Security Architect - Consultant
Security architect job in Columbia, SC
Duration: 12 Months (Possible Extension)
Interview Type: Initial Microsoft Teams (on camera); final in-person
Candidate must be a CURRENT resident in the Columbia, SC area. Candidates local to Columbia are highly preferred however the manager is open to accepting resources within 125 miles from the zip code 29118 that will relocate to Columbia at the start of the role at their own expense. (Candidates outside of this area will not be considered). No relocation allowed.
Key Responsibilities
Implement and manage Identity and Access Management (IAM) solutions including Single Sign-On, Multi-Factor Authentication, and Active Directory integration.
Develop automation for security and IT tools using scripting languages such as Python and Bash.
Plan, design, and deploy enterprise-level security solutions and countermeasures for emerging cyber threats.
Ensure consistent application of security controls across infrastructure and business systems.
Collaborate with IT and operations teams to improve and maintain overall enterprise security posture.
Provide architectural guidance for securing new and existing systems and applications.
Required Skills
5+ years of experience and expert understanding of identity and access control, logging, and reporting systems.
5+ years of experience developing automation using tools such as Python and Bash.
5+ years of experience with Linux, Windows, network security protocols, and procedures.
5+ years of experience supporting large IT environments and/or system deployments.
Preferred Skills
Knowledge of SIEM analysis and reporting.
Familiarity with security frameworks such as NIST, CSF, CJIS, IRS 1075, and CMS MARS-E.
Knowledge of Application Security (AppSec).
Education Requirements
Bachelor's degree in Information Technology, Information Security, or a related field.
Eight years of relevant work experience may be substituted in lieu of education.
Certifications (Preferred)
CISSP, CISA, CISO, CEH, OSCP, GPEN, or equivalent certifications.
Vendor certifications in SIEM or logging technologies are a plus.
Information Security Engineer
Security architect job in Charlotte, NC
Information Security Engineer Duration: 12 Months contract with potential to extend The Information Security Engineer will play a critical role in ensuring the security and integrity of information systems. This position requires a highly organized and detail-oriented individual with strong communication and leadership skills. The ideal candidate will have experience in technology, network technologies, and information security, as well as the ability to collaborate with cross-functional teams to implement effective security solutions.
Responsibilities:
Develop and implement information security solutions and controls in collaboration with Security Architecture, Principal Engineers, and Subject Matter Experts.
Conduct in-depth research, compile data, and perform detailed analysis to support security initiatives.
Lead meetings effectively and provide concise communications to higher-level and executive leadership.
Translate requirements into actionable information for both executive-level and individual-level stakeholders.
Manage initiatives, including detailed planning, process management, and documentation.
Utilize tools such as MS Office (Word, Excel, PowerPoint) to support project management and reporting.
Qualifications:
Strong organizational, multi-tasking, and prioritizing skills.
Excellent communication and presentation skills.
Proven experience in technology, network technologies, and information security, including firewalls, intrusion detection, and endpoint security.
Demonstrated ability to work with cross-functional teams to identify and implement security solutions.
Experience in cybersecurity and technology project management.
Strong leadership skills and the ability to manage complex initiatives.
About PTR Global: PTR Global is a leading provider of information technology and workforce solutions. PTR Global has become one of the largest providers in its industry, with over 5000 professionals providing services across the U.S. and Canada. For more information visit *****************
At PTR Global, we understand the importance of your privacy and security. We NEVER ASK job applicants to:
Pay any fee to be considered for, submitted to, or selected for any opportunity.
Purchase any product, service, or gift cards from us or for us as part of an application, interview, or selection process.
Provide sensitive financial information such as credit card numbers or banking information. Successfully placed or hired candidates would only be asked for banking details after accepting an offer from us during our official onboarding processes as part of payroll setup.
Pay Range: $55 - $60
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
If you receive a suspicious message, email, or phone call claiming to be from PTR Global do not respond or click on any links. Instead, contact us directly at ***************. To report any concerns, please email us at *******************
Information Security Engineer- Automation (Cisco ISE)
Security architect job in Charlotte, NC
STRATEGIC STAFFING SOLUTIONS HAS AN OPENING!
This is a Contract Opportunity with our company that MUST be worked on a W2 Only. No C2C eligibility for this position. Visa Sponsorship is Available! The details are below.
“Beware of scams. S3 never asks for money during its onboarding process.”
Job Title: Information Security Engineer- Automation (Cisco ISE)
Location: Charlotte, NC 28262/ Raleigh, NC 27607
Onsite Work
Contract Length: 24+ Months
Pay: 75-80 an hr on W2
About the Role
We are seeking a highly motivated Information Security Engineer to design and implement automation solutions that streamline and enhance management of the Cisco Identity Services Engine (ISE) platform. This role is ideal for a proactive, self-directed engineer who thrives in complex environments and enjoys building scalable, secure automation that reduces manual effort and improves operational efficiency.
You will play a key role in developing automation workflows, integrating systems via APIs, and collaborating with cross-functional teams to translate business and security requirements into reliable, maintainable solutions.
Key Responsibilities
Design, develop, and implement automation workflows to support Cisco ISE configuration, policy updates, and operational tasks
Build and maintain Python-based automation scripts and Ansible playbooks aligned with business and security requirements
Develop application and system integrations using RESTful and/or SOAP APIs, including authentication mechanisms (OAuth, JWT), data transformation, and error handling
Create secure, scalable API integrations with internal systems and third-party services
Utilize API testing tools such as Postman and Swagger to validate functionality, performance, and security compliance
Integrate automation solutions with external platforms (e.g., HashiCorp Vault) for secure credential and secrets management
Develop custom tooling to simplify administrative processes and reduce manual day-to-day operational tasks
Collaborate with internal stakeholders to gather requirements and deliver scalable automation solutions
Document automation architecture, workflows, and usage guidelines to support maintainability and knowledge transfer
Troubleshoot, optimize, and enhance automation scripts for reliability, scalability, and performance
Required Qualifications
Strong experience managing network infrastructure as code
Advanced Python development skills
Proven experience building Ansible playbooks based on business and operational requirements
Hands-on experience creating and maintaining technical documentation (automation architecture, READMEs, runbooks)
Ability to work independently, adapt to evolving requirements, and navigate complex or ambiguous processes with minimal supervision
Nice-to-Have Qualifications
Experience with Cisco Identity Services Engine (ISE)
Background in network engineering or network security
Work Location & Schedule
This is a hybrid role requiring 3 full days per week onsite (8 hours per day) at one of the following locations:
Gen AI Architect
Security architect job in Charlotte, NC
We are
At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron's progressive technologies and optimization strategies span end-to-end Artificial Intelligence, Consulting, Digital, Cloud & DevOps, Data, and Software Engineering, servicing an array of noteworthy financial services and technology firms. Through research and development initiatives in our FinLabs we develop solutions for modernization, from Artificial Intelligence and Blockchain to Data Science models, Digital Underwriting, mobile-first applications and more. Over the last 20+ years, our company has been honored with multiple employer awards, recognizing our commitment to our talented teams. With top clients to boast about, Synechron has a global workforce of 14,500+, and has 58 offices in 21 countries within key global markets.
Our challenge
We are seeking a Generative AI Architect to define and implement cutting-edge AI/ML solutions that power next-generation business capabilities. This role will focus on designing scalable architectures for both traditional machine learning and advanced Generative AI use cases, ensuring robust, secure, and high-performing AI systems.
Additional Information:
The base salary for this position will vary based on geography and other factors. In accordance with the law, the base salary for this role if filled within Charlotte, NC is $140K to $150K/year & benefits (see below).
The Role
Responsibilities:
• Define and drive the AI/ML architecture and roadmap, including both traditional machine learning and Generative AI (GenAI) use cases.
• Design comprehensive end-to-end AI solutions covering data ingestion, feature engineering, model training, inference pipelines, and monitoring frameworks.
• Lead the integration of Large Language Models (LLMs) and Retrieval-Augmented Generation (RAG) frameworks, utilizing tools such as LangChain, LangGraph, or similar.
• Collaborate with business stakeholders to translate requirements into scalable AI-driven technical solutions.
• Evaluate and select appropriate AI/ML tools, cloud services, frameworks, and libraries based on use case needs and industry best practices.
• Ensure models adhere to governance, security, explainability, and regulatory compliance, embedding ethical AI principles into system design.
• Guide engineering teams in the implementation of AI components, emphasizing scalability, reliability, and performance optimization.
• Partner with DevOps teams to establish CI/CD pipelines for AI, including model versioning, deployment automation, and ongoing A/B testing.
• Keep abreast of the latest industry research, breakthroughs, and emerging trends in AI, recommending adoption of best practices and innovative solutions.
Requirements:
• Proven experience 6+ years, excel in leading AI/ML architecture and strategy in enterprise environments.
• Strong expertise in designing and deploying large-scale AI/ML solutions, including LLMs and RAG frameworks.
• Experience with AI/ML tools and frameworks such as TensorFlow, PyTorch, Hugging Face, LangChain, LangGraph, or similar.
• Deep understanding of data workflows, feature engineering, model training, evaluation, and deployment.
• Knowledge of cloud platforms (AWS, Azure, GCP) and services tailored for AI deployment.
• Familiarity with model governance, security, explainability, and ethical AI standards.
• Experience in developing CI/CD pipelines for AI/ML, including model versioning, monitoring, and performance tuning.
• Strong problem-solving, communication, and stakeholder management skills.
Preferred, but not required:
• Advanced degree (Ph.D., Master's) in Computer Science, Data Science, AI, or related fields.
• Publications or practical contributions to AI research and open-source projects.
• Experience working in regulated industries or environments requiring compliance and governance.
• Familiar with project management and Agile practices.
We offer:
A highly competitive compensation and benefits package
A multinational organization with 58 offices in 21 countries and the possibility to work abroad
10 days of paid annual leave (plus sick leave and national holidays)
Maternity & Paternity leave plans
A comprehensive insurance plan including: medical, dental, vision, life insurance, and long-/short-term disability (plans vary by region)
Retirement savings plans
A higher education certification policy
Commuter benefits (varies by region)
Extensive training opportunities, focused on skills, substantive knowledge, and personal development.
On-demand Udemy for Business for all Synechron employees with free access to more than 5000 curated courses
Coaching opportunities with experienced colleagues from our Financial Innovation Labs (FinLabs) and Center of Excellences (CoE) groups
Cutting edge projects at the world's leading tier-one banks, financial institutions and insurance firms
A flat and approachable organization
A truly diverse, fun-loving and global work culture
SYNECHRON'S DIVERSITY & INCLUSION STATEMENT
Diversity & Inclusion are fundamental to our culture, and Synechron is proud to be an equal opportunity workplace and is an affirmative action employer. Our Diversity, Equity, and Inclusion (DEI) initiative ‘Same Difference' is committed to fostering an inclusive culture - promoting equality, diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger, successful businesses as a global company. We encourage applicants from across diverse backgrounds, race, ethnicities, religion, age, marital status, gender, sexual orientations, or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements, mentoring, internal mobility, learning and development programs, and more.
All employment decisions at Synechron are based on business needs, job requirements and individual qualifications, without regard to the applicant's gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law.
PKI Architect (Security, Cloud) -25-02596
Security architect job in Greenville, SC
Job Title: IT Architect Design & Implementation specialist (PKI, Security)
Hybrid
Duration: Long-Term Renewable Contract
Job ID - 5243
Work Authorization: W2 Only (No C2C or subcontracting)
Position Purpose/Scope: What are the key objectives of the position?
This role leads the architecture, design, implementation, and management of enterprise-level Public Key Infrastructure (PKI) solutions, ensuring high availability, scalability, and security across global Group locations. Drives strategic PKI initiatives, including the adoption of new technologies and best practices.
Position Responsibilities/Accountabilities: List the major duties/accountabilities to achieve the position's key objectives.
Architects and deploys Microsoft Active Directory Certificate Services (AD CS) components, including Certificate Authorities (CAs), Online Responders (OCSP), Certificate Revocation Lists (CRLs) and Network Device Enrollment Service (NDES).
Manages the full certificate lifecycle using advanced Certificate Lifecycle Management (CLM) platforms and Hardware Security Modules (HSMs).
Develops and implements automation scripts (PowerShell, Python) for PKI operations, certificate issuance, revocation, and monitoring.
Implements proof of concepts for PKI solutions.
Provides expert-level (Tier 3) support for complex PKI and Certificate Management incidents, performing root cause analysis and implementing permanent solutions.
Collaborates with cross-functional teams, including Product Owners, DevOps, and IT Security, to integrate PKI solutions into various applications and services.
Contributes to the overall security architecture, providing expert guidance on cryptographic standards, key management, and secure communication protocols.
Conducts comprehensive risk assessments for PKI deployments and develop mitigation strategies to ensure compliance with industry regulations and internal security policies.
Creates and maintains high-quality technical documentation, including design specifications, operational procedures, and test plans.
Conducts research on existing systems and devise solutions that work within those systems.
Responds to questions regarding PKI and Certificate Management capabilities and requirements.
Maintains a high-level understanding of the organization's IT-Security processes and requirements.
Works on the delivery of DevOps User Stories within specified functional area(s).
Supports the roll-out and operation of global Public Key Infrastructure (PKI) and Certificate Management initiatives within the Group for multiple departments and all global locations.
Understands and models VPS (Value Added Production System) Principles and concepts of Standard Work and Problem Solving.
Adheres to 5S and Safety Standards and Principles.
Performs other duties as assigned by Group Operations Supervisor.
Education:
Bachelor's or Master's degree in Computer Science, Information Security, or a related technical field.
Licenses and/or Certifications:
Relevant industry certifications (or equivalents) such as CISSP, SANS GIAC (e.g., GSEC, GCWN), or Microsoft Certified: Azure Security Engineer Associate (preferred).
Experience:
10+ years of hands-on experience with Microsoft Active Directory Certificate Services (AD CS) -OR Equivalent platform, including design, deployment, and troubleshooting of Certificate Authorities (CAs), Online Responders (OCSP), and Network Device Enrollment Service (NDES).
3+ years of expertise in certificate lifecycle management (CLM) platforms (e.g., Venafi, AppViewX, Keyfactor) and Hardware Security Modules (HSMs) (e.g., Thales, nCipher, Utimaco).
5+ years of proven track record of successfully delivering complex PKI projects in large- scale enterprise environments.
5+ years of experience driving products from concept and ideation through successful launch.
5+ years of experience working on a team employing standardized project delivery methods (Agile/Scrum development methods preferred).
5+ years of experience in understanding of and working with non-functional requirements.
5+ years of experience of working in an enterprise environment.
Knowledge/Skills/Abilities:
Intermediate proficiency in PowerShell for AD Certificate Services administration and automation; experience with Python for security tool development is a plus.
Intermediate knowledge of (functional) testing methodologies and tools, including test automation.
Intermediate knowledge of root cause analysis, debugging methods, and diagnostic tools.
Intermediate knowledge of Databases and query language (e.g., SQL).
Intermediate knowledge of modern operating systems (especially but not limited to MS Windows and Unix/Linux derivates).
Intermediate knowledge of IT Security and risk assessment.
Intermediate knowledge of certificate lifecycle management and Public Key Infrastructure.
About our Company
DataSoft Technologies is a highly recognized provider of professional IT Consulting services in the US. Founded in 1994, DataSoft Technologies, Inc. provides staff augmentation services for Information Technology and Automotive Services. Our team member benefits include:
Paid Holidays/Paid Time Off (PTO)
Medical/Dental Insurance
Vision Insurance
Short Term/Long Term Disability
Life Insurance
401 (K)
GEN AI Architect
Security architect job in Charlotte, NC
Responsibilities:
· Lead the architectural design and implementation of scalable, generative AI-powered solutions for business automation, leveraging both Azure and Google Cloud platforms.
· Architect end-to-end AI model workflows, utilizing Azure AI, and Google AI tools. Focus will be on applications involving complex document intelligence, multi-modal data analysis, and advanced image processing tasks.
· Design and oversee the development of optimized RAG (Retrieval Augmented Generation) pipelines that incorporate varied data sources and formats to improve prompt execution.
· Establish best practices for prompt engineering and iterative refinement to maximize the accuracy and relevance of outputs across diverse data types.
· Collaborate with cross-functional teams (engineering, data science, business) to translate complex business requirements into robust, scalable AI component designs.
· Champion the integration of the client's proprietary generative AI tools into the architecture and development lifecycles.
· Direct the implementation of robust API management strategies using Apigee for secure and efficient access to AI models and related services.
· Ensure all solution designs adhere to stringent data governance policies and use cloud-native security mechanisms and compliance tools.
· Provide architectural guidance and design patterns for leveraging generative AI within critical business processes like License Audit and Product Approval, emphasizing scalable and verifiable outcomes.
· Establish and automate DevOps pipelines for model deployment, testing and iterative enhancements.
Skills:
· Deep expertise with Azure AI services (including Cognitive Services) and Google Cloud AIML platform.
· Extensive knowledge and practical experience with document processing using Azure Document Intelligence and alternative OCR technologies.
· Mastery of Snowflake for data modeling, warehousing, and integrating with advanced analytics workflows.
· Proficiency with cloud orchestration tools, like GKE Scheduler, and asynchronous communication services (e.g., Google PubSub).
· Advanced expertise in API management using Apigee and related security best practices.
· Proven ability to design and implement Kubernetes-based AI model deployments, including model optimization techniques.
· Strong command of Python for development and automation tasks.
· Demonstrated experience converting business needs into scalable and maintainable technical designs.
· Experience working with and extending custom Generative AI tooling.
· Deep understanding of Retrieval Augmented Generation (RAG) concepts and its applications.
--
Thanks & Regards,
Trayambkeshwer Dwivedi (Trayam), Sr. Technical Recruiter
Raas infotek corporation
262 Chapman road, Suite 105A, Newark, DE-19702
Direct number: ********** | 132
Text Now: **************
Email: **************************************
Information Security Analyst
Security architect job in Charlotte, NC
WorkForce Unlimited is searching for a proactive Security Analyst to analyze vulnerabilities, optimize security tools, and help our client stay ahead of emerging threats.
The Security Analyst is responsible for independently managing third-party vulnerability data sources, executing scans using proprietary tools, and collaborating with IT teams to prioritize mitigation efforts. The role involves leveraging vulnerability management tools to generate metrics and reports that track progress and effectiveness. Additionally, the Security Analyst may contribute to reviewing project scopes to recommend security benchmarks, optimizing security tool alerts and policies, and integrating logs and large data sets into existing systems.
Role Responsibilities
Analyze vulnerabilities from various sources and input them into the vulnerability management tool using approved methods to ensure a complete overview of exposures.
Evaluate existing vulnerabilities to identify problem areas or opportunities for mass-mitigation.
Communicate with cross-functional teams to explain risks, opportunities, or required actions.
Escalate vulnerabilities that exceed defined time-to-resolve thresholds.
Configure vulnerability scanning tools and manage ongoing scan schedules.
Collect and maintain departmental metrics and KPIs.
Identify opportunities to apply AI technologies to improve vulnerability management processes.
Technical Qualifications
Strong familiarity and prior experience with:
HTTP, PKI, digital signatures/encryption, SMTP, DNS, CWEs, CVEs, and related security frameworks.
Vulnerability and security scanning tools such as Nessus, NMAP, ZAP, BurpSuite, Invicti, Nuclei, or similar.
Web application scanning and web application firewalls (WAFs).
Containers and associated security considerations.
CIS Benchmarks, STIGs, or other security hardening standards.
Additional desirable skills or experience:
Authentication and identity protocols: SAML, Kerberos, OAuth, OIDC, LDAP.
Scripting and automation using PowerShell and Python.
CI/CD tools such as Jenkins.
Splunk data onboarding (indexes, sourcetypes, data models, forwarders, apps, HECs).
Log ingestion and transport technologies: Azure Event Hubs, Kafka, syslog.
EDR/XDR tools such as Microsoft Sentinel, Microsoft Defender, CrowdStrike, or similar.
General Qualifications
Ability to conduct independent research, analyze data, and produce clear plans of action.
Strong systematic thinking and troubleshooting skills.
Ability to create clear and detailed documentation of designs and processes for diverse technical audiences.
Excellent communication skills, including the ability to clearly articulate requirements, priorities, and project status.
Education Requirements
Bachelor's Degree in Information Technology or a related field is preferred but not mandatory.
Information Security Analyst
Security architect job in Charlotte, NC
Role: Information Security Analyst/IAM Analyst
Duration: 12+ months
Interview: PH/MS Teams
This position supports the Central Access Provisioning team within IAM Operations. Resources will assist during a transition from manual access processes to increased automation, flexing across IAM functions to address capacity gaps and operational needs.
Required Experience
2+ years in IAM / Information Security / Access Management
Hands-on experience with at least one IAM tool (SailPoint, Okta, CyberArk, Ping, Microsoft Entra ID)
Working knowledge of authentication standards (LDAP, SAML, OAuth, OpenID, SCIM)
Experience supporting access provisioning, deprovisioning, and identity lifecycle activities
Exposure to security frameworks such as NIST, ISO, SOX, or PCI
What We're Looking For
Strong IAM operations background (not architect-level)
Ability to work onsite and interact with business and security stakeholders
Candidates who can start quickly and operate in a high-volume IAM environment
Best Regards,
Shubhangi Pokhriyal
Technical Recruiter
Sibitalent Corp
118 Carolynn Lane, Murphy, TX 75094
******************
Email: *************************
Architect- Digital Payments, SWIFT, ISO 20022, ACH, P2P
Security architect job in Charlotte, NC
LTIMindtree is a global technology consulting and digital solutions company that enables enterprises across industries to reimagine business models, accelerate innovation, and maximize growth by harnessing digital technologies. As a digital transformation partner to more than 750 clients, LTIMindtree brings extensive domain and technology expertise to help drive superior competitive differentiation, customer experiences, and business outcomes in a converging world. Powered by nearly 90,000 talented and entrepreneurial professionals across more than 30 countries, LTIMindtree - a Larsen & Toubro Group company - combines the industry-acclaimed strengths of erstwhile Larsen and Toubro Infotech and Mindtree in solving the most complex business challenges and delivering transformation at scale. For more information, please visit *******************
Payments Technical Enterprise Architect
Job Location: Charlotte NC, Kennesaw GA , Dallas TX
Duration: Full time.
Payments domain knowledge is must
The ideal candidate will be an exceptional solutions architect who exhibits sound business judgment, a proven ability to influence others and possess strong analytical skills.
In this role, you will be primarily responsible for designing and delivering specification for reusable web service interfaces that can facilitate transfer of funds both in P2P and C2B scenarios including offline and online/real-time mode of payment such as Zelle and TCH/RTP. Acts as a point of contact for Architecture and design delivery, with the ability to identify service and reusable components, and clearly documents and communicates design recommendations across teams supporting movement of funds, including core payment constructs of authorization, clearing & settlement, and supporting batch updates to banks ledger
Responsibilities
Designs and develops web services specifications, solution architecture and design for enterprise wide systems, and supports implementation and deployment of these services and design by working closely with the delivery teams.
Brings a deep understanding of payment landscape onboard with focus on challenges and opportunities in P2P and C2B payment scenarios in both offline and online modes of payment, including, authorization, settlement and reconciliation flows.
Understands complexity of adapting to an enterprise wide web service modelling where many enterprises are involved and requires to interface with heterogeneous applications and suggests solutions.
Responsible for components of complex engineering and/or analytical tasks and activities.
Ensure all internal processes, procedures, and policies are effectively enforced.
Serves as a fully seasoned/proficient technical resource; provides tech knowledge and capabilities as a team member and individual contributor.
Will work closely with business partners and technology systems owners to define requirements for POC initiatives, ability to understand and adapt new technologies independently.
Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results.
Mandatory skills
Familiarity with financial services and payments and payment processing including digital payments (i.e. funds transfers, bill payments, Zelle).
Experience and/or working knowledge of payment solution working with devices and merchant services
Design and development skills in enterprise wide web service, applications and reusable components that are unified across an Industry, in P2P and C2B payment domain covering near real time payments.
Good understanding of multiple industry standard of payment messages and files, like ISO20022, ISO8583, SWIFT MT/MX, NACHA/ACH, BACS, NPCI UPI API etc.
Effectively work with business teams, program management, on-site/off-site development staff to accomplish project deliverables
Strong communication/interpersonal skills both written and verbal and the ability to quickly form meaningful working partnerships.
Work well under pressure. Manage multiple priorities, be proactive, and deliver quality results under aggressive deadlines.
Self-starter, good aptitude, Problem Solver and someone who is open to learning new technologies and comes with strong analytical capabilities
Maintain a comprehensive library of technical terminology and documentation
Understanding of service oriented architecture and best practices
Strong use of visuals skills (EA Sparx or MS Visio), ability to convene points with graphics and illustrations
Strong attention to details
Desired skills
Experience of working in an offshore/onsite model.
Experience of working in an Agile team.
Understanding of downstream systems that payment applications usually interact with, including, deposit products, batch updates to bank ledger, third party applications like clearing houses, interbank settlement systems.
Benefits and Perks:
Comprehensive Medical Plan Covering Medical, Dental, Vision
Short Term and Long-Term Disability Coverage
401(k) Plan with Company match
Life Insurance
Vacation Time, Sick Leave, Paid Holidays
Paid Paternity and Maternity Leave
LTIMindtree is an equal opportunity employer that is committed to diversity in the workplace. Our employment decisions are made without regard to race, colour, creed, religion, sex (including pregnancy, childbirth or related medical conditions), gender identity or expression, national origin, ancestry, age, family-care status, veteran status, marital status, civil union status, domestic partnership status, military service, handicap or disability or history of handicap or disability, genetic information, atypical hereditary cellular or blood trait, union affiliation, affectional or sexual orientation or preference, or any other characteristic protected by applicable federal, state, or local law, except where such considerations are bona fide occupational qualifications permitted by law.
Information Technology Security Manager
Security architect job in Fort Mill, SC
CULTURE SNAPSHOT:
Broad River Retail is an organization of integrity, diversity and culture working together for the purpose of ‘
Furnishing Life's Best Memories'
. At Broad River, we call all our employees “Memory Makers.” We do this because we know everyone that works for our Company has the power to make positive memories not only for our Guests, but also for their families, co-workers, and communities.
We take pride in training and developing our teams so that they can provide a premier customer experience to every Guest. Our Memory Makers are the driving force that has led us to being the largest and fastest growing Ashley licensee in the U.S. and landing us on the Top Places to Work list two years in a row in our industry.
AT A GLANCE:
The IT Security Manager reports directly to the VP of IT/BI and is part of the IT/BI Department. The IT Security Manager is responsible for safeguarding the organization's digital assets by managing and monitoring, detecting, and responding to security threats. This role involves conducting risk assessments, managing incident responses, and implementing security protocols to ensure the integrity, confidentiality, and availability of enterprise systems and data.
DAY IN THE LIFE AS THIS MEMORY MAKER:
Monitor security networks and systems for breaches or suspicious activity.
Respond to security incidents and conduct thorough investigations.
Perform vulnerability assessments and penetration testing.
Develop and implement security measures and protocols.
Analyze security alerts and determine appropriate response actions.
Collaborate with IT teams to ensure secure system configurations.
Prepare regular security reports for management.
Conduct security awareness training for staff.
Lead and manage security-related projects and initiatives.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's degree in Computer Science, Information Technology, or related field.
5+ years of experience in cybersecurity or related roles.
3+ years of Information Technology Management or related field
Certifications such as CISSP, CISM, CEH, or GIAC preferred.
Strong understanding of cybersecurity frameworks (e.g., NIST, ISO-27001, PCI-DSS).
Experience with SIEM, IDS/IPS, firewalls, and endpoint protection tools.
Excellent analytical, problem-solving, and communication skills.
Ability to lead security-related projects and initiatives.
Clearly convey ideas, expectations, and feedback to teams, ensuring transparency and alignment across all levels.
Build strong relationships and a positive work culture.
Address and resolve conflicts within the team, mediating differences and finding mutually beneficial solutions.
Inspire and encourage team members, fostering a sense of purpose and driving performance toward shared goals.
Respond to change with flexibility and a positive outlook, guiding teams through transitions and unforeseen challenges.
Distribute tasks effectively based on team strengths, ensuring optimal workload balance and empowering others to take ownership.
Mentor and provide constructive feedback to help team members grow, enhancing their skills and career development.
WORKPLACE ENVIRONMENT:
While performing the duties of this job the employee is:
Prolonged periods sitting at a desk and working on a computer.
Must be able to lift up to 15 pounds at a time.
WORK SCHEDULE OUTLINED ON SITE, HYBRID, REMOTE WITH EXPECTATIONS
Ability to work independently, as well as, in a collaborative team environment within an office setting.
Physical requirements such as extended periods of sitting and computer use may be required.
Physical requirements such as extended periods of standing may be required.
Ability to communicate effectively verbally, in writing, and/or electronically.
Ability to use logical reasoning for simple and complex problem solving.
Travel up to 20% of your time.
In accordance with the Americans with Disabilities Act (ADA), reasonable accommodations may be made to empower individuals with disabilities to undertake the essential duties and responsibilities of the position.
MEMORY MAKER PERKS & BENEFITS:
Salary Range based on background, skill, and experience
Medical, dental, vision, and life insurance options
Paid time off and 401K matching contribution
Employee discount (40%) at BRR locations
Internal Opportunities for career growth and advancement
OUR COMMITMENT TO YOU:
Broad River Retail is committed to creating a place where everyone feels respected, valued, and able to reach their full potential. Regardless of race, gender, religion, sexual orientation, age, disability, or if you're parenting the next generation of Memory Makers, we firmly believe our work is at its best when everyone feels free to be their most authentic self.
ServiceNow - Tools Architect
Security architect job in Fort Mill, SC
The Tools Architect will lead the design, implementation, and optimization of enterprise-grade IT Operations Management (ITOM) and observability solutions.
This includes integrating and orchestrating tools such as Dynatrace, SolarWinds, AlertSite, and ServiceNow modules (CMDB, Event Management, CSDM).
The role is pivotal in working with the customer to drive Event management, Service Now CMDB accuracy, CI Mapping, automation across hybrid environments.
Key Responsibilities
Strategic Leadership
• Be the primary point of contat for all AIOPs & Automation related discussions
• Identify new business opportunities related to AIOPs automation & Tools
• Define and drive the AIOps and automation roadmap/strategy aligned with business goals.
• Collaborate with senior stakeholders to prioritize automation & AIOPs initiatives and ensure alignment with enterprise architecture.
• Evaluate and recommend appropriate tools, platforms, and frameworks for AIOps and Automation
Technical Implementation
• Oversee the analysis and identification of automatoin opportunities
• Drive development & deployment of automation scripts/workflows
• Lead the analysis, recommendation and deployment of AIOps solutions (e.g., anomaly detection, predictive analytics, root cause analysis).
• Integrate AIOps platforms with existing ITSM, monitoring, and observability tools. - Document recommendations & lead as required
• Architect and maintain a governed CMDB aligned with CSDM best practices
• Ensure accurate service mapping and CI relationships to support impact analysis and change risk predictions
• CMDB health remediation efforts including completeness, staleness, and orphaned records
Data & Analytics
• Ensure effective data ingestion, normalization, and correlation from multiple sources (logs, metrics, events).
• Work with CG & LPL teams to Fine-tune Event Thresholds
• Monitor performance of AIOps models and continuously improve accuracy and relevance.
Weekly & Monthly Performance Tracking
Team & Stakeholder Management
• Conduct training and enablement sessions to build automation capabilities across teams.
• Collaborate with Teams in implemenation & driving AIOPs & Automation
Governance & Compliance
• Define and enforce governance policies for automation and AI usage.
• Ensure security, compliance, and auditability of automated processes.
•Track KPIs and ROI of AIOps and automation initiatives.
Skills & Qualifications
• 7+ years of experience in ITOM architecture, preferably with ServiceNow.
• Deep expertise in CMDB, Discovery, Service Mapping, Event Management, and CSDM
• Hands-on experience with Dynatrace, SolarWinds, AlertSite, and other observability platforms
• Strong understanding of ITIL, ITSM, and Change Management processes.
• Certified in one or more areas of ServiceNow/Observability Tools
Tools Ecosystem
Tool Function
Dynatrace -Application & infrastructure monitoring, anomaly detection
SolarWinds Orion/DPA -Network & database performance monitoring
AlertSite - Synthetic monitoring
ServiceNow ITOM - Discovery, orchestration, event management
CMDB & CSDM - Configuration and service data governance
LiveNX, ELK, CloudWatch - Supplemental observability tools?
Regards
Rahul Bansiwaal
**********************************************
************ | Office: ************** EXT: 444
rahulb@net2source>com
www>net2source>com
270 Davidson Ave, Suite 704, Somerset, NJ 08873, USA
Knowledge is Power>
Salesforce Architect
Security architect job in Durham, NC
****Note: Hybrid (@Durham, NC)
Certifications:
Salesforce Technical Architect/Application Architect certification.
Salesforce Integration Architect certification
Salesforce Platform Developer II Certification
Salesforce Certified Platform App Builder Certification
Copado certification
MuleSoft I and II certifications
Required experience:
Experience with Salesforce DevOps and CI/CD pipelines
Experience in accessibility laws and WCAG 2.1 compliance
Experience in data migration strategies and common extract, transform, load (ETL) tools
Experience with object-oriented design patterns and languages such as Apex, Java, JavaScript, C#, and Ruby.
Rxperience with GITHUB/BitBucket version control solutions
Experience with Agile Methodologies
salesforce architect
Security architect job in Durham, NC
Job: Salesforce Solutions Expert
T In this role, This role will bridge strategic business needs with robust and secure solution architecture, collaborating with stakeholders, developers and technical leads to deliver cutting edge and sustainable enterprise solutions. This role will be in a crucial role in shaping the future of our Salesforce ecosystem, leading architectural designs and defining complex integrations between systems. This role will also be a hands-on technical expert having cross-functional leadership and a passion for continuous innovation. Responsibilities include Architect end-to-end solutions and guiding technical strategies and execution, Collaborate with Subject Matter Experts, Tech lead and business stakeholders to
Skills
Salesforce Technical Architect/Application Architect certification
Required
MuleSoft I and II certifications
Required
Salesforce Integration Architect certification
Required
Salesforce Platform Developer II Certification
Required
Salesforce Certified Platform App Builder Certification
Required
Copado certification
Required
Experience with requirements analysis and business process design.
Required
7
Years
Experience in architecting and developing complex solutions in Salesforce platform.
Required
7
Years
Extensive experience in Apex, LWC, Aura, Flows, SOSL, SOQL, Salesforce Admin and advanced architectural patterns, unit testing and best test practices
Required
7
Years
Strong understanding and experience with all configuration aspects of Salesforce including development
Required
7
Years
Experience in guiding development team on appropriate use of platform technology
Required
7
Years
Experience with object-oriented design patterns and languages such as Apex, Java, JavaScript, C#, and Ruby.
Required
7
Years
Experience in data migration strategies and common extract, transform, load (ETL) tools
Required
7
Years
Experience in general mobile solutions and architecture and understanding of on-platform mobile solutions and considerations
Required
7
Years
Experience using Shield and Lightning
Required
7
Years
Experience with Salesforce DevOps and CI/CD pipelines
Required
5
Years
Experience in accessibility laws and WCAG 2.1 compliance
Required
5
Years
Rxperience with GITHUB/BitBucket version control solutions
Required
5
Years
Experience with Agile Methodologies
Required
5
Years
SAP Security Analyst/Admin
Security architect job in Raleigh, NC
Direct Hire
REMOTE but must reside within 3 hours of Raleigh
US Citizens, Green Card, Perm Resident (no sponsorship)
This primarily remote role involves SAP Security Administration tasks of planning, coordination, execution, and production support. Currently on ECC, and should be moving to S4 Hana in the next couple years. The candidate needs to possess a complete understanding of industry practices regarding application principles, concepts, practices, and standards. The candidate will interact with senior internal and external personnel on significant matters often requiring coordination between organizations.
Qualifications/Requirements:
• Bachelor's degree with 5+ years of professional SAP technical experience
• Minimum 5 years of experience in SAP Security
• Experience with SAP NetWeaver, ABAP, and related technologies
• Knowledge of database management systems (MS SQL Server)
• Legal authorization to work in the U.S. (no visa sponsorship).
• Experience with GRC Access Control 10.x minimum (with 12.0 preferred).
• Strong communication and collaboration skills to work effectively with cross-functional teams.
Preferred Qualifications:
• Experience with SAP ECC HANA and MSSQL databases.
• Some knowledge of SAP Basis (doesn't have to be current or hands on, just enough to interface with our outsourced Basis vendor).
• Experience with HANA/FIORI Security.
• Strong problem-solving, analytical, and communication skills.
• Familiarity with cross-functional team dynamics.
• Ability to work independently and with global teams.
Security Architect
Security architect job in Durham, NC
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective-C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and Jquery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance-driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
Below is the skillset details. Pls provide profiles ASAP. You may also consider the ones you shared with me on the other thread for PPD to see if there is a match.
IT Security professional with at least 10 years of professional experience. Must be at least engineer level with desire to move to or currently at architect skill level. Technical experience and fluency should be in the below areas:
• Firewall/UTM/IDPS - Fortigate
• client server communication and flow in protocols like FTP, e-mail, web, DNS, etc.
• Endpoint Protection - Symantec/TrendMicro
• Identity and Access Management and Monitoring - Okta/Azure SSO
• Security of data at rest and in motion
• Knowledge of implications to security in SaaS, IaaS
• Vulnerably and Threat Management - Qualysguard
• Security Information and Event Management (SIEM) - HP Arcsight
• Mobile device security
Good communication skills, collaborative spirit, solid analytical skills, adaptability and flexibility to step into other areas outside of core skill set. Candidate should be passionate about security.
Additional Information
Thanks and Regards,
Ankur Bhatia
SAP Security & GRC admin - Only local consultants
Security architect job in Charlotte, NC
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
Job Description
FULL TIME PERM JOB-GC/GC EAD/US Citizens
As a key contributor of the Finance Systems Roadmap Security and Controls team, individual will be responsible for working with project teams to obtain security and control requirements for an end state SAP ERP solution. Business requirements will be used to configure a role based security design within various SAP applications. These SAP applications include ECC, BI, BPC, PI, Enterprise Portal, CE, Bank Analyzer, Solution Manager, and GRC. Individual will be responsible for day to day system security configuration tasks and user administration throughout all project lifecycles and production support. Individual should have strong communication skills, ability to lead or participate in project workshops, and ability to share or transfer technical knowledge to less experienced team members
Qualifications
Relevant Years of Experience: 4+
Total IT experience: 5-7 years (or lesser with technical knowledge)
Must Have Technical Qualifications:
- Strong communication skills to facilitate working in a dynamic project environment
- Role design, configuration, testing, and deployment methodology within SAP application architecture
- Detailed knowledge of ABAP and Java based authorizations within SAP applications
- SAP ECC Profile Generator (single roles, master / derived roles, composite roles)
- SAP BI analysis authorization concepts
- SAP BPC security and administration
- SAP Central User Administration configuration and administration
- SAP GRC configuration and administration
- SAP Enterprise Portal UME administration
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Manager
Security architect job in Raleigh, NC
Piper Companies is seeking an Information Security Manager who will be responsible for developing, implementing, and maintaining the organization's information security program. This role ensures the confidentiality, integrity, and availability of data and systems by managing security policies, risk assessments, compliance initiatives, and incident response processes. The candidate will sit 3 days a week on-site in Raleigh, NC.
Responsibilities for the Information Security Manager:
* Develop and enforce security policies, standards, and procedures aligned with industry best practices
* Lead risk assessments and vulnerability management programs
* Manage security tools such as firewalls, SIEM, endpoint protection, and DLP solutions
* Monitor and respond to security incidents, coordinating investigations and remediation
* Lead and mentor a team of security analysts and engineers
* Collaborate with IT, DevOps, and business units to integrate security into processes and
Qualifications for the Information Security Manager include:
* Bachelor's degree in computer science, Information Technology, Cybersecurity, or related field
* 7+ years in information security roles, with at least 1-2 years in a leadership position
* Certifications such as CISSP, CISM, or equivalent preferred
* Strong knowledge of security frameworks (NIST, ISO 27001)
* Expertise in network security, cloud security, and IAM
Compensation of the Information Security Manager:
* $120,000-$165,000
* Comprehensive Benefits: Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law, and Holidays
This job opens for applications on 12/19/2025. Applications for this job will be accepted for at least 30 days from the posting date.
Information Security Manager, Risk Assessment, CISSP, CISM, NIST, network security, IAM, cloud security, leadership, firewall, DLP, Compliance, Hybrid
#LI-HL1 #LI-HYBRID
Mgr Information Security - Pen Testing
Security architect job in Charlotte, NC
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
:
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
Job Description:
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
Responsibilities:
* Vendor Management: Manage and coordinate penetration testing engagements with vendors.
* People Management: Manage a team of Junior level penetration testers and their development.
* DAST: Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
* Facilitate Penetration Tests: Perform thorough and methodical penetration testing.
* Evaluate and Assign: penetration tests to appropriate resources.
* Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
* Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
* Develop Test Procedures: Design and execute detailed test requirements.
* Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
* Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
* Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
* Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
* Incidents: Act as a testing SME on incident calls; support testers on the calls.
Depth & Scope:
* Advanced knowledge of Bank, technology standards and managing people / projects
* Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
* Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
Preferred Qualifications :
* Technical Skills:
* Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
* Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
* Penetration testing, DAST, Manual Code Review knowledge.
* Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
* Organizational Skills: Manage documents and procedures for testing team.
* Multi-tasking: This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
* Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
* Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
* Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
* Familiarity with security standards and frameworks.
* Previous experience managing and developing teams.
* Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
* Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
* Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
#TDCyberSecurity #Hybrid
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyInformation Security Manager
Security architect job in Cornelius, NC
Job Description
FLSA Status: Exempt Immediate Supervisor: CISO Date Revised: February 18, 2025 The Information Security Manager is a hands-on/ working manager position that defines, implements and monitors security policy for on-prem, cloud, and remote access deployments. The primary duty of the job is to maintain a security posture that allows the business to thrive while preventing a security breach. The IS Manager hires, retains, and trains an IS Engineer to assist with day-to-day duties. The IS team maintains on-premises firewall rules and active directory as well as overseeing vulnerability management. In the cloud, the IS Manager is responsible for designing security measures, and the IS team is responsible for their implementation and monitoring. The IS team also designs, implements, and maintains a remote access VPN for associates when working outside the corporate offices.
Essential Functions:
Demonstrate an understanding of all applications deployed, and data stored within the enterprise.
Demonstrate an understanding of security measures that are in place and their role in securing the enterprise.
Assess the threat of zero-day vulnerabilities and third-party risk to the enterprise. Take action to remediate such vulnerabilities. Effectively report status to executive management in terms of the threat level and associated risk.
Assess risks related to general threat landscape. Identify, design and implement controls to mitigate those threats and prevent security breaches.
Measure, monitor, and report on vulnerabilities that have been identified within the enterprise.
Maintain on-premises firewall rules; maintain cloud security settings and restrictions; maintain remote access rules and restrictions.
Identify new security related vendors as needed and assist in evaluating new and existing vendors from a security perspective.
Participate and communicate effectively in external audits, third-party vulnerability scans, and regulatory examinations.
Maintain, comply with, and develop Infovisa's policies, procedures, and strategies to provide a safe and efficient environment for Infovisa software to run and associates to work.
Liaison with IT-ISAC, InfraGard, and other industry groups.
Manage projects and create detailed technical documentation.
Hire, train, mentor and manage associates on the security team.
Qualifications:
10 years of information security experience required.
Three years of management experience.
Displays strong technical aptitude with IT Security, VPN, Endpoint Detection and Response, IIS, networking concepts and technologies, and other third-party and internally developed tools and technologies.
Prefer familiarity with Check Point technologies.
Prefer one or more applicable network security certifications.
Valid driver's license.
Four-year degree in information technology / systems, or computer science.
Preferred Talents:
Analytical and detailed.
Effective communicator technically, in the board room, and with customers and coworkers.
Organized.
Independent with good judgment.
Proven ability to multitask and prioritize projects.
Self-directed and takes initiative.
Working Environment:
Mostly indoor work with occasional exposure to outdoor elements or hazards.
Medium workload - lifting and/or carrying up to 20 pounds frequently and exerting up to 75 pounds of force occasionally.
Some travel required.
Weekend, evening and on-call.
About Infovisa
Infovisa is a leading provider of financial technology solutions delivered to forward-thinking trust, wealth management, and retirement professionals. Infovisa's solutions empower its clients to acquire new customers, invest assets effectively, manage trust and investment portfolios efficiently, and flexibly report results to customers. For more information about Infovisa, visit ***************** Follow us on LinkedIn.
We are interested in every qualified candidate who is lawfully eligible to work in the United States. However, we are unable to sponsor visas.
Infovisa, Inc. is an Equal Opportunity Employer.
Powered by JazzHR
RoeJ7o0DcN
Information Security Manager
Security architect job in Cornelius, NC
FLSA Status: Exempt Immediate Supervisor: CISO Date Revised: February 18, 2025 The Information Security Manager is a hands-on/ working manager position that defines, implements and monitors security policy for on-prem, cloud, and remote access deployments. The primary duty of the job is to maintain a security posture that allows the business to thrive while preventing a security breach. The IS Manager hires, retains, and trains an IS Engineer to assist with day-to-day duties. The IS team maintains on-premises firewall rules and active directory as well as overseeing vulnerability management. In the cloud, the IS Manager is responsible for designing security measures, and the IS team is responsible for their implementation and monitoring. The IS team also designs, implements, and maintains a remote access VPN for associates when working outside the corporate offices.
Essential Functions:
Demonstrate an understanding of all applications deployed, and data stored within the enterprise.
Demonstrate an understanding of security measures that are in place and their role in securing the enterprise.
Assess the threat of zero-day vulnerabilities and third-party risk to the enterprise. Take action to remediate such vulnerabilities. Effectively report status to executive management in terms of the threat level and associated risk.
Assess risks related to general threat landscape. Identify, design and implement controls to mitigate those threats and prevent security breaches.
Measure, monitor, and report on vulnerabilities that have been identified within the enterprise.
Maintain on-premises firewall rules; maintain cloud security settings and restrictions; maintain remote access rules and restrictions.
Identify new security related vendors as needed and assist in evaluating new and existing vendors from a security perspective.
Participate and communicate effectively in external audits, third-party vulnerability scans, and regulatory examinations.
Maintain, comply with, and develop Infovisa's policies, procedures, and strategies to provide a safe and efficient environment for Infovisa software to run and associates to work.
Liaison with IT-ISAC, InfraGard, and other industry groups.
Manage projects and create detailed technical documentation.
Hire, train, mentor and manage associates on the security team.
Qualifications:
10 years of information security experience required.
Three years of management experience.
Displays strong technical aptitude with IT Security, VPN, Endpoint Detection and Response, IIS, networking concepts and technologies, and other third-party and internally developed tools and technologies.
Prefer familiarity with Check Point technologies.
Prefer one or more applicable network security certifications.
Valid driver's license.
Four-year degree in information technology / systems, or computer science.
Preferred Talents:
Analytical and detailed.
Effective communicator technically, in the board room, and with customers and coworkers.
Organized.
Independent with good judgment.
Proven ability to multitask and prioritize projects.
Self-directed and takes initiative.
Working Environment:
Mostly indoor work with occasional exposure to outdoor elements or hazards.
Medium workload - lifting and/or carrying up to 20 pounds frequently and exerting up to 75 pounds of force occasionally.
Some travel required.
Weekend, evening and on-call.
About Infovisa
Infovisa is a leading provider of financial technology solutions delivered to forward-thinking trust, wealth management, and retirement professionals. Infovisa's solutions empower its clients to acquire new customers, invest assets effectively, manage trust and investment portfolios efficiently, and flexibly report results to customers. For more information about Infovisa, visit ***************** Follow us on LinkedIn.
We are interested in every qualified candidate who is lawfully eligible to work in the United States. However, we are unable to sponsor visas.
Infovisa, Inc. is an Equal Opportunity Employer.
Auto-Apply