerability scans, penetration testing, and security monitoring activities. + Analyze system and network configurations to identify compliance gaps and security risks. + Provide technical guidance on PCI DSS remediation efforts, working closely with IT and security teams. + Develop and maintain security policies, procedures, and documentation related to PCI DSS. + Collaborate with QSAs and internal teams during PCI DSS assessments and audits. + Conduct root cause analysis for security incidents related to PCI DSS scope. + Stay informed on the latest security threats, vulnerabilities, and industry trends affecting PCI compliance. **Belonging Statement** We believe that all people should feel welcomed, valued, and supported. **Preferred Qualifications:** + Bachelor's degree in Cybersecurity, Information Technology, or a related field. + 5+ years of experience in security engineering, risk management, or compliance. + Former QSA or ISA highly preferred. + In-depth knowledge of PCI DSS requirements and security best practices. + Strong technical expertise in firewalls, network security controls, encryption, and vulnerability management. + Experience with security tools such as SIEM, IDS/IPS, vulnerability scanners, and endpoint protection. + Certifications such as CISSP or Security+ required. + Must pass the PCI ISA certification within 6 months of hire. + Familiarity with CIS and NIST frameworks. + Experience with P2PE, APIs, and payment technologies. + Knowledge of EPIC systems, Clover POIs, and Ingenico devices. + Excellent analytical, problem-solving, and communication skills. **Minimum Qualifications** + Bachelor's or 4 years of work experience above the minimum qualification + 5 Years of Experience As a health care system committed to improving the health of those we serve, we are asking our employees to model the same behaviours that we promote to our patients. As of January 1, 2012, Baylor Scott & White Health no longer hires individuals who use nicotine products. We are an equal opportunity employer committed to ensuring a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
    $87.3k-151k yearly 37d ago
  • GRC Security Architect

    Psi Services 4.5company rating

    Security architect job in Dover, DE

    **Title:** GRC Security Architect **Salary:** Up to $150K **About PSI** Join Us at PSI - Where You Belong, Grow, and Thrive! At PSI, we believe that people achieve their best when they feel they truly belong. That's why fairness and opportunity are at the heart of everything we do - not just words, but values deeply embedded in our culture and the full employee experience. We're proud to foster an environment where everyone is supported to reach their full potential. From your first day through every step of your journey with us, you'll feel the difference in how we work, grow, and succeed together. What You Can Expect From Us - We know that great work starts with feeling valued. That's why we've benchmarked all our roles against local market rates and why you'll always see salary details in our job postings. We believe in transparency, and we want you to feel confident that your next move aligns with your expectations. **About the Role** The GRC Security Architect plays a key role in supporting PSI's commitment to data security, privacy, and compliance. This role is responsible for driving core activities across quality, risk management, Information Security, data protection, and audit readiness to ensure the organization meets ISO, PCI, SOC 2, and other relevant standards. The position helps deliver assurance to stakeholders that PSI prioritizes the security and privacy of its data and systems. This is a full-time, permanent role, Monday to Friday, with flexible working hours around a standard 09:00 - 17:30 schedule. The role reports to the Snr Director of Information Security, Governance, Risk and Compliance and may be performed remotely, with occasional travel to offices and test centres as required for audits and assessments. This role requires that the successful applicant have experience working on Federal projects, be a United States resident and be able to obtain Federal clearance. **Role Responsibilities** + Collaborating with Internal teams to ensure that secure systems and networks are designed and implemented. + Identify potential security vulnerabilities within existing and prospective systems and devise strategies to address them. + Working with internal teams ensure that our infrastructure and applications adhere to established security measures. + Identify security risks in our organization and come up with possible preventative measures. + Assess the organization's security status in order to identify areas that need improvement. + Stay up-to-date with the emergence of new security threats while continuously adopting the industry's best practices. + Collaborate with internal teams to embed Security by Design principles in Infrastructure, Development and DevOps practices, implementing a framework to ensure that security controls are documented for all systems as part of standard operating procedures. + Collaborate with internal teams to support an integrated end-to-end GRC approach across the organization. + Maintain and update security policies, standards, procedures, and guidelines, ensuring they align with current business and IT practices. + Monitor and assess the effectiveness of security controls across business systems and processes. + Ensure alignment with client, regulatory, and internal compliance requirements. + Support the automation and continual improvement of GRC processes and tools. + Generate and present GRC-related metrics and reports to internal stakeholders and executive leadership. + Support internal and external audits (e.g., ISO27001, SOC2, etc.), including gathering evidence and managing responses. + Build and maintain cross-functional relationships with teams such as Legal, IT, Audit, Finance, and Business Operations to ensure GRC practices support overall business objectives. + Support ongoing compliance initiatives, including security incident reviews, risk memos, and policy exceptions. + Participate in the development of operational reports, metrics dashboards, and trend analysis related to security and compliance activities. + Support audit plans and compliance documentation for internal or external stakeholders. **Knowledge, Skills and Experience Requirements** + Experience working within, achieving and/or maintaining third-party attestations such as FedRAMP, SOC2, ISO27001 + Solid understanding of common security tools (e.g., vulnerability scanners, firewalls, IDS/IPS, AV software) strongly recommended + Experience working on a Federal Program is essential and contributing to core document set eg SSP, ConMon reporting, POAMs, System Narrative, SCP, SIA + Experience implementing or maintaining FedRAMP Moderate Authorization is desirable. + Experience documenting security controls in Architecture diagrams is essential + Extensive training and experience in IT disciplines such as application and data security, systems programming, systems design, computer technology or software disciplines + Familiarity with OneTrust or ServiceNow GRC and Privacy tools desired + Certified training in security management, risk and compliance solutions and practices. CISSP, ISSAP, CISA, CISM, GSEC, or related certification(s) desirable. + Experience in a fast-paced GRC function (desirable). **Benefits & Culture** Alongside a competitive salary, we offer a comprehensive benefits package designed to support your well-being, your future, and your sense of purpose: + Retirement Benefits: 401(k), pension, or country-specific retirement plans with employer contributions + Generous Time Off: Enhanced paid time off/annual leave policies + Health & Wellbeing Coverage: Medical insurance tailored to your region, plus: + US: Dental, vision, life, and short-term disability insurance + UK: Medical cashback plan including dental, vision, and income protection + Flexible Spending Accounts (US) + Employee Assistance Program (EAP): Confidential support whenever you need it + Work-Life Balance: We understand life happens outside of work, and we fully support flexibility + Wellness Culture: Regular global wellness initiatives to help you stay healthy and inspired + Future Planning: Tools and support to help you grow personally and professionally + Giving Back: Enjoy a Volunteer Day each year and opportunities to support our communities and industry At PSI, we're more than just a workplace - we're a global team driven by shared values and real impact. If you're ready to be part of a company that's committed to your growth and well-being, we'd love to hear from you. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
    $150k yearly 60d+ ago
  • Manager Information Security & Risk Management - Cloud Security Manager

    Highmark Health 4.5company rating

    Security architect job in Dover, DE

    This job provides Information Security and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various Information Security personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the Information Security ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents Information Security awareness and training programs. **ESSENTIAL RESPONSIBILITIES** + Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity. + Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority. + Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management. + Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security innovation; encourage and enforce proper training in regards to security issues. + Ensure compliance to Corporate and Information Security policies, standards and procedures. + Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources. + Other duties as assigned or requested. **EDUCATION** **Required** + Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field **Substitutions** + 6 years of relevant experience substitution for a Bachelor's Degree **Preferred** + Master's Degree in Computer Science, Information Security or related field **EXPERIENCE** **Required** + 7 - 10 years in Information Security and/or Information Risk Management and/or Information Technology + 7 - 10 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences + 1 - 3 years in mentoring others in a leadership role + 1 - 3 years in Staff Management + 1 - 3 years in developing and executing strategic plans to realize business objectives **Preferred** + 10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology + Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework + Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits + Experience establishing budgets and meeting fiduciary goals + Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.) **LICENSES AND CERTIFICATIONS** **Required** + None **Preferred** + Certified Information Systems Security Professional (CISSP) **OR** + Certified Information Security Manager (CISM) **OR** + Certified in Risk and Information Systems Controls (CRISC) **OR** + Information Technology Infrastructure Library (ITIL) **SKILLS** + Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140 + Strong teamwork and interpersonal skills + Experience in leading process improvement initiatives + Ability to motivate high performance, multi-discipline teams + Demonstrated competency in project execution + Demonstrated abilities in relationship management **Languages (Other than English)** None **Travel Requirement** 0% - 25% **PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS** **Position Type** Office-Based Teaches/Trains others regularly Frequently Travels regularly from the office to various work sites or from site-to-site Occasionally Works primarily out-of-the office selling products/services (Sales employees) Does Not Apply Physical Work Site Required Yes Lifting: up to 10 pounds Does Not Apply Lifting: 10 to 25 pounds Does Not Apply Lifting: 25 to 50 pounds Does Not Apply **_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._ **_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._ _As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._ _Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._ **Pay Range Minimum:** $108,000.00 **Pay Range Maximum:** $201,800.00 _Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets._ Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law. We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below. For accommodation requests, please contact HR Services Online at ***************************** California Consumer Privacy Act Employees, Contractors, and Applicants Notice Req ID: J269753
    $108k-201.8k yearly 50d ago
  • Security Engineer, GenAI

    Meta 4.8company rating

    Security architect job in Dover, DE

    Meta's Product Security team is responsible for finding, mitigating, and preventing security flaws across Meta's family of products, including Facebook, Messenger, Instagram, and WhatsApp.We are looking for a Security Engineer to join GenAI Product Security team to secure Meta AI products and product integrations. Work directly with Meta Superintelligence Labs and other product groups to set secure design standards and build technology to scale and implement protections for novel and evolving agentic security risks. **Required Skills:** Security Engineer, GenAI Responsibilities: 1. Influence and align the organization's vision and strategy, while engaging our teams to develop and deliver specific, multi-year roadmaps, programs, and projects. Ensure prioritization, resourcing, and timely delivery of this work within a changing business environment 2. Design and implement novel security solutions to protect against AI risks such as prompt injections where no industry standard exists 3. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 4. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products 5. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 6. Bug Bounty: help provide technical guidance to our world class bug bounty program and independent security researchers 7. Industry Impact: push the industry forward through conference talks and open source projects to contribute broadly to security for the world **Minimum Qualifications:** Minimum Qualifications: 8. B.S. or M.S. Computer Science, Engineering, or related technical discipline, or equivalent experience 9. 10+ years experience dealing with security issues web programming languages, development practices, and common bug patterns 10. Experience developing and delivering information on program status for senior leadership 11. Experience leading and managing complex cross-functional programs 12. Experience with exploiting common security vulnerabilities **Preferred Qualifications:** Preferred Qualifications: 13. Experience contributing to the security community (public research, blogging, presentations, etc.) 14. Experience writing software that enables security processes **Public Compensation:** $213,000/year to $293,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $213k-293k yearly Auto-Apply 15d ago
  • Principal Security Engineer

    Oracle 4.6company rating

    Security architect job in Dover, DE

    1. Nashville, TN 2. Austin, TX Security Architecture is comprised of security experts who are focused and specialized in securing all aspects of OCI Cloud. As security experts, we are sought out by our partner engineering organizations to provide guidance on designing their products, services and features. We set OCI wide security standards and hold a high security requirement bar for all services to ensure the highest level of security to our customers. We are currently looking for a highly motivated security engineer with expertise in Cloud security to join our team. This candidate would be involved in architecture, design, prototyping and development of the security aspects of Oracle Cloud's products and services. You should be a security-minded leader who can work with architects and/or a development team as they design new capabilities to ensure that security requirements are set and the design implements the necessary controls to increase security posture for the service. As a member of the Security Architecture team, you will be required to have a firm grasp on security technologies, trends in cloud security practices, and ability to communicate complex technical security requirements clearly to the development teams, risk assessment, risk mitigation and security tools/automation. **Responsibilities** Key responsibilities: + Conduct threat modeling, security architecture reviews, risk assessment and provide guidance on mitigating the identified issues. + Create and maintain technical security standards and patterns and set the benchmark for AI security requirement bar at OCI. + Stay up-to-date on the latest advancements in AI technologies and apply them to improve OCI's security posture. + Provide expert security guidance to service teams to ensure their products, services and feature are secure by default. + Lead OCI-wide cloud security initiatives to enhance overall cloud security posture. + Provide mentorship to junior engineers on the team. Qualifications: + A minimum of 8+ years of experience with at least 5+ years in Cloud Security required and 2+ years in AI and ML is good to have. + Or a BS or MS in Computer Science/Engineering with a focus on AI/Security, or a related field with a minimum of 8 years of experience in the field is required. + Experience in architecture, design, deployment, and handling of standard security practices and policies is required. Preferred qualifications includes, + A strong background in AI, machine learning, and deep learning. + Experience in applying AI technology to security domain. + Experience as a security leader for a cloud product or set of cloud services, with expertise in IaaS, PaaS. + Experience with architecture security reviews for products or services operating in a cloud environment, especially those which are reliant on homegrown or third-party LLMs and APIs is a plus. + Expertise in concepts of Multi-tenancy, Cloud Security and Virtualization, Access Management, OAuth, Cloud SSO, Identity Provisioning, Identity Governance etc. + Expertise in Encryption, Key management, Cybersecurity fundamentals (e.g., access controls, common software vulnerabilities, and security best practices), Deployment Methodologies, and Security Standards Compliance Certification (STIG, FedRAMP, PCI-DSS), etc. + Very good understanding of concepts related to Docker, Container, Serverless Computing, and Kubernetes. + Ability to design large scalable systems for cloud customers with focus on security. + Network security, VPN/Firewalls and software-defined networking experience is a plus. + Experience operating within and supporting a security assurance and assessment program + Excellent written and verbal communication skills, strong analytical and problem-solving skills. Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $106,300 to $223,400 per annum. May be eligible for bonus and equity. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC4 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $106.3k-223.4k yearly 7d ago
  • Sr. Security Consultant - Offensive Security

    Shi 4.7company rating

    Security architect job in Dover, DE

    **About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.** **To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.** **Job Description Summary** The Senior Security Consultant - Offensive Security is a critical role within Stratascale's Adversarial Operations team who will assist in leading and supporting the development and delivery of a diverse range of continuous threat and exposure management consulting, penetration testing, and operational service programs to a portfolio of our clients. This position is remote with a Home Office setup as determined by Stratascale management. **Role Description** + Perform penetration testing against complex environments covering both external, internal, web application, and other forms of offensive security engagements. + Consult and document attack surface, threats, and vulnerability improvements based on team's overall assessment of client's environment. + Perform full assessment and threat modeling against industry best practices to identify control weaknesses and assess the effectiveness of existing controls. + Perform root cause analysis on identified vulnerabilities and attack surface weaknesses to determine technical solutions to be presented to client along with recommendations for remediations. + Collaborate with client's security teams to understand mitigation or resolutions for findings discovered by analysts. + Review threat intelligence for specific threat vectors that align with client's industry or potentially impacted by to utilize in attack path modeling. + Assist in defining, measuring, and quantifying business risk and vulnerability impacts to clients their stakeholders. + Provide subject matter expertise and technical support on remediation, cloud security, governance, compliance, and core infrastructure systems. + Assist customers with strategies, use of platforms, technical and compliance analysis, and implementing automation. + Develop and deliver governance models, security frameworks, compliance reporting, and security assessments. + Collaborate with internal sales and technical teams to support the solution sales cycle, qualify opportunities, and ensure successful solution delivery. + Identify customer needs and requirements, recommend appropriate solutions, and proactively identify areas for improvement. + Execute consulting projects by creating and completing deliverables, ensuring client needs and practice obligations are met. + Develop and deliver training content, curricula, and workforce development programs, including in-person and remote sessions. + Participate in customer and internal meetings, providing technical guidance and facilitating discussions. + Stay educated on new product technologies, industry trends, and emerging capabilities within the practice. + Develop and optimize cross practice capabilities, collaborate with peer practice leaders, and mentor other consultants. **Behaviors and Competencies** + Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication. + Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management. + Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation. + Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus. + Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence. + Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results. + Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same. + Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks. + Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion. + Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences. + Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles. + Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively. + Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving. + Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution. **Skill Level Requirements** + Expertise in planning, executing, and leading penetration tests across networks, web and mobile applications, APIs, wireless, and cloud environments, including scoping, rules of engagement, and debriefs. - Intermediate + Proficiency with offensive security methodologies and frameworks such as PTES, OWASP (WSTG/MASVS/ASVS), MITRE ATT&CK, and threat modeling to drive risk-based testing. - Intermediate + Deep hands-on experience with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation, post-exploitation, lateral movement, and data exfiltration, along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific remediation guidance. - Intermediate + Strong web application testing skills including auth flows, access control, injection, deserialization, SSRF, XXE, business logic abuse, and modern app architectures (SPAs, microservices, GraphQL, WebSockets). - Intermediate + Working knowledge of Active Directory and Azure AD attack paths (Kerberoasting, constrained/unconstrained delegation, ACL abuses, LAPS/MAPS, certificate services), and the ability to simulate realistic enterprise attack chains. - Intermediate + Proficiency with social engineering and phishing engagements, including payload development, infrastructure setup, pretexting, and measurement aligned to customer policies and legal constraints. - Intermediate + Competence in scripting and automation to accelerate testing and proof-of-concept development using Python, PowerShell, Bash, and basic Go or JavaScript as needed. - Intermediate + Ability to develop clear exploit proofs-of-concept, reproduce vulnerabilities reliably, and validate fixes; familiarity with exploit development fundamentals is a plus. - Intermediate + Strong reporting and communication skills, including writing executive summaries and technical reports with reproducible steps, risk ratings, and actionable remediation, and presenting findings to both technical and non-technical stakeholders. - Intermediate + Experience collaborating in red/purple team exercises, working with blue teams, and translating findings into detection and hardening recommendations (e.g., SIEM detections, EDR tuning, hardening baselines). - Intermediate + Familiarity with vulnerability management workflows, responsible disclosure practices, and integration of pen test results into remediation programs and retesting cycles. - Intermediate + Proficiency with productivity and documentation tools such as Word, Excel, PowerPoint, and Outlook to efficiently produce statements of work, test plans, and final reports. - Intermediate **Other Requirements** + Completed Bachelor's Degree in a related field or relevant work experience required + 5-7 years of hands-on penetration testing/red team experience delivering engagements for mid-to-large enterprises, including leading complex assessments. + Ability to travel to SHI, Partner, Customer events, and on-site testing engagements as needed. + Advanced industry certifications preferred (e.g., OSCP, OSEP, OSWE, GXPN, GPEN, CRTO, CRTP, PNPT; CISSP or CSSLP a plus). + Demonstrated understanding of legal/ethical considerations, testing authorization, and safe handling of client data The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending. Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
    $165k-205k yearly 60d+ ago
  • Security Engineer (Network Architecture) - Multiple levels!

    Noblis 4.9company rating

    Security architect job in Dover, DE

    Responsibilities We are looking for highly technical, hands-on professionals with a strong foundation in network architecture, design, and security - individuals who are ready to step up from traditional network engineering roles to take ownership of strategic, architecture-level responsibilities. Ideal candidates will have deep experience with configurations, firewall rules, network path analysis, and transitioning efforts such as IPv4 to IPv6. These are the types of professionals who understand both the big-picture architecture and the hands-on technical details, and who are prepared to make security-focused architectural recommendations in complex environments. The TIS Security Engineer will support the FAA Telecommunications and Integrated Services (TIS) Group and provide expert-level security engineering across the FAA's FTI environment. This includes: + Analyzing and guiding network architecture to ensure cybersecurity is built-in from the ground up. + Performing hands-on reviews of system configurations, firewall rules, and network paths to align with FAA Orders, NIST 800-53, and federal cybersecurity standards. + Leading efforts in transitioning technologies (e.g., IPv4 to IPv6, microwave radio refreshes) from a cybersecurity and network architecture perspective. + Supporting the integration of Zero Trust, Software-Defined Networking (SDN), and defense-in-depth strategies into enterprise-level solutions. + Acting as a technical bridge between FAA cyber stakeholders and infrastructure providers (network, security, cloud). + Evaluating vendor-proposed architectures and making expert-level recommendations based on federal policy, security principles, and industry best practices. Required Qualifications Required Qualifications: + Experience supporting federal government programs, ideally within the FAA or transportation sector. + Proven experience with hands-on network engineer or architecture and understands network design, configurations, firewalls, VPNs, IDS/IPS, and load balancing. + Knowledge of telecommunications infrastructure, including IPv4/IPv6, and WAN/LAN environments. + Understand federal cybersecurity frameworks (NIST RMF, FISMA, NIST SP 800-53 rev 5). + Can evaluate network and system security concepts for large-scale, safety-critical systems like those in the National Airspace System (NAS). + Comfortable advising on defense-in-depth architectures, Zero Trust CONOPS, SD-WANs, and emerging tech. + Have experience collaborating with engineers, PMs, and cybersecurity stakeholders to support ATO packages and continuous monitoring. + Ability to develop system security plans, risk assessments, and related security documentation. + U.S. Citizenship or Permanent Residency with 3+ years U.S. residency. Minimum Qualifications Junior Level + Bachelor's degree in Cybersecurity, Information Technology, Telecommunications, or a related field. + 6+ years of experience in cybersecurity or network security roles + Substitutions: For anything requiring a substitution, the government customer is subject to further review and either approve or deny the request. + A high school degree with a total of 12 years of experience in cybersecurity or network security roles + Masters degree with a total of 3 years of experience in cybersecurity or network security roles. Compensation Ranges: for D.C., NJ, Remote: $84,700 - 132,325 Mid-level + Bachelor's degree in Cybersecurity, Information Technology, Telecommunications, or a related field. + 9+ years of experience in cybersecurity or network security roles + Substitutions: For anything requiring a substitution, the government customer is subject to further review and either approve or deny the request. + A high school degree with a total of 15 years of experience in cybersecurity or network security roles + Masters degree with a total of 6 years of experience in cybersecurity or network security roles. Compensation Ranges: for D.c., NJ, Remote: $102,500 - $160,100 Mid-Senior Level + Bachelor's degree in Cybersecurity, Information Technology, Telecommunications, or a related field. + 12+ years of experience in cybersecurity or network security roles + Substitutions: For anything requiring a substitution, the government customer is subject to further review and either approve or deny the request. + A high school degree with a total of 18 years of experience in cybersecurity or network security roles + Masters degree with a total of 9 years of experience in cybersecurity or network security roles Compensation Ranges: for D.C., NJ, Remote: $102,500 - $160,100 Senior Level + Bachelor's degree in Cybersecurity, Information Technology, Telecommunications, or a related field. + 16+ years of experience in cybersecurity or network security roles + Substitutions: For anything requiring a substitution, the government customer is subject to further review and either approve or deny the request. + A high school degree with a total of 22 years of experience in cybersecurity or network security roles + Masters degree with a total of 13 years of experience in cybersecurity or network security roles Compensation Ranges: for D.C., NJ, Remote: $124,000 - $193,750 Desired Qualifications Desired Skills & Experience + CISSP, Security+, CCNA, or similar certification. + FAA or transportation sector experience preferred. + Familiarity with Zero Trust Architecture, Security Orchestration, and network virtualization (e.g., NFV). + Strong written, verbal, and interpersonal skills. Overview Noblis (*********************** and our wholly owned subsidiaries, Noblis ESI , and Noblis MSD tackle the nation's toughest problems and apply advanced solutions to our clients' most critical missions. We bring the best of scientific thought, management, and engineering expertise together in an environment of independence and objectivity to deliver enduring impact on federal missions. Noblis works with a wide range of government clients in the defense, intelligence and federal civil sectors. Learn more at Noblis -About Us (***************************************** **Why work at a Noblis company?** Our employees find greater meaning in their work and balance the other things in life that matter to them. Our people are our greatest asset. They are exceptionally skilled, knowledgeable, team-oriented, and mission-driven individuals who want to do work that matters and benefits the public. Noblis has won numerous workplace awards (************************************ . Noblis maintains a drug-free workplace. * _Remote/hybrid status is subject to change based on Noblis and/or government requirements_ Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to race, color, ethnicity, sex, age, national origin, religion, physical or mental disability, pregnancy/childbirth and related medical conditions, veteran or military status, or any other characteristics protected by applicable federal, state, or local law. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact us (*************************************** . EEO is the Law (************************************************* | E-Verify (********************************************************************************************************************** | Right to Work (**************************************************************** Total Rewards At Noblis we recognize and reward your contributions, provide you with growth opportunities, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, and work-life programs. Our award programs acknowledge employees for exceptional performance and superior demonstration of our service standards. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in our benefit programs. Other offerings may be provided for employees not within this category. We encourage you to learn more about our total benefits by visiting the Benefits (************************************* page on our Careers (**************************** site. Compensation at Noblis is determined by various factors, including but not limited to, the combination of education, certifications, knowledge, skills, competencies, and experience, internal and external equity, location, clearance level, as well as contract-specific affordability, organizational requirements and applicable employment laws. The projected compensation range for this position is based on full time status. For part time or on-call staff, compensation is proportionately adjusted based on hours worked. While monetary compensation is important, it's just one component of Noblis' total compensation package. Posted Salary Range USD $86,800.00 - USD $135,625.00 /Yr.
    $124k-193.8k yearly 50d ago
  • Security Engineer

    CVS Health 4.6company rating

    Security architect job in Dover, DE

    At CVS Health, we're building a world of health around every consumer and surrounding ourselves with dedicated colleagues who are passionate about transforming health care. As the nation's leading health solutions company, we reach millions of Americans through our local presence, digital channels and more than 300,000 purpose-driven colleagues - caring for people where, when and how they choose in a way that is uniquely more connected, more convenient and more compassionate. And we do it all with heart, each and every day. **Position Summary** The Epic Environment Management Analyst supports the Epic Electronic Health Record (EHR) environments across Retail Healthcare, Payor, and Specialty organizations. Supported Epic environments include production, testing, training, and lower environment systems. The Epic Environment Management Analyst is part of a team serving as the central point of coordination for changes, updates, and upgrades to ensure system stability and operational efficiency. Must exhibit a professional attitude, communication style, and presence. **Required Qualifications** Experience: Typically requires 1-3 years of experience in healthcare IT, with some experience specifically supporting Epic environments and upgrades. Technical Expertise: Demonstrated experience with Epic software, including environment management, build tracking, and change control processes using tools like Data Courier and Content Management. Certification: Relevant Epic certifications (e.g., Data Courier, Bridges) are often preferred. ITIL certification is also a common preference. Key skills: Strong preference for self-directed learning, multi-tasking, organizational, communication, and IT project management skills. Environment and Change Management Support multiple environments: Coordinate the day-to-day operations and maintenance of multiple Epic environments, such as production, disaster recovery, training, and testing. Coordinate Updates and Upgrades: Participate in the planning, coordination, and execution of Epic updates (SU), version upgrades, and regular maintenance. Advocate Change Control Processes: Implement and assure adherence to change control processes for the Epic system, including build migration using Epic's Data Courier and Content Management tools. Coordinate System Activities: Organize key activities including environment refreshes and data migrations. Collaboration and Communication Act as a Liaison: Serve as a bridge between Epic application teams, infrastructure teams, third-party hosting vendors, and Epic representatives. Host and Facilitate Meetings: Coordinate meetings for the Change Control Board and other workgroups to ensure alignment and communication. Communicate Effectively: With minimal manager supervision, draft, prepare and disseminate structured communications to technical teams and end-users regarding upcoming changes, downtimes, and other environment activities. Coordinate with Vendors: Participate in healthy vendor relationships and serve as a point of contact for technical issues and inquiries. Monitoring and Support Track and Document: Maintain documentation for environment versions, patch levels, and maintenance schedules, in systems such as Atlassian Confluence. Monitor Performance: Participate in Epic system performance and troubleshoot issues related to Data Courier and Content Management. Review Epic Communications: Analyze and act on Patient Safety Escalations (PSE), Care Concern Bulletins (CCB), and Nova documentation from Epic. Support testing: Collaborate with Quality Assurance (QA) teams on application and integrated testing for system upgrades. Coordinate downtime: Participate in the planning and testing of downtime and disaster recovery procedures. General Demonstrate ability to integrate into multiple work teams. Responsible for understanding the technological advances and innovations available in the healthcare industry. Promotes individual professional growth and development by meeting requirements for mandatory/continuing education, skills competency, supports department-based goals which contribute to the success of the organization, serves as a customer resource. **Preferred Qualifications** CISSP **Education** Degree in Information Technology, Computer Science, or a related field; or comparable industry and vendor-provided Certifications **Anticipated Weekly Hours** 40 **Time Type** Full time **Pay Range** The typical pay range for this role is: $64,890.00 - $173,040.00 This pay range represents the base hourly rate or base annual full-time salary for all positions in the job grade within which this position falls. The actual base salary offer will depend on a variety of factors including experience, education, geography and other relevant factors. This position is eligible for a CVS Health bonus, commission or short-term incentive program in addition to the base pay range listed above. Our people fuel our future. Our teams reflect the customers, patients, members and communities we serve and we are committed to fostering a workplace where every colleague feels valued and that they belong. **Great benefits for great people** We take pride in our comprehensive and competitive mix of pay and benefits - investing in the physical, emotional and financial wellness of our colleagues and their families to help them be the healthiest they can be. In addition to our competitive wages, our great benefits include: + **Affordable medical plan options,** a **401(k) plan** (including matching company contributions), and an **employee stock purchase plan** . + **No-cost programs for all colleagues** including wellness screenings, tobacco cessation and weight management programs, confidential counseling and financial coaching. + **Benefit solutions that address the different needs and preferences of our colleagues** including paid time off, flexible work schedules, family leave, dependent care resources, colleague assistance programs, tuition assistance, retiree medical access and many other benefits depending on eligibility. For more information, visit ***************************************** We anticipate the application window for this opening will close on: 02/09/2026 Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state and local laws. We are an equal opportunity and affirmative action employer. We do not discriminate in recruiting, hiring, promotion, or any other personnel action based on race, ethnicity, color, national origin, sex/gender, sexual orientation, gender identity or expression, religion, age, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law.
    $64.9k-173k yearly 1d ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Security architect job in Dover, DE

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 15d ago
  • Information Security Engineer

    Eliassen Group 4.7company rating

    Security architect job in Dover, DE

    **Anywhere** **Type:** Contract **Category:** DevOps **Industry:** Financial Services **Workplace Type:** Remote **Reference ID:** JN -102025-104054 **Shortcut:** ****************************** ISZ5 + Description + Recommended Jobs **Description:** Large Banking client headquartered in Cincinnati, OH. _Due to client requirements, applicants must be willing and able to work on a w2 basis. For our w2 consultants, we offer a great benefits package that includes Medical, Dental, and Vision benefits, 401k with company matching, and life insurance._ _Rate: $60 - $72 / hr. w2_ **Responsibilities:** **MUST HAVE SKILLS** - Cloud - Customer/Digital identity and access man - Ping Directory - Ping Federate **NICE TO HAVE SKILLS:** - DevOps - Java Development experience This individual will be responsible for defining, delivering, and supporting customer identity and access management (IAM) solutions with a focus on Ping Directory and related Ping Identity products. The candidate will collaborate closely with the IT Engineering and Information Security teams to design scalable, secure, and high-performance directory services. They will also contribute to broader IS initiatives and support ongoing operations within the Information Security department. The candidate will be focused on securing identity infrastructure through the implementation and management of Ping Directory and associated tools. Responsibilities include directory architecture, schema design, replication strategies, performance tuning, and integration with authentication and authorization systems. Responsible and accountable for risk by openly exchanging ideas and opinions, elevating concerns, and personally following policies and procedures as defined. Accountable for always doing the right thing for customers and colleagues and ensures that actions and behaviors drive a positive customer experience. While operating within the Bank's risk appetite, achieves results by consistently identifying, assessing, managing, monitoring, and reporting risks of all types. **ESSENTIAL DUTIES & RESPONSIBILITIES:** + Design, implement, and maintain Ping Directory infrastructure to support customer identity services. + Define security and performance requirements for directory services and IAM integrations. + Serve as a subject matter expert and consultant on identity-related projects. + Collaborate with IT and IS teams to integrate Ping Directory with authentication, SSO, and federation solutions. + Monitor and optimize directory performance, replication, and availability. + Develop and maintain standards, procedures, and guidelines for directory services and IAM operations. + Conduct root cause analysis and remediation of identity-related incidents and vulnerabilities. + Support audits and compliance efforts by providing technical documentation and evidence of controls. + Stay current with identity security threats, technologies, and best practices. + Participate in risk assessments and recommend improvements to identity infrastructure. + Provide technical leadership and mentoring to junior engineers and offshore teams. **Experience Requirements:** **MINIMUM KNOWLEDGE, SKILLS & ABILITIES REQUIRED:** + Bachelor's degree in computer science, Information Systems, or equivalent experience. Master's degree a plus. + 8+ years of IT experience, with at least 4 years focused on Ping Directory or similar LDAP-based directory services. + Strong understanding of identity and access management principles, including authentication, authorization, and federation. + Experience with Ping Identity suite (PingDirectory, PingFederate, PingAccess, PingOne). + Experience consuming and integrating on prem or hybrid cloud to AWS (or similar cloud platform). + Proficiency in Unix/Linux. + Familiarity with scripting languages (e.g., Shell, Python) for automation and integration. + Solid understanding of distributed computing and directory replication strategies. + Knowledge of application and data security concepts and common vulnerabilities. + Experience working with offshore teams and in regulated industries (e.g., financial services) is a plus. + Industry certifications such as CompTIA Security+, CISSP, or Ping Identity certifications preferred. + Excellent communication skills, both verbal and written, with the ability to tailor messaging to technical and non-technical audiences. _Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range._ _W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality._ _Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact ********************._ _About Eliassen Group:_ _Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate._ _Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status._ _Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!_
    $60-72 hourly 21d ago
  • Lead Security Engineer

    Jpmorgan Chase & Co 4.8company rating

    Security architect job in Wilmington, DE

    JobID: 210663638 JobSchedule: Full time JobShift: Day Base Pay/Salary: Jersey City,NJ $152,000.00-$215,000.00 Take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future of software security at one of the world's largest and most influential companies. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity technology & Controls, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. Job responsibilities * Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions and break down technical problems * Build and maintain ETL/ELT pipelines and data models, an example pipeline being ingesting data from multiple Cyber Intelligence vendor sources * Develops secure and high-quality production code and reviews and debugs code written by others * Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls * Works with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability * Conducts discovery, vulnerability, social engineering, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase network * Adds to team culture of diversity, opportunity, inclusion, and respect Required qualifications, capabilities, and skills * Obtain 6+ years of equivalent experience with a Bachelor's degree in Computer Science, Engineering, or a related field with proven work experience as a Software Engineer. * Extensive experience with one or more visualization and report automation Business Intelligence tools such as Qlik (preferred), Splunk, Tableau, PowerBI and business objects. * Experience in data integration and data modelling through extracting, transforming, and loading (ETL) data from various sources required, with strong proficiency in SQL required. * Experience of Python/ PowerShell/ JavaScript/ HTML Scripting or building QS Mashups or Extensions. * Develop and integrate RESTful APIs to support business logic and third-party integrations. * Experience in dashboard UI design and best practices. * Proficient in all aspects of the Software Development Life Cycle * In-depth knowledge of the financial services industry and their IT systems Preferred qualifications, capabilities, and skills * Excellent problem-solving skills, attention to detail, and ability to work independently or as part of a team. * Strong communication and interpersonal skills, with the ability to effectively collaborate with stakeholders at all levels, provide training, and solicit feedback. #CTC
    $152k-215k yearly Auto-Apply 58d ago
  • Cyber Incident Handling Analyst

    Peraton 3.2company rating

    Security architect job in Delaware

    Responsibilities Peraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E). This role supports integrated cyber defense efforts by coordinating security toolsets to sustain continuous monitoring and ongoing authorization programs. You will: Monitor, analyze, and act on SIEM alerts and events to detect malicious activities across information systems and networks as part of a dedicated, rotating 24/7 incident response team to ensure continuous operational coverage. Work on first, second, or third shift on a rotation to accomplish the duties and responsibilities. Support dynamic cyber defense operations by coordinating security toolsets and adhering to the Department of Defense framework for measuring and quantifying cyber risk. Conduct threat and vulnerability analysis by evaluating network and host activity against baseline requirements, researching security standards, reviewing vulnerability findings related to SIEM alerts, and analyzing system logs for indicators of malicious intent. Manage incident response by documenting and classifying incidents (in accordance with Army and DoD regulations), determining root causes, coordinating remediation efforts, and performing post-intrusion analyses to identify detection gaps; Communicate effectively by providing timely incident updates and daily reports to higher headquarters and Defensive Cyber Operations staff, and by preparing visual charts, diagrams, and comprehensive reports to support metrics analysis and enhance cybersecurity posture. Optimize detection capabilities by developing specialized SIEM queries, tuning IDS/IPS rules to reduce false positives, and documenting identified vulnerabilities for operational integration. Provide team and customer support by assisting various sections of the Defensive Cyber Operations team and conducting in-depth network security evaluations at customer sites. Advanced Analysis and Expert Responsibilities: Utilize SIEM technologies for advanced cyber forensics to detect and deter malicious actors targeting networked weapons platforms and U.S. DoD networks. Analyze host and network events to assess operational impact and advisory capabilities. Develop analytics based on indicators of compromise and perform forensic investigations by dissecting host data to determine the root causes, tactics, techniques, and tools used in cyber intrusions. Prepare high-quality strategic reports, presentations, and recommendations for senior U.S. government intelligence and network operations officials. Qualifications Minimum Requirements: LU Minimum of 2 years' experience in Cyber Systems Engineering with a Bachelor's degree in a STEM field; High School and a minimum of 6 years of experience instead of degree may be considered. Must be able to qualify for Technical Expert Status Accreditation (TESA) by having a bachelor's degree in a STEM field plus 3 years of specialized experience OR an associate's degree plus 7 years of specialized experience OR a major certification plus 7 years of specialized experience. Active DoD Approved 8140 Certifications in three categories: DCWF: 531 Intermediate (IT related B.S. or one of the following: Cisco CyberOps Pro, CCSP, CEH, Cloud+, FIRSP-O, GCED, GCIH, GISF, GSEC, PenTest+, Security+, or DCWF 531 Advanced Certification), DCWF: 511 Intermediate (IT related B.S. or one of the following: Cloud+, GCED, GFACT, GISF, GSEC, PenTest+, Security+, or DCWF 511 Advanced Certification), and 8140 Residential certification within 90 days of hire (Cisco CyberOps Pro, a SANS GIAC Cert, Blue Team level 1, or Microsoft Certified: Security Operations Analyst Associate). Fluent in all aspects of government and corporate communications media to include all MS Office products and common task ticketing systems. U.S. citizenship required. An Active DoD Top Secret/SCI security clearance. Preferred Qualifications: Experience with the Elastic SIEM. Experience in Microsoft MDE, XDR, or Sentinel. Experience in packet captures and analyzing a network packet. Experience with intrusion detection systems such as Snort, Suricata, and Zeek. Experience with Microsoft Windows event IDs. Experience with Linux audit log analysis. Familiarity with Git and VScode. Strong understanding of adversary tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework. Experience with one or more scripting languages such as PowerShell, Bash, Python. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $66,000 - $106,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $66k-106k yearly Auto-Apply 2d ago
  • Senior Cloud Security Engineer

    Navient 4.1company rating

    Security architect job in Dover, DE

    **Our mission is to make higher education accessible and affordable for everyone.** We empower students with financial support and supercharge their ability to pay down their debt, so they can get on the right financial track, fast. We build tools that help people feel in control of their financial future, including: + **Private student loans** - low rates, people-first service, and flexible payments. + **Student loan refinancing** - break free from high-interest rates or monthly payments. + **Scholarships** - access to thousands of scholarships to help students pay less. Earnies are committed to helping students live their best lives, free from the stress of student debt. If you're as passionate as we are about our mission, read more below, and let's build something great together! **The Senior Cloud Security Engineer position will report to the Head of Security.** **As the Senior Cloud Security Engineer, you will:** + Partner with Infrastructure Engineering to align security controls with architecture, participating in design reviews and threat modeling sessions. + Lead infrastructure-focused security initiatives that strengthen system resilience, like backup integrity and network access control. + Manage and tune web protection platforms including WAF, bot mitigation, and DDoS tools, collaborating with teams to harden externally exposed services and reduce false positives. + Operate and maintain cloud-native security tools including CSPM, XDR, DLP, and CASB to protect sensitive data, detect cloud threats, secure SaaS usage, and enforce secure cloud configurations. + Apply secure configuration baselines across AWS, Kubernetes, and containerized environments, integrating them into IaC workflows and CI/CD pipelines to support secure-by-default deployments. + Implement secure access technologies including VPNs, remote access, identity-aware proxies, and zero-trust networking solutions, tightly integrating IAM and monitoring across AWS and SaaS platforms. + Build and maintain infrastructure telemetry pipelines that feed SIEM, and IDS platforms, correlating events with vulnerability scanning data and tuning detections in collaboration with Security Operations. + Automate control enforcement using policy-as-code and integrate cloud telemetry with GRC platforms to streamline compliance workflows and evidence collection. **About You:** + 6+ years of experience in security engineering, infrastructure security, or cloud security roles. + 2+ years focused on AWS cloud environments, including security tooling and service hardening. + Hands-on experience with SIEM, CSPM, XDR/EDR, CASB, vulnerability scanners, WAF, and DNS filtering. + Strong scripting or programming experience (Python, Go, Shell, or equivalent). + Familiarity with IaC and cloud automation tools (e.g., Terraform, Ansible, CloudFormation). **Even Better:** + Professional security certifications (e.g., AWS Security Specialty, GCLD, CCSP, CCSK). + Experience with container runtime security and Kubernetes RBAC controls. + Familiarity with immutable infrastructure concepts and backup resiliency practices. + Working knowledge of regulatory frameworks like SOC 2, FFIEC, GLBA, or NY DFS. + Experience supporting detection infrastructure and compliance automation. **Where:** + This role will be based in the US. \#LI-NS1 A little about our pay philosophy: We take pride in compensating our employees fairly and equitably. We are showcasing a range of your potential base salary based on the roles location. The successful candidate's starting pay will also be determined based on job-related qualifications, internal compensation, candidate location and budget. This range may be modified in the future. Pay Range $158,000-$198,000 USD **Earnest believes in enabling our employees to live their best lives. We offer a variety of perks and competitive benefits, including:** + Health, Dental, & Vision benefits plus savings plans + Mac computers + work-from-home stipend to set up your home office + Monthly internet and phone reimbursement + Employee Stock Purchase Plan + Restricted Stock Units (RSUs) + 401(k) plan to help you save for retirement plus a company match + Robust tuition reimbursement program + $1,000 travel perk on each Earnie-versary to anywhere in the world + Competitive days of annual PTO + Competitive parental leave **What Makes an Earnie:** At Earnest, our people bring our cultural principles to life. These principles define how we work, how we win, and what we expect of ourselves and each other: + **Every Second Counts** : Speed is our competitive advantage. Our customers need better solutions, and the faster we execute, the greater our chance of success. + **Choose To Do Hard Things** : We win by tackling the hard things that others avoid, fueled by grit and resilience. + **Pursue Excellence** : Great companies, teams, and individuals never settle and are proud of the work that they do. What's good enough today won't be good enough tomorrow. Excellence isn't a destination; it's a mindset of continuous improvement. + **Lead Together** : Our success comes from how we work together. Leadership is not about titles-it is about action. We take ownership, drive results, and move forward as a team. + **Don't Take Yourself Too Seriously** : We take our work seriously, not ourselves. The stakes are high, but a sense of humor keeps us grounded, creative, and resilient. **At Earnest, we are committed to building an environment where our employees feel included, valued, and heard. Our belief is that a strong commitment to diversity, inclusion, equity, and belonging enables us to move forward with our mission. We are dedicated to adding new perspectives to the team and encourage anyone to apply if your experience is close to what we are looking for.** _Earnest provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, gender identity, veteran status, disability or genetics. Qualified applicants with criminal histories will be considered for the position in a manner consistent with the Fair Chance Ordinance._
    $158k-198k yearly 60d+ ago
  • Digital Security Expert (m/f/d)

    Mahle, Inc.

    Security architect job in Delaware

    BU1 Powertrain and Charging Your Contribution As a Digital Security Expert (m/f/d), you are responsible for identifying and assessing the impact of IT system disruptions on business operations. * Supporting the creation and further development of business continuity and recovery plans for processes and IT systems * Identifying security-related risks and serving as the point of contact for security incidents at the site * Ensuring the implementation of defined security measures and policies * Responsibility for local OT asset management * Optimizing the OT security strategy at the site and supporting IT/OT projects * Regularly conducting self-assessments and coordinating and conducting external audits to establish and ensure standards Your Experience and Qualifications * Successfully completed degree (engineering, computer science) or comparable qualification, e.g., as an IT specialist for system integration with a specialization in IT security or as a state-certified technician * Professional experience in the areas of IT, production IT (OT), IT security, and/or network technology * Independent and structured working style, strong organizational skills * High level of initiative, sense of responsibility, resilience, flexibility, and ability to work in a team * Confident communication skills in both German and English #TeamMAHLE is diverse and we see that as a great advantage! We welcome applications with diverse experiences, backgrounds and identities. Do you have any questions? ********************* +49 711 5011 4717 DE Facts about the job Benefits: Benefits-DE/FH_PE_AP_TR_SP_DI_RE Entry level: Experienced hires Part- / Full-time: Full Time Functional area: IT Department: BU1 Powertrain and Charging Location: Wölfersheim, DE, 61200 Company: MAHLE Ventiltrieb (DE) Closing date for applications Don't waste any time, apply while the position is online. Your future at MAHLE As a team player and someone who thinks ahead, you can deploy all your skills with us. In cooperation with colleagues from different countries and areas, you contribute in designing the mobility of the future. When selecting MAHLE, you choose trend-setting technologies and strategies. Are you interested in working with us and developing efficient and environmentally-friendly solutions, optimising existing products, and turning innovative ideas into reality? Then MAHLE is the right address for you. Shape the future with us.
    $84k-122k yearly est. Easy Apply 47d ago
  • Mainframe Security Engineer

    Ensono 4.4company rating

    Security architect job in Dover, DE

    Mainframe Security EngineerRemote - United StatesJR012476 **Requirements:** + U.S. Citizenship is required. + Must pass a Federal Background Check. **Key Responsibilities:** + Administer security for RACF, ACF2, and Top Secret logon IDs, datasets, and resource rules. + Provision user access in response to ServiceNow tickets within defined SLAs. + Monitor system security policies and investigate violations/incidents. + Perform and review daily, weekly, and monthly audit reports. + Liaise with business units and technical support teams. + Prepare ad hoc reports and deliver presentations for customer support. + Ensure adherence to security standards across the environment. + Provide 24×7 on-call support as required. + Utilize Vanguard and/or IBM zSecure security products. + iSeries security knowledge is a plus. + Manage and lead large projects or tasks as needed. + Project management skills are highly desired. **Technical Skills:** + Proficient in TSO, JCL, IBM Utilities, JES2, and ISPF. + Experience with REXX or other programming languages is desired. + CICS security administration experience preferred. + Experience with Vanguard and/or IBM zSecure security products is desired. + Familiarity with IAM (Identity Access Management), MFA (Multi-Factor Authentication), and PAM (Privileged Access Management) is desired. + Strong PC skills, including Microsoft Outlook, Word, Excel, and PowerPoint. **General Knowledge:** + z/OS experience is highly desired. + Knowledge of other mainframe security products is a plus. **Personal Skills:** + Strong written and verbal communication skills. + Excellent organizational skills with the ability to manage multiple concurrent projects and work as part of a global team. + Ability to work independently and take initiative. + Strong analytical and problem-solving skills. + Effective team player who can work independently in a fast-paced environment. + Self-starter, detail-oriented, and able to multitask. **Education & Certifications:** + Bachelor's or Master's degree preferred. + CISSP, CISA, CISM, or ITIL certification is a plus. **Why Ensono?** Ensono is a place to make better happen - for our clients and for your career. You can do great things through innovation or collaboration, by learning or volunteering, or to promote diversity and inclusion. You can do great things for your own health or for a healthier planet. Whatever it means to you to do great things we want Ensono to be the place you can do it. We are a client-facing business, but we do encourage clients to allow us to work remotely most of the time so if you are not required to be on a client site, you can choose to work from home or in our Ensono offices. Some of our benefits include: + Unlimited Paid Days Off + Three health plan options through Blue Cross Blue Shield + 401k with company match + Eligibility for dental, vision, short and long-term disability, life and AD&D coverage, and flexible spending accounts + Paid Maternity Leave, Paternity Leave, and Sabbatical Leave + Education Reimbursement, Student Loan Assistance or 529 College Funding + Enhanced fertility coverage + Wellness program + Depending on location, ability to take Flexible work schedule + Advantage of fitness centers As of the date of this posting, a good faith estimate of the current pay scale for this role is **$90,000 to $135,000** annually based on a full-time schedule. Please note that placement in the range may vary based on numerous factors including but not limited to skills, experience, internal equity, and business needs. In addition to base salary, other compensation programs, depending on eligibility, include an annual bonus plan based on company and individual performance and an equity grant under our Associate Equity Appreciation Program. Ensono is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment to our Associates and building a diverse and inclusive workforce. All qualified applicants will be considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or other legally protected basis, in accordance with applicable law. Pay transparency nondiscrimination statement/posting OFCCP's pay transparency policy can be found on OFCCP's website (*********************************************************************************************** . If you need accommodation at any point during the application or interview process, please let your recruiter know or email ****************************** . JR012476
    $90k-135k yearly 2d ago
  • Security Engineer- CTH

    Pyramid It

    Security architect job in Wilmington, DE

    Pyramid is a leading Information Technology Consulting services company headquartered in metropolitan Atlanta, GA with prime emphasis on the following service offerings: • Staff Augmentation • Lifecycle IT solutions o Application Development & Support o Outsourced Testing • Mobile Development and Test Automation The company was incorporated in the State of Georgia in 1996 and has grown to over 2500 Information Technology consultants serving clients across the United States and around the globe. In addition to Atlanta, Pyramid has offices worldwide including Charlotte, NC; Chicago, IL; Dallas, TX; Richmond, VA; San Francisco, CA and Somerset, NJ in the United States, London in the United Kingdom, Singapore, and three offices in India (New Delhi, Hyderabad and Chandigargh). Pyramid has been ranked by Staffing Industry Analysts as one of the largest diversity staffing firms specializing in IT and among the fastest growing U.S. staffing firm overall. In addition, Pyramid is a previous winner of the National Minority Supplier Development Council's Supplier of the Year and has won numerous Supplier of the Year awards from the Georgia Minority Supplier Development Council. see less Specialties IT Staff Augmentation, Application Management Services, Enterprise Project Solutions, Mobile Development, Mobile Test Automation, Product and Engineering Services, Enterprise Mobility, Test Automation, QA - Manual and Automated Testing, QA Strategy Website ************************ Industry Information Technology and Services Type Privately Held Company Size 1001-5000 employees Founded 1996 Job Description Description - · We need a Security Engineer who can provide clear and concise security requirements that meet corporate direction. · CISSP certification must Additional Information All your information will be kept confidential according to EEO guidelines.
    $87k-120k yearly est. 20h ago
  • Lead Security Engineer- Big Data Architecture

    JPMC

    Security architect job in Wilmington, DE

    Join our team to take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity and Tech Controls team, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. Job responsibilities Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions and break down technical problems. Develops secure and high-quality production code and reviews and debugs code written by others. Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls. Works with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability. Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase network. Works across customer engineering teams to help apply our framework and applications to their problem domain. Prototypes and recommends changes and additions to system components based on engineering customer experiences. Focuses on an integrated system approach to delivery versus ad-hoc add- ons to the architecture; looks for commonality and patterns in the needs of the engineering teams. Required qualifications, capabilities, and skills Formal training or certification on software engineering concepts and 5+ years applied experience. Skilled in planning, designing, and implementing enterprise level security solutions. Advanced in one or more programming languages like Java or Python. Proficient in all aspects of the Software Development Life Cycle. Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security. Understand requirements management processes for highly regulated environments. Cloud experience (AWS, Azure) and delivery mechanisms such as Terraform. Kubernetes and related tooling experience. Experience with threat modeling, discovery, vulnerability, and penetration testing. In-depth knowledge of the financial services industry and their IT systems. Experience with big data platforms and technologies such as Apache Flink, Apache Spark, Trino, Kafka, Apache Iceberg. Preferred qualifications, capabilities, and skills Experience effectively communicating with senior business leaders. Experience with Data Lake and Lake House Architectures and tooling.
    $87k-120k yearly est. Auto-Apply 45d ago
  • Advanced Security Engineer - Cyber Security

    Relativity Oda 4.7company rating

    Security architect job in Delaware

    Posting Type Remote As an Advanced Cyber Security Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities. Job Description and Requirements Responsibilities: Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources. Assess the impact of security events by leveraging host, cloud, and network-based indicators and evidence to deliver actionable incident escalations. Act as the initial point of escalation for cyber security events and drive investigation to completion. Perform accurate and in-depth near real-time analysis of correlated logs and alerts from a multitude of devices with a focus on the classification of events that constitute security incidents. Proactively and iteratively search through collected telemetry to detect and isolate advanced threats that evade existing security solutions. Assist in the development of incident handling policies and procedures to align with global industry standards. Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment. Serve as a subject matter expert in the mechanism and analysis of observed malicious activity. Perform consistent tuning of alerting and provide support to junior team members in detection engineering Maintain security infrastructure and take accountability for ensuring the tooling configuration is updated as required Assist on projects as and when required Preferred Qualifications: Bachelor's Degree (or equivalent professional/military experience) 3+ years of experience in Incident Response, Incident Analysis, or Computer Forensics Familiarity with industry standard security devices and their configuration Exposure to the analysis of malicious code to explore infection and propagation mechanisms Experience leveraging scripting languages to solve for information security use cases Outstanding work ethic with a passion for Cyber Security Certifications: One of more of the following certifications are preferred (GCFA, GCIA, GCIH, GCFA, GNFA, GREM, OSCP, or CEH) Experience working in a SaaS environment operating on a global scale. Experience in the legal space and with a high understanding of e-discovery and litigation. Experience working with cloud environments such as Azure, GCP, or AWS. Minimum Qualifications: Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Working knowledge of TCP/IP, network services, cryptography and web application attacks Ability to collaborate within a cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Understanding of methods and tools utilized by attackers to access private systems and data Capability to independently manage the prioritization of complex events Understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls. Relativity is committed to competitive, fair, and equitable compensation practices. This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives. The expected salary range for this role is between following values: $104,000 and $156,000 The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position.
    $77k-100k yearly est. Auto-Apply 21d ago
  • Principal Data Center Security Systems Engineer

    Insight Global

    Security architect job in Middletown, DE

    Insight Global is seeking an experienced, driven Principal Security Systems Engineer to join a growing AI and GPU infrastructure start-up based in SF, NYC, or Seattle. This is a full-time, permanent role with competitive salary, bonus, equity, and benefits. In this role, the Principal Data Center Security Systems Engineer will lead and design the multi-layer physical security stack that protects this company's data. This engineer's work spans perimeter hardening to rack-level tamper detection, all integrated into a zero-trust monitoring framework. Day-to-day responsibilities: - Manage all aspects of the security system for data centers coordinating with all other discipline requirements - Create strategy for data center security system design and deployment - Develop security system standards in compliance with US - DoD and other international standards - Develop and maintain the basis of design, master specification, master drawings - Facilitate developing project specific drawings and documentation based on the master design with local adaptation working with external design consultants - Engineer access-control, CCTV, intrusion-detection and biometric systems to meet SOC 2 & ISO 27001 - Create zoning and mantrap layouts, badge/biometric authentication flows and visitor-management SOPs - Specify encryption and retention policies for video, logs and alarms - Integrate security events into DCIM and corporate SIEM platforms - Drive resiliency (dual-path comms, battery backup) and regular penetration-test programs We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** . To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** . Skills and Requirements - 10+ years designing hyperscale / enterprise or mission-critical physical-security systems. - Deep knowledge of ONVIF, SIA DC-09, OSDP, Wiegand, BACnet. - Experience with Genetec, LenelS2, Honeywell or Avigilon ecosystems. - CISSP-ISSAP or PSP certification is desirable
    $79k-111k yearly est. 60d+ ago

Learn more about security architect jobs

Do you work as a security architect?

What are the top employers for security architect in DE?

Top 3 Security Architect companies in DE

  1. Baylor Scott & White Health

  2. Lumina Foundation

  3. PSI Services

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security architect jobs in delaware by city

All security architect jobs

Jobs in Delaware