Post Job

Security Architect Jobs in Upper Darby, PA

- 199 Jobs
All
Security Architect
Security Engineer
Information Security Director
Senior Security Architect
Architect
Information Security Engineer
Information Systems Security Officer
Senior Information Security Consultant
Senior Security Consultant
  • Security Engineer

    United States Cold Storage, Inc. 4.4company rating

    Security Architect Job 8 miles from Upper Darby

    Who We Are: USCS is driven to advance, innovate and serve companies seeking the best service, facilities, and logistics in the cold chain. We are employee focused, an equal employment opportunity employer and would love to have you join our team. The Job Details: We are seeking a skilled Security Engineer to join our team and help protect our organization's systems, networks, and data from security threats. The ideal candidate will be responsible for implementing security systems, identifying vulnerabilities, and responding to incidents to ensure the confidentiality, integrity, and availability of our IT infrastructure. Key Responsibilities: Security Engineering & Architecture Design, implement, and maintain new and existing security solutions to protect company systems and networks. Collaborate with teams across the company to integrate security into system architectures. Manage and configure current security stack including SIEM, PAM, EDR and Identity Management systems Conduct security assessments of new technologies and recommend secure configurations. Security Operations & Incident Response Monitor security events and respond to incidents in a timely manner. Investigate and report on security breaches and recommend mitigation strategies. Conduct root cause analysis and forensic investigations to prevent future incidents. Develop and maintain incident response plans and playbooks. Governance, Risk, and Compliance (GRC) Develop and enforce security policies, procedures, and best practices. Ensure compliance with industry regulations and standards (e.g., ISO 27001, NIST, GDPR, SOC 2). Conduct security audits and risk assessments to identify vulnerabilities. Work with legal and compliance teams to address regulatory security requirements. Threat Intelligence & Security Awareness Stay up to date with emerging cybersecurity threats and technologies. Provide training and awareness programs for employees on cybersecurity best practices. Conduct phishing simulations and social engineering tests to measure awareness. Analyze threat intelligence reports to proactively strengthen security defenses. Identity & Access Management (IAM) Manage user access controls and authentication mechanisms (e.g., MFA, SSO). Ensure proper role-based access control (RBAC) implementation across systems. Conduct regular access reviews and audits to prevent privilege misuse. Monitor and respond to unauthorized access attempts and anomalies. Cloud & Application Security Secure cloud environments and ensure adherence to cloud security best practices. Work with developers to integrate security into the software development lifecycle (SDLC). Perform application security testing, including static and dynamic code analysis. Review and implement secure configurations for cloud services and containerized applications. The Job Specifics: Location, Department and Work Hours: Camden, Information Security Reports To: Sr. Manager, Security and Governance Travel Amount: May vary Job Type, EEO, and Job Code: Full-Time, Exempt Salaried, Bi-Weekly Paid Salary Range: $100,000.00 - $120,000.00 per year What We Are Looking For: Education: Bachelor's degree in computer science, Information Security, or equivalent work experience. Professional Security certification such as CISSP, CCSP, OSCP, etc. Experience: 5+ years of experience in information security, with a focus on security tooling and design. Hands-on experience with cloud platforms, e.g. Azure or Oracle Cloud) Proficiency in security technologies such as SIEM, EDR, Encryption, Privileged Access Management Experience implementing Phishing Campaigns and Cyber Training Knowledge of Zero Trust security models and advanced security solutions (e.g. segmentation, Identity Federation, Conditional Access, etc.) Experience with administration processes in both Windows and Linux space Ability to communicate and present security concepts to a wide range of audiences Familiarity with scripting and automation processes (PowerShell, Python, Bash). Excellent analytical and problem-solving skills. Strong communication and teamwork abilities. Other Abilities You Will Need to Have: The physical demands described below are representative of those required of an individual performing the essential duties of this position. Reasonable accommodation may be made to enable individuals with disabilities to perform their essential duties. Sit and/or stand for extended periods of time May require physical effort associated with using the computer to access information, or occasional standing, walking, lifting needed to carry out everyday activities. Understand and follow verbal instruction, written instruction and company policies. A starter that can work independently and coordinate with others Always follow safety procedures. Ability to manage stress and productivity guidelines The Standard Details: Always maintain a professional manner in appearance and communications. Participate in staff and/or customer meetings if required. Initiate, recommend, or provide solutions through appropriate channels. Verify the implementation of solutions. Follow posted security procedures at all times while in the building. Participate in Safety and Educational Training. What's In It for You: A great company with great people. Full-time employees not under contract are offered: 401K and Educational Assistance after 1 year; If elected, Blue Cross Blue Shield after 30 days of service; Company Life Insurance; and a bunch of other great perks. Things We Need to Mention: The above may not include all tasks necessary to complete the job. Job functions may vary based on area of operation. The job description is a listing of the most common tasks the associate will be required to perform in that job area. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties. Other Benefits Include: Medical, Dental, Vision, Prescription, Legal Insurance, Pet Discount, Critical Illness, Accident Insurance, Hospital Indemnity, Long Term Care + Permanent Life Insurance, Identity Theft Protection, Short Term Disability Insurance, Long Term Disability Insurance, Supplemental Disability Insurance, Basic Life Insurance, Accidental Death and Dismemberment Insurance, Supplemental Life Insurance, Supplemental Spouse Life Insurance, Child Life Insurance, Loan Solution, Health Flexible Spending Account, Dependent Flexible Spending Account, Telemedicine, Virtual Primary Care, Prescription Savings Plan, Prescription Specialty Copay Assistance Program, Weight Management Program, Chronic Condition Management, Care Navigator Program, 24/7 Nurse Line, Expert Medical Opinion, Precious Additions Maternity Program, Health Advocacy, Employee Assistance Program, Digital Cognitive Behavioral Therapy, Digital Physical Therapy, Behavioral and Mental Health Platforms, Auto and home discount program, Secure Travel Protection, Discount Programs, 401(k) plan, Education Assistance, Paid Time Off, Referral program & Commuter Benefit (NJ ONLY).
    $100k-120k yearly 13d ago
  • Security Engineer

    Coppel Tech

    Security Architect Job 8 miles from Upper Darby

    candidate - must be able to work EST hours Some feedback received - resumes rejected had experience in Security but not in software engineering and experience executing projects using agile methodologies. This is with XPKI - Xfinity public key infrastructure Comcast Cybersecurity Group - fall under CSSE (cybersecurity and software engineering) group builds software to support security - highly scalable large applications Team responsible for building and operating software 75% of the time technical, experience with cybersecurity, PKI, 25% looking for a Scrum master - Agile; familiar with Jira, Confluence running the Agile ceremonies, Scrum, ensuring delivery according to timelines product is mature, they are onboarding additional partners to the platform so must have Cybersecurity PKI background; meet with app teams and help to onboard onto the platform - needs an SME minimum of 3 years hands on experience in Cybersecurity, PKI, infrastructure domain Must have PKI Cybersecurity Standards experience Must also have Software Development skills - will act as a SME to onboard the new partners to the platform SAFE experience Any Cybersecurity cert also a plus Job Responsibilities: • Provide L1/L2 technical support for PKI services, including certificate management and security protocols. • Manage partner onboarding and user administration on Comcast PKI. • Troubleshoot issues related to digital certificates, SSL/TLS, code signing, and client authentication. • Support certificate lifecycle management, including issuance, renewal, and revocation. • Monitor and work with DevOps to maintain PKI environments, ensuring high availability and security compliance. • Respond to technical incidents, service requests, and provide root cause analysis. • Document troubleshooting processes and technical configurations • Lead PKI-related projects using Agile frameworks (Scrum, Kanban). • Plan, execute, and monitor project tasks, deliverables, and deadlines. • Collaborate with cross-functional teams, vendors, and stakeholders. • Facilitate Agile ceremonies such as sprint planning, daily standups, and retrospectives. • Ensure project documentation, risk assessments, and reports are up-to-date. • Work with project team to create and maintain comprehensive project documentation Skills: • Proficiency in Agile tools (e.g., Jira, Confluence) and frameworks (e.g., Scrum, SAFe). • Have great communication skills which include verbal, email and power point presentations • Knowledge of PKI concepts, including certificate authorities, cryptographic protocols, and HSM-based solutions. Required Experience: • 3+ years of experience in cybersecurity, PKI, or IT infrastructure. • 1+ years of experience in Agile project management (Scrum Master or Agile certifications a plus). • Strong knowledge of PKI concepts: certificate authorities, SSL/TLS, OCSP, CRLs, and key management. • Familiarity with PKI tools such as Microsoft CA, OpenSSL, KeyFactor, or DigiCert. • Experience with certificate lifecycle management platforms. • Ability to troubleshoot and resolve technical issues related to certificates and system integrations. • Basic knowledge of network protocols (HTTP, HTTPS, TCP/IP). • Experience creating user stories, sprint planning, grooming and managing product backlog. • Proven track record of delivering IT security projects. • Strong understanding of project management tools like Jira, Trello, or Azure DevOps. • Experience in vendor management and cross-team collaboration.
    $80k-111k yearly est. 6d ago
  • Architect (Oracle ERP/Fusion Solution)

    Hexaware Technologies 4.2company rating

    Security Architect Job 19 miles from Upper Darby

    About the job Hexaware is looking for Oracle Architect at Exton, PA Role: Oracle Architect Experience: 10+ years Work Mode: Onsite Job Description: The Onsite Oracle Architect is responsible for leading the design & implementation of Oracle ERP/Fusion solutions. This role requires a deep understanding of Oracle ERP/Fusion Cloud modules, architecture, and integration capabilities. The candidate will work closely with business stakeholders, technical teams, and project managers to deliver scalable and efficient solutions that align with organizational goals. Key Responsibilities Solution Design and Architecture Develop and design end-to-end Oracle ERP/Fusion Cloud solutions based on business requirements. Define and document architecture standards, best practices, and guidelines for Oracle ERP/Fusion implementations. Ensure scalability, performance, and security of the ERP architecture. Integration and Interfaces Design and implement integrations between Oracle ERP/Fusion and other enterprise systems using tools like Oracle Integration Cloud (OIC). Ensure seamless data flow and process automation across systems. Stakeholder Collaboration Collaborate with business stakeholders to gather and analyze requirements. Provide technical guidance and recommendations to ensure alignment with business objectives. Act as the primary point of contact for technical queries and escalations. Required Skills and Qualifications Technical Expertise Strong knowledge of Oracle ERP/Fusion Cloud architecture and modules (e.g., Financials, HCM, SCM, Procurement). Hands-on experience with Oracle Integration Cloud (OIC) and other integration tools. Proficiency in SQL, PL/SQL, and Oracle development tools. Experience 8+ years of experience in Oracle ERP implementations, with at least 3+ years in Oracle Fusion Cloud. Proven track record of leading large-scale ERP implementations. Experience in data migration, system integration, and customizations. Soft Skills Strong analytical and problem-solving skills. Excellent communication and stakeholder management abilities. Ability to work independently and lead cross-functional teams. Preferred Qualifications Oracle Cloud certifications in relevant modules (e.g., Financials, HCM, SCM). Experience with Agile or other project management methodologies. Knowledge of emerging Oracle technologies like AI/ML and advanced analytics. Work Environment Onsite role requiring close collaboration with clients and stakeholders. May involve travel to client locations based on project requirements. About Hexaware: Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPS and Consulting services. We are driven by a combination of robust strategies, passionate teams and a global culture rooted in innovation and automation. Hexaware's digital offerings have helped clients achieve operational excellence and customer delight. Our focus lies on taking a leadership position in helping clients attain customer intimacy as their competitive advantage. We are on a journey of metamorphosing the experiences of the customers by leveraging our industry-leading delivery and execution model, built around the strategy- ‘Automate Everything , Cloudify Everything , Transform Customer Experiences '. Powering Hexaware's complex technology solutions and services is the Bottom-Up Disruption, a disruptive crowdsourcing initiative that brings about innovation and improvement to everyday complexities and, ultimately, growing the clients' business. The digitally empowered, diverse and inclusive workforce of Hexaware represents various nationalities, comprising 28,000+ employees, and thoroughly lives the company's philosophy of “customer success, first and always”. Our global and diverse workforce across 20 nations, 34 international offices, and multiple time zones work together seamlessly to form an integral component of life at Hexaware. To learn more, visit **************** Why us? At Hexaware, you will have access to an arsenal of tools that will upskill, transform, and evolve your career profile. From great growth prospects, opportunities to work alongside brilliant minds, collaborating with high profile clients, to an ideal work-life balance, we bring it to a full circle. Our purpose at Hexaware is “Creating smiles through great people and technology.” With an ever-expanding portfolio of capabilities, we will delve deep and identify the source of our motivation. Although technology is at the core of our solutions, it is still the people and their passion that fuel Hexaware's commitment towards creating smiles. Our Value Proposition: “At Hexaware you are encouraged to challenge yourself to achieve your potential and propel your growth. We trust and empower you to disrupt the status quo and innovate for a better future. You will experience an open and inspiring culture that fosters learning and brings talented, passionate, and caring people together.” Privacy Statement: The information you provide will be used in accordance with the terms of our Privacy Policy and will be used specifically for the business/processing purpose of the event. You should be aware that we may share your details with our approved vendors for this event to be handled successfully.
    $79k-108k yearly est. 15d ago
  • Azure Architect

    Compunnel Inc. 4.4company rating

    Security Architect Job 13 miles from Upper Darby

    Duties and responsibilities Lead the design and deployment of Azure solutions leveraging best practices and architectural principles. Conduct assessments of existing applications and infrastructure to recommend migration strategies to Azure. Collaborate with cross-functional teams to gather technical requirements, define architecture specifications, and create comprehensive design documents. Provide guidance on Azure services, deployment models, and resource optimization to ensure solutions are cost-effective and scalable. Develop and maintain architecture diagrams, technical documentation, and solution roadmaps. Assist in troubleshooting and resolving technical issues during implementation and post-deployment phases. Stay up to date with Azure advancements, emerging technologies, and industry trends to inform architectural decisions. Implementation knowledge of Dev Ops, APIM, Snowflake and Databricks on Azure would be preferred. Azure Hands on knowledge is preferred. Requirements: Bachelor's degree in computer science, Information Technology, or related field, or equivalent experience. Microsoft Certified: Azure Solutions Architect Expert certification is required. Proven experience in designing and implementing complex cloud solutions on Azure. In-depth understanding of Azure services, networking, security, and identity management. Strong knowledge of cloud architecture patterns, best practices, and cost optimization strategies. Proficiency in scripting and automation using PowerShell, Azure CLI, or similar tools. Excellent critical thinking skills and the ability to troubleshoot complex technical issues. Effective communication skills to interact with technical and non-technical stakeholders. Beneficial to have insurance industry experience Work Environment: Hybrid (3 days onsite per week in Blue Bell, PA)
    $93k-122k yearly est. 11d ago
  • Deloitte Microsoft Technology Services Practice (DMTSP) - Security Pre-Sales Architect

    Deloitte 4.7company rating

    Security Architect Job 8 miles from Upper Darby

    Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest group of Cyber Risk individuals worldwide. Microsoft is an audit client for Deloitte - as a result, Deloitte does not and cannot have any form of alliance or partnership with Microsoft. Deloitte, however, can advise on and implement Microsoft products, and interact with Microsoft in certain ways in connection with these activities. When doing so, Deloitte and Microsoft must be sensitive to and mindful of the need for independence. Recruiting for this role ends on 4.1.25 Work you'll do As a DMTSP - Security Pre-Sales Architect, you will be at the front lines with our clients who have chosen the Microsoft technology platform and supporting them with their Cloud Cyber Risk needs specifically helping them navigate the journey on securing their Microsoft platform infrastructure such as Azure and Office 365 and the design and deployment of Microsoft Security solutions. This is a Deloitte services pre-sales role and not a project implementation role. This will include: * Lead or support proposals and/or also function as proposal lead architect with services potentially including the following Microsoft technologies: Microsoft Defender for Cloud, Azure Policies, Purview, Intune, Sentinel, Entra ID, Defender for Office, Defender for Endpoints and Servers, Defender for Vulnerabilities, Defender for Cloud Apps, Defender XDR and SCCM * Assist in business development activities such as defining scope of services, building resource estimates and related pricing, packaging proposals and supporting the delivery of the proposal to the client for security services at clients who may have selected Microsoft infrastructures. * Lead the delivery of cloud security analysis, recommendations and configurations of prospective clients' Microsoft Entra ID, Office 365 (O365), Exchange Online, Teams, OneDrive for Business, M365 Copilot and SharePoint Online environments based on Deloitte's Microsoft 365 Cyber Risk Framework. This can include leveraging security solutions services which may include Microsoft's technology products such as Entra, Purview, Defender, Intune, and Sentinel. * Support or lead the delivery of Cyber Security workshops with clients(remote/in-person) including building demo labs, PowerPoint decks and Deloitte best practice perspectives * Function as a Cyber security architect (experienced in applicable Microsoft technologies) supporting Deloitte project teams for practice development and eminence * Function as deep subject matter expert on Microsoft security and securing Microsoft solutions staying abreast of Gartner research and Microsoft product roadmaps and advising Deloitte teams and clients on new developments. * Function as the primary client day-to-day interface building rapport and trust with the client. * Perform technical health checks of client's Microsoft platforms/environments as part of client development activities prior to broader deployments. * When clients have expressed a desire to discuss Microsoft technologies, assist clients in a pre-sales role, with transitions to the Microsoft 365 security services such as solution setup and service configuration, focused on risk mitigation. Additional technologies include MFA, Conditional Access, Purview Compliance Manager, M365 Defender, Defender for O365, Defender for Cloud Apps (MDCA), Purview Information Protection (MPIP), Purview Data Loss Prevention (DLP). * Implement industry leading practices around M365 E5 cyber risks and cloud security for clients. * As part of the Deloitte Microsoft Technology Services security practice development and eminence activities; Design and develop cloud-specific security policies, standards and procedures e.g., O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management. * Provide internal technical training to Advisory personnel as needed. * Act as a subject matter expert on cloud cyber risk for Microsoft Purview, Microsoft Intune, Entra ID, Azure security, Microsoft Defender, and Microsoft Sentinel capabilities. * Lead the development of Point-of-Views (PoVs) on providing leading practices to our clients on Cyber, including the Microsoft security challenges they face. * Support talent process in the architect role such as for recruiting and coaching. * Function as an expert in CNAPP, CWPP and CSPM technologies and security risk frameworks relevant to cloud as well as the Microsoft Cloud Security Benchmark The successful candidate will possess: * Strong critical thinking, analysis, and problem-solving skills * Strong written and oral communication skills * Experience working independently as well as collaboratively across large teams The team Deloitte Advisory's Cloud Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice. Qualifications Required: * 5+ years of experience in technical consulting, client problem solving, architecting and designing solutions in a consulting role with project leadership and/or architect experience with Microsoft technologies * 5+ years of hands-on technical experience with securing Microsoft 365 enterprise-level messaging and collaboration and/or Azure Infrastructure in implementation and operations. * 5+ years of hands-on technical experience with enterprise-level systems management systems such as SCCM, End point security and Intune and endpoint engineering (MEM) and mobile device management (MAM & MDM)) implementation or operations. * 5+ years of hands-on technical and project / professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (e.g. Defender for Endpoints and Defender for Servers), Microsoft Sentinel, Microsoft's email security platform (Defender for Office), Microsoft Purview, Azure security & Entra ID * Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve * Limited sponsorship may be available Preferred: * BA/BS Degree preferred. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. * Microsoft Certifications such as: (SC-900, SC-100, SC-200, SC-300, SC-400, AZ 500), * Cyber Certifications such as: CCSP, CCSK, CISSP, CCNP, and CCNA. Ideally the following technical experience is a plus in any of the technologies below: * Microsoft Security Copilot * Defender for Vulnerabilities * Defender for Cloud Apps * Defender XDR * Experience with Azure data, analytics, or AI/ML services (Azure SQL, HDInsight, Databricks, Data Factory, Data Lake Storage, Azure Analysis Services, Synapse Analytics, Azure Machine Learning, etc.) The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500.00 to $210,600.00. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Information for applicants with a need for accommodation:Hyperlink: ************************************************************************************************************ #DeloitteNDO, #SalesOpsGreenDot Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our client most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte's purpose is to make an impact that matters for our clients, our people, and in our communities. We are creating trust and confidence in a more equitable society. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. We are focusing our collective efforts to advance sustainability, equity, and trust that come to life through our core commitments. Learn more about Deloitte's purpose, commitments, and impact. Professional development From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. As used in this posting, "Deloitte Advisory" means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. These entities are separate subsidiaries of Deloitte LLP. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. Deloitte will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance. See notices of various ban-the-box laws where available. Requisition code: 211073
    $102.5k-210.6k yearly 12d ago
  • Enterprise Cloud Security Architect

    Burlington Coat Factory Corporation 4.2company rating

    Security Architect Job 20 miles from Upper Darby

    As the Enterprise Cloud Security Architect you will promote and lead the adoption of "secure by design" practices. You will develop, maintain, and evolve enterprise cloud security architecture, and coordinate and manage the successful delivery of cybersecurity architecture services for IT projects to ensure enterprise cloud technology solutions comply with security policies, standards, and requirements. This role will work with project teams to define the cybersecurity scope, work effort, and deliverables and execute multiple projects in parallel. The architect is expected to effectively exercise leadership and provide guidance to enable the team's success. This role is also responsible for the continued improvement and development of the cloud cybersecurity architecture service. The architect must be able to draw from a deep background in cloud technology and security principles and solutions, as well as their understanding of the business, to clearly articulate and discuss identified business risks and various options for mitigating those risks. A Day In The Life + Develop, deploy and maintain Burlington's cloud cybersecurity architecture standards, including cybersecurity reference architectures and design patterns. + Identify security control requirements for cloud technology initiatives and deliver effective and practical solutions to meet those requirements in alignment with the overall objectives of the project and the business. + Lead the cybersecurity architecture aspects of enterprise cloud initiatives, in particularly in the increasing adoption of various cloud services (IaaS, PaaS, and SaaS) from key cloud service providers. + Develop and improve cloud cybersecurity architecture service in conjunction and alignment with other cybersecurity architecture services. + Assess the business impact of cloud cybersecurity risks in the enterprise and identify options and recommendations for mitigating those risks. + Contribute to the development and maintenance of information security strategy and architecture, promote and adopt "secure by design" practices. + Evaluate and develop secure cloud solutions based on approved security architectures. To Be Successful You Should Possess + Bachelor degree in Computer Science or a similar field is preferred. + Minimum of ten-year experience in a related field, at least five years in cloud cybersecurity architecture. + In-depth knowledge of cybersecurity frameworks including but not limited to NIST, ISO/IEC 27001 and PCI DSS. + Expert knowledge of TOGAF and SABSA frameworks and their respective application. + Thorough understanding of enterprise risk management principles and processes. + Experience in the information security field and expertise in platform, application, storage, data, network, virtualization, cloud and mobile security, accentuated with in-depth knowledge of security capabilities of one or more public cloud platforms (Azure, GCP, AWS). + A strong understanding of enterprise technologies, operations, and architectural principles and models. Knowledge of virtualized data center architectures and operations, SOA-type deployments, web services and multi-tier web applications, directory services, cloud services, and WAN/MAN/LAN wired and wireless protocols and technologies supporting a diverse set of business use cases. + A solid record of successfully designing and deploying numerous enterprise technical security services such as SIEM, DLP, PKI, IDS/IPS, and enterprise authentication/authorization frameworks and models. + Experience in cloud migration and operational optimization. Come join our team. You're going to like it here! You will enjoy a competitive wage, flexible hours, and an associate discount. Burlington's benefits package includes medical, dental and vision coverage including life and disability insurance. Full time associates are also eligible for paid time off, paid holidays and a 401(k) plan. We are a rapidly growing brand and provide a variety of training and development opportunities so our associates can grow with us. Our teams work hard and have fun together! Burlington associates make a difference in the lives of customers, colleagues, and the communities where we live and work every day. Burlington Stores, Inc. is an equal opportunity employer committed to workplace diversity. \#LI-TG1 Posting Number _2025-228843_ Location _US-NJ-Edgewater Park_ _Address_ _4287 Route 130 S_ _Zip Code_ _08010_ Workplace Type _Hybrid_ Position Type _Regular Full-Time_ Career Site Category _Corporate_ Position Category _Information Technology_ Evergreen _No_ Min _USD $150,000.00/Annual_ Mid _USD $190,000.00/Annual_
    $150k-190k yearly 27d ago
  • Sr. Security Architect I (II)

    PJM Interconnection 4.8company rating

    Security Architect Job 15 miles from Upper Darby

    *Flexible Work Arrangement: Hybrid* Cyber threats change at a rapid pace, and cybersecurity approaches must transform to provide effective protection and enable business innovation. As part of the Security Engineering and Architecture department, the Sr. Security Architect I (II) plays a key role in development of the security strategy, defining roadmaps for achieving security objectives, architect secure solutions in partnership with enterprise architecture and application architecture, and build security into systems by collaborating with development teams and other internal technology groups. This individual will solve security challenges with implementing and integrating cloud-based services into PJM's business processes, implementing zero trust architecture principals, managing and controlling big data, and leveraging machine learning processes to solve complex business problems. Essential Functions: Researches and supports development and advancement of a comprehensive security strategy and strategic roadmap. Develops and maintains high quality documentation for cyber security policies, architectures, and standards. Works across the organization to communicate security approaches and that internal and external stakeholders support the changes. Supports cross-functional programs that advance security, such as zero-trust architecture, cloud security, data and analytics, machine learning, and security automation. Monitors technical advancements and makes recommendations to improve network, system and application security architectures. Supports enterprise architecture and application architecture initiatives and creates corresponding security design patterns. Consults with project teams to design secure architecture for new projects in alignment with agreed upon security design patterns. Supports application security assessments by developing improved tools and approaches for assessing security. Defines data security policies and processes to protect corporate data. Develops security solutions based on NIST Cybersecurity Framework (CSF) guidelines. Supports architectural guidance team to evaluate project proposals for architectural fit. Assists in prioritizing security efforts to balance security risks with operational and business risks. Assists team and department management in developing work plans, including scope, milestones, schedule, releases, resources and deliverables. Builds strong relationships with stakeholders by providing superior customer support as demonstrated by clearly owning, resolving and communicating issues and problems, and being responsive to needs, requirements, and deadlines. Supports the Cyber Security Incident Response Team (CSIRT) process by participating in various responder roles. Characteristics & Qualifications: Required: Bachelor's Degree in Computer Engineering, Computer Science, Information Technology or equivalent work experience At least 5 years of experience overall IT/IS experience At least 2 years of experience with security engineering/architecture Two or more of the following: applications (on-prem or cloud-based), networks, operating systems, or DevOps. Cloud security experience such as implementing landing zone, encryption, identity and access management, security monitoring, infrastructure as code (IaC), cloud workload protection platform (CWPP), control plane configuration and cloud security posture management (CSPM) solutions. Ability to produce high-quality work products with attention to detail Ability to visualize and solve complex problems Experience with NERC Critical Infrastructure Protection (CIP) Standards Ability to collaborate, influence, and partner with business units Experience using Microsoft Project Experience with Operating Systems, networks, storage technologies, software development, databases, and security concepts Experience using effective verbal and written communications skills Preferred: Experience with PJM operations, markets, and planning functions Experience implementing zero trust architecture, data and analytics, machine learning, and security automation. Experience with defining data security policies and processes to protect corporate data as part of Data Security Governance. Experience working in a regulated industry (especially NERC CIP). Experience with NIST CSF. Experience working with varying levels of classified data. Knowledge and experience of importance of diversity and inclusion at workplace and its effective use to improve PJM's business functions as it relates to assigned responsibilities. Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM)
    $89k-109k yearly est. 6d ago
  • Senior Security Architect - Azure Cloud

    EPAM Systems 4.5company rating

    Security Architect Job 9 miles from Upper Darby

    We are seeking a highly skilled and experienced **Azure Security Architect** to lead the design, implementation, and management of secure cloud solutions on Microsoft Azure. As an Azure Security Architect, you will be responsible for ensuring the security of cloud-based applications and services, implementing security best practices, and mitigating risks across the Azure environment. You will collaborate with cross-functional teams, including IT, DevOps, and development teams, to design and enforce security policies, frameworks, and solutions. Req.#776574920 **\#LI-DNI** **Responsibilities** + Design and implement secure cloud architectures for Microsoft Azure environments + Define security standards, best practices, and policies to ensure cloud systems meet compliance and regulatory requirements (e.g., GDPR, HIPAA) + Develop and maintain Azure security policies, governance frameworks, and technical security controls + Perform security assessments, identify vulnerabilities, and lead remediation efforts to address risks and threats within the Azure environment + Architect and implement identity and access management (IAM), encryption, and security monitoring solutions + Collaborate with DevOps and development teams to integrate security into the CI/CD pipeline + Conduct risk assessments, threat modeling, and security reviews for cloud-based solutions + Stay current with Azure security technologies and industry best practices and recommend improvements or new tools as necessary + Ensure the security of Azure-based services such as Azure AD, Azure Key Vault, Azure Security Center, and Azure Sentinel + Provide guidance and mentorship to team members on security best practices + Assist in incident response activities and security investigations **Requirements** + Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience) + 5+ years of experience in cloud security with a focus on Azure security architecture and design + Strong understanding of Azure services and security capabilities, including Azure AD, Azure Key Vault, Azure Policy, and Azure Security Center + Experience with identity and access management (IAM), multi-factor authentication (MFA), and role-based access control (RBAC) in Azure + Proficiency in implementing security tools, such as Azure Sentinel, Microsoft Defender for Cloud, and Azure Firewall + Deep knowledge of network security, including firewalls, VPNs, and encryption protocols + Strong understanding of compliance frameworks such as GDPR, HIPAA, PCI-DSS, and other industry-specific standards + Excellent communication skills with the ability to articulate complex security concepts to non-technical stakeholders + Relevant certifications such as Microsoft Certified: Azure Solutions Architect Expert, Microsoft Certified: Azure Security Engineer Associate, CISSP, or CISM are a plus + Experience with infrastructure-as-code (IaC) tools like Terraform, ARM templates, or Azure Resource Manager + Knowledge of scripting and automation languages such as PowerShell, Python, or Bash + Familiarity with DevSecOps practices and integrating security into CI/CD pipelines + Experience with hybrid cloud security and securing multi-cloud environments + Travel to client site 2 weeks out of every month in Taylor, TX **We offer** + Medical, Dental and Vision Insurance (Subsidized) + Health Savings Account + Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) + Short-Term and Long-Term Disability (Company Provided) + Life and AD&D Insurance (Company Provided) + Employee Assistance Program + Unlimited access to LinkedIn learning solutions + Matched 401(k) Retirement Savings Plan + Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time) + Paid Holidays - nine (9) total per year + Legal Plan and Identity Theft Protection + Accident Insurance + Employee Discounts + Pet Insurance + Employee Stock Purchase Program + If otherwise eligible, participation in the discretionary annual bonus program + If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program **This Remote Position Cannot be Performed in New York City.** EPAM is a leading global provider of digital platform engineering and development services. We are committed to having a positive impact on our customers, our employees, and our communities. We embrace a dynamic and inclusive culture. Here you will collaborate with multi-national teams, contribute to a myriad of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow. No matter where you are located, you will join a dedicated, creative, and diverse community that will help you discover your fullest potential. YouTube video player (*************************************************************** This posting includes a good faith range of the salary EPAM would reasonably expect to pay the selected candidate. The range provided reflects base salary only. Individual compensation offers within the range are based on a variety of factors, including, but not limited to: geographic location, experience, credentials, education, training; the demand for the role; and overall business and labor market considerations. Most candidates are hired at a salary within the range disclosed. Salary range: $175,000 - $200,000. In addition, the details highlighted in this job posting above are a general description of all other expected benefits and compensation for the position. Applications will be accepted on a rolling basis. In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 27 24 (lacounty.gov) It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone. At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
    $175k-200k yearly 35d ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Security Architect Job 8 miles from Upper Darby

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $243.8k-278.2k yearly 60d+ ago
  • Information Security Director

    Essential Utilities

    Security Architect Job 5 miles from Upper Darby

    Essential Utilities, Inc. delivers safe, clean, reliable services that improve quality of life for individuals, families, and entire communities. Operating as the Aqua (water and wastewater services) and the Peoples and Delta (natural gas) brands, Essential serves approximately 5.5 million people across 10 states. We are committed to sustainable growth, operational excellence, a superior customer experience, and premier employer status - including a competitive and comprehensive benefits package as well as a commitment to career growth opportunities. We are advocates for the communities we serve and are dedicated stewards of natural lands, protecting more than 7,600 acres of forests and other habitats throughout our footprint. Our company is one of the most significant publicly traded water, wastewater service and natural gas providers in the U.S. Essential Utilities is now looking to appoint an Information Security (InfoSec) Director who will play a critical role in leading and spearheading Information Security, Cybersecurity, Technology Risk Management and Compliance across Information Technology (IT) and Operational Technology (OT). As InfoSec Director you will collaborate closely with OT, IT, and business stakeholders at all levels across our Water, Wastewater, and Natural Gas sectors, with this role tasked with ensuring the development, implementation and operation of programs, capabilities, governance, and policies that enable the organization to innovate and operate efficiently while effectively managing cyber risks and ensuring compliance with regulatory requirements. Ready to take your career to the next level? Let's Talk! Key accountabilities include: Functioning as the strategic leader for Information Security, Cybersecurity, Compliance and Privacy, acting as a subject matter expert responsible for strategy, standards, policies, and control frameworks. Direct and provide a strategic risk management vision to effectively secure the business while supporting innovation and execution. Experience developing multi-year strategic roadmaps addressing the threat and compliance landscapes for both IT and OT/ICS/SCADA. Ensuring alignment with regulatory compliance obligations and emerging cybersecurity standards. Foster an enterprise-wide culture of security awareness for both IT and OT. Oversees and manages the teams and functions for Security Operations & Engineering, Governance Risk and Compliance (GRC), Identity & Access Management, and SAP Security. Ensure operation and continuous improvement of capabilities for vulnerability management, threat management, and incident response. Engage with regulators and industry groups on topics related to cybersecurity in critical infrastructure. The ideal candidate will possess strong technical expertise in environments with large, complex, and distributed technology environments with experience in enterprise IT and OT, with regulated utilities experience preferred. Ability to communicate with both technical teams and executive leadership appropriately, with effective stakeholder management at all levels. Required Experience, Education, Licenses, and Certifications: Minimum of 10 years leadership role in technology with at least five having direct responsibility for Information Security programs and strategy management. B.S. or equivalent degree in Computer Science, Engineering, Information Sciences & Technology, Information Assurance, or related field. Certifications: CISSP and CISM strongly preferred with other advanced certifications (e.g. GCIH, CRISC, GRID, GICSP, CISA, ISSMP/ISSEP/ISSAP, etc.) considered a plus. Expert in cyber risk management, knowing how to effectively use both qualitative and quantitative approaches, and ability to define effective risk treatment strategies. Experience effectively leveraging security frameworks, guidance and best practices including NIST CSF, CIS Critical Security Controls, CIS Benchmarks. Experience with critical industrial operations including SCADA/ICS, with utilities industry experience preferred. Expert level knowledge of security technologies, functions and services including Threat Intelligence, Security Operations Centers, SIEM, Firewall Engineering, Network Security, Authentication, EDR/Anti-Malware, Encryption, PKI, Forensics, Intrusion Detection and Prevention. Essential Utilities, Inc., is an Equal Opportunity/Affirmative Action employer. Equal employment opportunity is provided to all employees and applicants for employment without regard to the following legally protected characteristics: race, color, religion, sex, national origin, age, pregnancy (including childbirth and related medical conditions, including medical conditions related to lactation), physical or mental disability, covered-veteran status, genetic information (including testing and characteristics), sexual orientation, gender identity or expression or any other characteristic protected by applicable local, state or federal law. Essential Utilities is committed to providing reasonable accommodation to individuals with disabilities. If you have a condition that may prevent you from applying for a job online or need to request an accommodation during the interview process, please call (***************. To maintain the integrity of the recruitment process and to avoid real or perceived conflicts of interest due to employment and/or assignment of family members and personal referrals, specific guidelines apply to the hiring and assignment of these individuals including, but not limited to: Family members cannot result in a supervisor/subordinate reporting relationship Family members cannot work in the same department.
    $113k-169k yearly est. 60d+ ago
  • Director - Information Security

    The Projex Group

    Security Architect Job 8 miles from Upper Darby

    The Director - Information Security is a "CISO" type role. This is the role of a strategic leader responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. This role will report directly to the CIO and will be responsible for directing staff in identifying, developing, implementing, and maintaining processes across the organization to reduce information and information technology (IT) risks, respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. Leads company's IT technological strategies in support of the company's mission and core objectives, providing leadership, vision, and management of IT Teams. Ensures the effective operation of all IT systems and functions. Accountable for the management, mentoring, and career development of the IT staff members. PRIMARY RESPONSIBILITIES Strategic Planning and Financial Oversight Develops and maintains a culture of security that emphasizes the enterprise-wide responsibility for ALL COMPANY employees. Develops and maintains a comprehensive cloud security strategy aligned with the organization's overall security objectives and the larger organizational cloud strategy. Assures the alignment of IT and business strategy with particular focus on thought leadership and innovation. Must be able to design and execute multi-year road maps in order to transform COMPANY environment and collaborate with COMPANY, SBR and copany entities for technological efficiencies. Develops strategic annual and long-term business plans and operational budgets for responsible IT areas. Tracks implementations to ensure financial and service targets are met according to timelines. Leadership and Operations Management Creates a security strategy and roadmap to drive the organization towards a more secure future. Directs and manages IT Department activities and operations. Leads multiple teams of various levels of employees and consultants through the prioritization and implementation of project-related activities. Provides motivational career development and assessment of team members. Fosters and encourages a diverse, inclusive team. Service Delivery and Stakeholder Management Drives the incident response plan for the organization enrolling leadership to follow a well-rehearsed plan when a cyber event occurs. Oversees and negotiates service level agreements with internal and external stakeholders. Tracks service delivery to ensure agreed targets and standards are met. Directs relationships with vendors and ensures that vendors meet COMPANY business objectives/objectives, SLAs, and deliverables in a timely manner and within budget guidelines. Interacts with major suppliers, overseeing RFPs, bids, contracts, and service agreements. Project Planning and Resource Allocation Directs the design and implementation of security solutions that are secure, scalable, reliable, and cost-effective. Determines the value and ROI of every IT-related project. Prioritizes the scheduling and implementation of major IT projects to ensure the efficient utilization of resources. Identifies IT resources required to meet defined business objectives. Develops and defends opportunities for continuous creative improvement of processes and systems. Acts as a change agent for new technologies and processes in the COMPANY environment. Oversees the creation and maintenance of policies and procedures that protect the organization's computing infrastructure and data. Policy Development and Implementation Collaborates with Legal and Government Relations/Compliance teams to ensure compliance with relevant laws, regulations, and policies. Advocates for changes in other departments' practices to ensure compliance with security policies. Directs the planning, production, and implementation of information and for COMPANY technology-related systems policies, procedures, and regulations. QUALIFICATIONS Demonstrated senior-level IT management experience, adept at shaping and executing complex IT strategies. Executive presence in gaining consensus across all parties. Proven track record managing budgets ranging from $4 million to $10 million, showcasing financial acumen in IT operations. Proficiency in articulating intricate technical concepts to non-technical stakeholders in a clear concise manner. Proficient in leading multiple IT disciplines, including software development, technical support, and systems architecture, showcasing adept project management skills. In-depth understanding of computer systems, applications, operating systems, and robust knowledge of data security protocols. Ability to ensure all systems are secured at all times. Strong negotiation skills and a collaborative approach in dealings with third-party IT business partners. Critical Thinking and Decision-Making (proficiency: High): Advanced decision-making and problem-solving skills, essential for navigating complex IT landscapes and quickly addressing challenges.
    $115k-173k yearly est. 60d+ ago
  • Director of Information Security

    City of Philadelphia 4.6company rating

    Security Architect Job 8 miles from Upper Darby

    A best-in-class city that attracts best-in-class talent, Philadelphia is an incredible place to build a career. From our thriving arts scene and rich history to our culture of passion and grit, there are countless reasons to love living and working here. With a workforce of over 30,000 people, and more than 1,000 different job categories, the City of Philadelphia offers boundless opportunities to make an impact. As an employer, the City of Philadelphia values inclusion, integrity, innovation, empowerment, and hard work above all else. We offer a vibrant work environment, comprehensive health care and benefits, and the experience you need to grow and excel. If you're interested in working with a passionate team of people who care about the future of Philadelphia, start here. What We Offer: • Impact - The work you do here matters to millions. • Growth - Philadelphia is growing, why not grow with it? • Diversity & Inclusion - Find a career in a place where everyone belongs. • Benefits - We care about your well-being. The Office of Innovation & Technology (OIT) is the central IT agency for the City of Philadelphia headed by the Chief Information Officer (CIO). OIT oversees all major information and communications technology initiatives for the City of Philadelphia - increasing the effectiveness of the information technology infrastructure, where the services provided are advanced, optimized, and responsive to the needs of the City of Philadelphia's businesses, residents, and visitors. OIT responsibilities include: identifying the most effective approach for implementing new information technology directions throughout city government; improving the value of the city's technology assets and the return on the city's technology investments; ensuring data security continuity; planning for continuing operations in the event of disruption of information technology or communications services; and supporting accountable, efficient and effective government across every city department, board, commission and agency. Job Description The Philadelphia International Airport is managed by the Department of Aviation of the City of Philadelphia. The airport handles approximately 82,000 travelers per day. The airport Information Technology department is headed by the Chief Information Officer (CIO). As the Director of Information Security, you will play a pivotal role in safeguarding the confidentiality, integrity, and availability of Philadelphia International Airport's information assets. Reporting directly to the Chief Information Security Officer (CISO), you will be tasked with leading strategic initiatives to mitigate cyber threats, ensure compliance with industry regulations & standards. Must have a sound business acumen to help identify, evaluate and report information security risks in a manner that supports the risk posture of the organization. Essential Functions and Responsibilities: Strategic Leadership - Collaborate with the CISO and senior leadership to develop and maintain the organization's information security strategy, policies, and procedures. Provide strategic direction and guidance to the information security team, aligning security initiatives with business objectives and risk tolerance. Risk Management - Lead the identification, assessment, and prioritization of information security risks, threats, and vulnerabilities across the organization's IT infrastructure and systems. Implement risk mitigation strategies and controls to address identified risks effectively. Develop capabilities to manage third party Cybersecurity risks. Security Governance & Compliance - Lead the identification, assessment, and prioritization of information security risks, threats, and vulnerabilities across the organization's IT infrastructure and systems. Develop risk mitigation strategies and controls to address identified risks effectively. Threat Management - Execute strategies for continuous monitoring of network traffic, system logs, and user activities to identify unauthorized or suspicious behavior. Review security monitoring tools, technologies to detect and alert potential security incidents and anomalies. Maintain incident response plans and procedures to effectively respond to and mitigate security incidents. Lead the investigation of security breaches and incidents, coordinating response efforts and implementing corrective actions as necessary. Third Party Risk Management -Assess and manage risks associated with third-party vendors and service providers, ensuring contractual obligations and security requirements are met. Develop processes for evaluating monitoring vendor security posture and performance. Security Operations & Technology -Oversee the implementation and maintenance of security technologies and tools, ensuring they effectively identify, protect, detect, respond, and recover to security threats & vulnerabilities. Change Management -Lead change management committee for reviewing, approving, and implementing changes and ensuring security controls, configurations are updated and maintained. Foster open communication and collaboration among stakeholders, creating forums for dialogue to facilitate decision-making and address concerns related to change initiatives. Experience/Required skills: Strong leadership and management skills are essential for effectively leading a team of security professionals. Proficiency in risk management is necessary for identifying, assessing, and mitigating information security risks. In-depth knowledge of security architecture and design is necessary for developing and implementing robust security controls. Expertise in security operations is essential for monitoring, detecting, and responding to security threats and incidents. A comprehensive understanding of compliance and regulatory requirements is crucial for ensuring that the organization's security practices align with relevant standards and regulations. Excellent communication and presentation skills are needed for effectively conveying complex security concepts to non-technical stakeholders. Strategic planning and execution skills are essential for developing and implementing a comprehensive information security strategy aligned with business objectives. Proficiency in vendor management is necessary for evaluating and selecting security vendors and managing vendor relationships effectively. Strong team building, and development skills are crucial for fostering a collaborative and high-performing security team. Desired Experience and Abilities: Proficiency in analyzing, evaluating security threats and vulnerabilities, as well as assessing the potential impact on the organization. Extensive experience in conducting thorough risk assessments, vulnerability assessments, and penetration testing to identify and prioritize security risks. Ability to architect and integrate security solutions into the organization's infrastructure, ensuring the confidentiality, integrity, and availability of information assets. Commitment to staying updated on emerging security threats, trends, and technologies. Ability to adapt to evolving security challenges and requirements, proactively adjusting security strategies and tactics to address new threats and vulnerabilities. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. Coordinate information security and risk management projects with resources from the IT organization and business unit teams. Familiarity with cybersecurity principles, tools, and best practices. Qualifications Bachelor's degree in Computer Science, Information Technology, Information Systems or a related field; Master's degree preferred. Minimum of 10 years of progressive experience in information security, with 5 years of leadership or managerial experience. Proven track record of developing and implementing information security strategies and initiatives in alignment with NIST Cybersecurity Framework. Experience with conducting risk assessments, vulnerability assessments, and developing risk mitigation strategies. Excellent leadership and communication skills, with the ability to collaborate effectively with cross-functional teams and influence stakeholders at all levels of the organization. Strong analytical and problem-solving abilities, with a keen attention to detail and the ability to prioritize and manage multiple tasks simultaneously. In-depth knowledge of cybersecurity principles, technologies, and best practices. Strong understanding of regulatory requirements and compliance frameworks. Excellent leadership, communication, and stakeholder management skills. Relevant certifications such as CISSP, CISM, or CRISC are highly desirable. Experience with security compliance frameworks (e.g., CIS, NIS CSF, NIST RMF, ISO 27001) is a plus. Additional Information Salary Range: $120,000 - $130,000 Starting salary to be determined based on experience and qualifications. Important: To apply, candidates must provide a cover letter and a resume. SPECIAL REQUIREMENTS: Must be a Philadelphia resident. Successful candidate must be a city of Philadelphia resident within six months of hire. Candidate must pass a background check. PHYSICAL AND MENTAL DEMANDS: Position requires a high level of mental concentration and commitment. Discover the Perks of Being a City of Philadelphia Employee: • We offer Comprehensive health coverage for employees and their eligible dependents • Our wellness program offers eligibility into the discounted medical plan • Employees receive paid vacation, sick leave, and holidays • Generous retirement savings options are available • Pay off your student loans faster - As a qualifying employer, City of Philadelphia employees are eligible to participate in the Public Service Loan Forgiveness program. Join the ranks of hundreds of employees who have already benefited from this program and achieved student loan forgiveness. • Enjoy a Free Commute on SEPTA - Starting September 1, 2023, eligible City employees will no longer have to worry about paying for SEPTA public transportation. Whether you're a full-time, part-time, or provisional employee, you can seize the opportunity to sign up for the SEPTA Key Advantage Program and receive free Key cards for free rides on SEPTA buses, trains, trolleys, and regional rails. • Unlock Tuition Discounts and Scholarships - The City of Philadelphia has forged partnerships with over a dozen esteemed colleges and universities in the area, ensuring that our employees have access to a wide range of tuition discounts and scholarships. Experience savings of 10% to 40% on your educational expenses, extending not only to City employees but in some cases, spouse and dependents too! Join the City of Philadelphia team today and seize these incredible benefits designed to enhance your financial well-being and personal growth! *The successful candidate must be a city of Philadelphia resident within six months of hire Effective May 22, 2023, vaccinations are no longer required for new employees that work in non-medical, non-emergency or patient facing positions with the City of Philadelphia. As a result, only employees in positions providing services that are patient-facing medical care (ex: Nurses, doctors, emergency medical personnel), must be fully vaccinated. The City of Philadelphia is an Equal Opportunity employer and does not permit discrimination based on race, ethnicity, color, sex, sexual orientation, gender identity, religion, national origin, ancestry, age, disability, marital status, source of income, familial status, genetic information or domestic or sexual violence victim status. If you believe you were discriminated against, call the Philadelphia Commission on Human Relations at ************ or send an email to [email protected].
    $120k-130k yearly 49d ago
  • Senior Security Consultant

    Layer 8 Security

    Security Architect Job 14 miles from Upper Darby

    Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies. Our team is dedicated to helping organizations enhance their security posture through cutting-edge engagements, innovative solutions, and a client-first approach. We are seeking a Senior Security Consultant with a strong offensive security background to join our team. Position Overview: The Senior Security Consultant will be responsible for conducting offensive cybersecurity engagements, working closely with clients to identify vulnerabilities, assess security controls, and provide remediation guidance. While the primary focus of this role is offensive security, the position also includes defensive responsibilities such as incident response support and collaboration with blue teams to enhance organizational security. Key Responsibilities: * Lead and execute offensive security engagements, including but not limited to: * Red teaming * Network penetration testing (internal/external) * Application security assessments * Cloud security assessments * Defensive capability testing * Physical security assessments * Conduct social engineering campaigns, including phishing simulations * Conduct security assessments of Windows and *NIX-based environments, applying offensive techniques to evaluate security postures. * Perform network exploitation and testing, leveraging deep knowledge of networking protocols and security controls. * Assess and exploit Active Directory environments, evaluating security weaknesses and providing mitigation recommendations. * Support incident response efforts by assisting in threat identification, adversary simulation, and defensive improvement strategies. * Communicate technical findings effectively to clients, team members, and senior leadership through clear, well-structured reports and presentations. * Provide mentorship and guidance to junior consultants, fostering a culture of continuous learning and skill development. * Stay current with emerging threats, tools, and techniques to continuously improve offensive security methodologies. * Manage projects efficiently, ensuring timely delivery of high-quality work while meeting client expectations. Required Qualifications: * Hands-on experience with offensive security assessments, including vulnerability identification and exploitation. * Strong foundational knowledge of defensive security concepts and methodologies. * Proficiency with Windows and *NIX-based operating systems. * Strong understanding of networking concepts, including TCP/IP, common network protocols, and offensive tactics. * Knowledge of Active Directory security and common attack techniques (e.g., Kerberoasting, NTLM relay, lateral movement strategies). * Knowledge of application security assessments and associated industry-standard tooling. * Ability to contribute to the full lifecycle of offensive security service offerings, from scoping and assessment to reporting and remediation guidance. * Experience with incident response support, such as forensic analysis, threat detection, and security monitoring. * Development or scripting experience in languages such as Python, PowerShell, Bash, or C/C++. * Excellent analytical skills, with the ability to interpret and present complex security information in an understandable format. * Strong interpersonal and communication skills, with the ability to articulate security risks to both technical and non-technical audiences. * Self-directed, highly organized, and capable of managing multiple engagements simultaneously. * Must be able to pass a criminal background check. * Must embody Layer 8 Security's core values: * Integrity Always - We prioritize truth, even when it's difficult. * Drive It Forward - We strive to get the job done and improve every day. * Innovate - Adaptation is constant to remain relevant. * Have Fun - Otherwise, what's the point? Nice to Haves: * Industry certifications such as PNPT, OSCP, OSWE, CRTO, CRTP, CPTS or equivalent. * Experience working for a service-based security consultancy. * Public community contributions (e.g., conference presentations, blog posts, white papers, public tool development, CTF participation) * Experience conducting purple team engagements and working closely with defensive teams to improve security controls. * Experience with adversary emulation frameworks and automated attack simulation tools. * Knowledge of security research methodologies, exploit development, and vulnerability discovery. * Background in malware analysis, threat intelligence, or digital forensics. * Experience in hardware security assessments. * Experience in system administration, help desk, or similar. * Experience managing offensive security infrastructure. * Experience developing and/or providing technical training. * Experience working in highly regulated industries such as finance, healthcare, or government. Work Environment: * This position is hybrid, with an expectation of occasional on-site presence at our Malvern, Pennsylvania location while allowing for remote work flexibility. Some travel may be required for client engagements. Why Join Layer 8 Security? * Work alongside some of the best cybersecurity professionals in the industry. * Engage in challenging and meaningful projects that push the boundaries of offensive security. * Opportunities for continuous learning, professional development, and certification support. * A dynamic and collaborative work environment that values innovation and expertise. What We Offer: * Medical, vision, and disability insurance plans. * Employer-funded life insurance for all employees. * Employer-sponsored 401(k) plan. * Unlimited vacation policy with a requirement to take at least two weeks. * Encourage and compensate for advanced training, certifications, and industry events. * Have a voice and be heard with the opportunity to make a positive difference. If you are a driven and skilled offensive security professional looking for your next challenge, we encourage you to apply and become part of the Layer 8 Security team! To apply please send resume to **************************.
    $87k-119k yearly est. Easy Apply 24d ago
  • Director, Information Security

    Saint Joseph's University 4.4company rating

    Security Architect Job 8 miles from Upper Darby

    Director, Information Security Time Type: Full time and Qualifications: The Director, Information Security assists the CISO in developing an information security vision and strategy that is aligned to organizational priorities. They will manage the day to day operations and staff of the Information Security department. This area focuses on identity and access management, GRC (governance, risk and compliance) as well as network security/operations. They will assist the CISO in the management and coordination of security standards, along with implementation and execution to ensure compliance to security standards and policies and provide expertise in managing audits, vulnerability remediation and incident response. They will assist in managing the University information security awareness program and promote best practices in security and compliance management.Note to applicants: In the Resume/CV upload field, please submit a resume, a cover letter, and 3 references that can speak to your direct experience in information security and management Essential Duties & Responsibilities Manages the day to day operations and staff of the Information Security department. This area focuses on identity and access management, GRC (governance, risk and compliance) as well as network security/operations. Assists the IAM Analyst with the management of the security awareness program to ensure that there is an appropriate awareness of information security and safe computing practices across the University. Provides support in managing vendor relationships pertaining to information security, including the formal review of university contracts which have technology components. Using a vendor questionnaire, assesses each vendor's overall capabilities including infrastructure, controls, security practices, regulatory compliance, ability to protect University information assets, etc. Issue a security opinion on the suitability of each vendor. Provides support in investigating and assessing security incidents in collaboration with technology managers in IT, and in partnership with the Office of General Counsel. Responds to alleged policy violations and complaints received from external parties. Documents findings via a formal security incident report. Serves as the backup point of contact for security threats, potential breaches, and privacy issues, including matters involving law enforcement. Works with internal and external auditors and agencies on security and compliance matters, including incident response. Assists the IT Audit Analyst in developing a strategy for addressing audits, assessments and compliance efforts. Assists the CISO in establishing annual and long term security and compliance goals. Creates and implements security strategies, metrics, and reporting processes. Develops, maintains, promotes and enforces data management and information security policies, standards, guidelines, and procedures, including those for end users, system and application administrators, service providers, and legal/regulatory compliance. Assists in developing communication and education initiatives around the awareness of information security risks as well as mitigation strategies and protections that are in place at the university. Understands and interacts with IT advisory councils, administrative and academic units through committees, to ensure the development of and consistent application of policies and standards across technology projects, systems and services, including privacy, risk management, compliance and business continuity management. Works collaboratively with others to conduct risk assessments and business impact analysis to identify vulnerabilities and risk exposure. Where risks have been identified, provides recommendations on managing that risk, including acceptance, avoidance, transference, and mitigation techniques to minimize potential impact on the university. Keeps current with emerging governmental regulatory initiatives and security alerts and issues which could have an impact on the university environment. Provides guidance, planning, and monitoring for compliance with various industry requirements (e.g. FERPA, , HIPAA, PCI), which impact the way in which various systems are implemented. Prepares and submits required reports to external agencies. Direct supervisor for: Identity Access Management Analyst; IT Audit Analyst; Graduate Assistant as funding permits; and future incumbents as identified by the University Minimum Qualifications Bachelor's degree, preferably in computer science, OR an equivalent combination of education, training and experience. Minimum of 6 years of progressive professional experience with information technology, including 3 years minimum in a formal information security position (i.e Identity and Access management, Risk Management, Privacy, etc.) with 3 years minimum of management experience. Strong written, oral communication, and presentation skills. Ability to communicate technical/security information effectively to individuals with varying degrees of experience and skill. Experience working with compliance and regulatory matters such as FERPA, PCI, HIPAA and HEOA. Experience and knowledge of NIST, GLBA and GDPR. Superior troubleshooting and problem solving skills. Experience in writing security policies and related documents. Ability to work independently and with others in a collaborative environment. Demonstrated ability to work and effectively manage multiple work streams while meeting internal deadlines. Preferred Microsoft experience - Azure, Security, IAM, CASB, SSO, MFA. Certified Information Systems Security Professional (CISSP) OR Certified Information Security Manager (CISM) OR Certified Information Systems Auditor (CISA). Any Microsoft “SC” specific certifications. Experience with contract and vendor vetting, negotiations and document reviews. Experience working with General/External Counsel and Law enforcement agencies. Physical Requirements Will require long periods of work at a computer This position may be eligible for a flexible work arrangement per the University's guidelines and meeting performance expectations Unusual Work Hours Will require occasional evening and weekend hours. Must be available to respond to emergencies on a 7x24 basis and participate in the IT On Call process Saint Joseph's University is a private, Catholic, Jesuit institution and we expect members of our community to be knowledgeable about - and to make a positive contribution to - our mission. Saint Joseph's University is an equal opportunity employer that seeks to recruit, develop and retain a talented and diverse workforce. The University is committed to the diversity of its faculty and staff so that our students, our disciplines and our community as a whole can benefit from the multiple perspectives it offers. The University seeks qualified candidates who share our commitment to equity, diversity and inclusion. EOE Saint Joseph's University prohibits discrimination on the basis of sex in its programs and activities, including admission and employment, in accordance with Title IX of the Education Amendments of 1972. The Title IX Coordinator is responsible for overseeing compliance with Title IX and other civil rights laws and regulations. To contact the Title IX Coordinator, e-mail ***************, visit Campion Student Center suite 243, or call ************. To learn more about the University's Title IX policies, the process for filing a report or formal complaint of sex discrimination, sexual harassment, or other form of sexual misconduct, and the University's response to reports and/or formal complaints, please visit ******************** Inquiries may also be directed to the Federal agency responsible for enforcing Title IX, the U.S. Department of Education Office for Civil Rights.
    $85k-101k yearly est. Easy Apply 60d+ ago
  • Information System Security Officer III

    Data Intelligence 4.5company rating

    Security Architect Job 8 miles from Upper Darby

    Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization. **This position is contingent upon award of contract** Key Responsibilities: Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards. Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems. Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership. Provide guidance on best practices and recommend improvements to the organization's security posture. Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats. Support continuous monitoring of information systems and provide regular status reports on security compliance. Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices. Required Skills/Experience: Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field. A minimum of 6 years of relevant experience in cybersecurity or information systems security. Prior experience supporting Navy programs. Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M. At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary. Proficiency in cybersecurity frameworks, risk management processes, and security controls. Strong analytical and problem-solving skills with attention to detail. Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team. Preferred Qualifications: Experience with DoD security requirements and systems. Familiarity with NIST, RMF, and other relevant cybersecurity standards. Ability to work in a potentially remote environment with occasional on-site requirements. Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment. About Us: Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status. Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $79k-108k yearly est. 60d+ ago
  • IT Security Engineer

    Berkley 4.3company rating

    Security Architect Job 21 miles from Upper Darby

    Company Details Company URL: ****************************************** Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible. Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “ What's Next ” in our industry and beyond. With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions. Berkley Technology Services: Right Team, Right Technology, Simple and Secure. Responsibilities The Information Security Engineer is responsible for implementing and managing a comprehensive security program to protect our organization's data and systems from cyber threats. They will work closely with other members of the IT team to ensure the security of our infrastructure, applications, and data. Identify and define system security requirements. Design computer security architecture and develop detailed cybersecurity designs. Prepare and document standard operating procedures and protocols. Configure and troubleshoot security infrastructure tools & devices. Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Collaborate with other members of the IT team to ensure that security controls are implemented throughout our infrastructure, applications, and data. Stay up to date with the latest cybersecurity threats and trends and make recommendations to improve our security posture accordingly. Provide guidance and support to other members of the IT team on security best practices. Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary. Qualifications Proven work experience as a system security engineer or information security engineer. Detailed technical knowledge of network, cloud, and computer system security, including a strong understanding of security mechanisms such as user access controls, role-based access control, SSO, file permissions, firewall policies, and audit logs. Hands-on experience in security systems, including firewalls, intrusion detection systems, endpoint protection systems, web application firewalls, vulnerability scanning software, privilege access management, data loss protection, log management, content filtering, etc. Experience with network security and networking technologies and with system, security, and network monitoring tools. Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols. Problem solving skills and ability to work under pressure. Experience with incident response and handling security incidents. Ability to work independently and in a team environment, with excellent communication and collaboration skills. Certifications such as CISSP, CISM, Azure Security Engineer, or similar, are a plus. BS degree in Computer Science or related field, or equivalent experience. The Company is an equal employment opportunity employer.
    $81k-108k yearly est. 60d+ ago
  • Endpoint Security Engineer II (US)

    TD Bank 4.5company rating

    Security Architect Job 19 miles from Upper Darby

    Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Protect Platform consists of teams across North America, whose mandate is to protect TD customers, colleagues and shareholders from cyber and financial crimes and fraud. Collectively our businesses lead TD's enterprise-wide fraud, cyber threat, and technology risk strategies, advance analytics capabilities, and drive operational efficiency to improve governance, oversight and collaboration between fraud management and other functions within the Bank. Endpoint Protect is part of the broader Security Engineering team of the Protect Platform with the mandate to plan, evaluate, recommend, design, operationalize, and support security solutions. These solutions focus on protecting endpoints, which consist of servers and workstations, in compliance with enterprise and industry standards. * Applying your experience and expertise to ensure all TD areas that interact with Endpoint Threat Protection technologies (eg: EDR, AV, FIM, etc) are implemented correctly and have the necessary capabilities, processes and documentation to operate effectively. * Contribute to project activities such as: understanding business needs to properly scope and estimate project efforts, identifying risks and recommending mitigation measures, communicating activity status, as well as escalating and communicating possible issues and working with other teams within and outside of security engineering to ensure project goals are being met and any projects you lead continue to make progress. * Build relationships and support internal teams (eg: Cyber Security Operations, Red / Blue / Hunting Teams, Threat Intelligence) leveraging other Endpoint Threat Protection tools such as the threat intel, breach attack simulation and automation platforms for their team's deliverables * Partner with Operations to automatically integrate with appropriate tools and processes efficiency improvements via automation (scripting or using software development techniques) * Leading and participating in changes / updates to infrastructure that may occur outside business hours * Monitor and control costs associated with your work, which may include contributions to negotiations of third-party contracts/agreements * Collaborate with governance and control groups (e.g. regulatory and operational risk, compliance and audit) to provide your subject matter expertise and consult on risk and compliance issues related to Engineering technology and tools. * Work with technology partners (e.g., Solution Designers and Architects) to research and analyze current state system capabilities and define technology solutions options and recommendations. * Gain knowledge in own area, stay abreast of technology trends and developments, develop expertise in TD services, applications, infrastructure, analytical tools and techniques, business domains and their products and services. Depth & Scope: * Expert knowledge of specific domain or range of engineering frameworks, technology, tools, processes and procedures, as well as organization issues * Expert knowledge of TD applications, systems, networks, innovation, design activities, best practices, business/organization, Bank standards, and may fulfill a governance role * Expert knowledge and experience in own discipline; integrates knowledge of business and functional priorities * Acts as a key contributor in a complex and critical environment * May provide leadership to teams or projects; shares expertise * Applies in-depth skills and broad knowledge of the business to address complex problems and non-standard situations Education & Experience: * Bachelor's or Graduate degree * Strong academic background (e.g., computer science, engineering) * 7 + years relevant experience Preferred Qualifications: * 7 years of experience with programming and development experience including multiple years programming in Python, Web development and API integrations (RESTful and SOAP web services, JSON/XML) * 7 years of experience with workflow automation platforms (eg: Power Automate, Cortex XSOAR, other similar), scripting (bash / PowerShell / other similar) and version / package control tools (HPSA, Ansible, etc) * 7 years of experience with solution, policy and architecture design along with experience implementing and supporting endpoint security tools, particularly EDR (Endpoint Detection and Response), FIM (File integrity monitoring), Security Automation / Orchestration platforms LIKE Crowdstrike, Microsoft Defender Platform tools, Symantec Datacentre Security, XSOAR * 7 years of experience with modern digital architecture (cloud, container, messaging and microservices) * 7 years of experience with operational proficiency, OS administration and troubleshooting (Windows and Linux, MacOS is a plus) * 7 years' experience in troubleshooting application/network issues and customer service in an IT environment involving communication with technical and non-technical teams * Familiarity with operating or developing in Azure, AWS or Google Cloud Compute Platform and technology and Infrastructure (such as): Azure / Azure AD / Active Directory / Networks #TDCybersecurity Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation If you are an applicant with a disability and need accommodations to complete the application process, email the TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you, and the accommodation needed to assist you with the application process. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $87k-151k yearly 10d ago
  • Lead Info Security Engineer

    Temple Health 4.2company rating

    Security Architect Job 8 miles from Upper Darby

    Lead Info Security Engineer - (242429) Description Mitigates risk of the Health System's vulnerability to Cybersecurity attacks through the engineering/installation/management of a Security Information Event Management (SIEM) system. Participates in the implementation of the organization's strategic goals for information security. Participates in developing security standards/best practices for the organization. Recommends enhancements, as needed. Contributes to the development of strategies to respond to/recover from a security breach. Develops security awareness by providing orientation, educational programs, and on-going communication. Identifies/Installs/Manages applications necessary to protect sensitive information as needed or identified by the CISO. Assists computer users with installation/management of new security products/procedures. Identifies any weaknesses in the information security architecture which could be used to compromise information systems. Monitors systems/network for security breaches/intrusions using the SIEM system. In the event of a breach, participates in incident response activities to minimize the impact; assists with the technical/forensic investigation into how the breach occurred/extent of the damage. Reports findings to the CISO. EducationBachelors Degree : in Computer or Information Sciences (Required) Combination of relevant education and experience may be considered in lieu of degree. Experience3 Years experience in a system administration role supporting multiple platforms and applications. (Required)3 Years experience with risk assessment tools, technologies, and methods (Required) General Experience with communicating network security issues to peers and management (Required) Previous Experience with planning, researching and developing security policies, standards and procedures (Required) Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required) License/CertificationsCISSP - Cert Info Sys Security Prof (Preferred) GCIH - GIAC Cert Incident Handler (Preferred) GPEN - GIAC Penetration Tester (Preferred) GCFE - GIAC Cert Forensic Examiner (Preferred)_ Your Tomorrow is Here!Temple Health is a dynamic network of outstanding hospitals, specialty centers, and physician practices that is advancing the fight against disease, pushing the boundaries of medical science, and educating future healthcare professionals. Temple Health consists of Temple University Hospital (TUH), Fox Chase Cancer Center, TUH-Jeanes Campus, TUH-Episcopal Campus, TUH-Northeastern Campus, Temple Physicians, Inc. , and Temple Transport Team. Temple Health is proudly affiliated with the Lewis Katz School of Medicine at Temple University. To support this mission, Temple Health is continuously recruiting top talent to join its diverse, 10,000 strong workforce that fosters a healthy, safe and productive environment for its patients, visitors, students and colleagues alike. At Temple Health, your tomorrow is here!Equal Opportunity Employer/Veterans/DisabledAn Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability. Your Tomorrow is Here!Temple Health is committed to setting new standards for preventing, diagnosing and treating major diseases in our community and across the nation. Achieving that goal means investing in our employees' success through staff and leadership development. Our recruitment strategy is to attract and retain a diverse, high performing workforce that fosters a healthy, safe and productive environment for our patients and colleagues alike. Primary Location: Pennsylvania-PhiladelphiaJob: Information TechnologySchedule: Full-time Shift: Day JobEmployee Status: Regular
    $83k-107k yearly est. 4d ago
  • Deloitte Microsoft Technology Services Practice (DMTSP) - Security Pre-Sales Architect

    Deloitte 4.7company rating

    Security Architect Job 8 miles from Upper Darby

    Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest group of Cyber Risk individuals worldwide. Microsoft is an audit client for Deloitte - as a result, Deloitte does not and cannot have any form of alliance or partnership with Microsoft. Deloitte, however, can advise on and implement Microsoft products, and interact with Microsoft in certain ways in connection with these activities. When doing so, Deloitte and Microsoft must be sensitive to and mindful of the need for independence. Recruiting for this role ends on 4.1.25 Work you'll do As a DMTSP - Security Pre-Sales Architect, you will be at the front lines with our clients who have chosen the Microsoft technology platform and supporting them with their Cloud Cyber Risk needs specifically helping them navigate the journey on securing their Microsoft platform infrastructure such as Azure and Office 365 and the design and deployment of Microsoft Security solutions. This is a Deloitte services pre-sales role and not a project implementation role. This will include: + Lead or support proposals and/or also function as proposal lead architect with services potentially including the following Microsoft technologies: Microsoft Defender for Cloud, Azure Policies, Purview, Intune, Sentinel, Entra ID, Defender for Office, Defender for Endpoints and Servers, Defender for Vulnerabilities, Defender for Cloud Apps, Defender XDR and SCCM + Assist in business development activities such as defining scope of services, building resource estimates and related pricing, packaging proposals and supporting the delivery of the proposal to the client for security services at clients who may have selected Microsoft infrastructures. + Lead the delivery of cloud security analysis, recommendations and configurations of prospective clients' Microsoft Entra ID, Office 365 (O365), Exchange Online, Teams, OneDrive for Business, M365 Copilot and SharePoint Online environments based on Deloitte's Microsoft 365 Cyber Risk Framework. This can include leveraging security solutions services which may include Microsoft's technology products such as Entra, Purview, Defender, Intune, and Sentinel. + Support or lead the delivery of Cyber Security workshops with clients(remote/in-person) including building demo labs, PowerPoint decks and Deloitte best practice perspectives + Function as a Cyber security architect (experienced in applicable Microsoft technologies) supporting Deloitte project teams for practice development and eminence + Function as deep subject matter expert on Microsoft security and securing Microsoft solutions staying abreast of Gartner research and Microsoft product roadmaps and advising Deloitte teams and clients on new developments. + Function as the primary client day-to-day interface building rapport and trust with the client. + Perform technical health checks of client's Microsoft platforms/environments as part of client development activities prior to broader deployments. + When clients have expressed a desire to discuss Microsoft technologies, assist clients in a pre-sales role, with transitions to the Microsoft 365 security services such as solution setup and service configuration, focused on risk mitigation. Additional technologies include MFA, Conditional Access, Purview Compliance Manager, M365 Defender, Defender for O365, Defender for Cloud Apps (MDCA), Purview Information Protection (MPIP), Purview Data Loss Prevention (DLP). + Implement industry leading practices around M365 E5 cyber risks and cloud security for clients. + As part of the Deloitte Microsoft Technology Services security practice development and eminence activities; Design and develop cloud-specific security policies, standards and procedures e.g., O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management. + Provide internal technical training to Advisory personnel as needed. + Act as a subject matter expert on cloud cyber risk for Microsoft Purview, Microsoft Intune, Entra ID, Azure security, Microsoft Defender, and Microsoft Sentinel capabilities. + Lead the development of Point-of-Views (PoVs) on providing leading practices to our clients on Cyber, including the Microsoft security challenges they face. + Support talent process in the architect role such as for recruiting and coaching. + Function as an expert in CNAPP, CWPP and CSPM technologies and security risk frameworks relevant to cloud as well as the Microsoft Cloud Security Benchmark The successful candidate will possess: + Strong critical thinking, analysis, and problem-solving skills + Strong written and oral communication skills + Experience working independently as well as collaboratively across large teams The team Deloitte Advisory's Cloud Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice. Qualifications Required: + 5+ years of experience in technical consulting, client problem solving, architecting and designing solutions in a consulting role with project leadership and/or architect experience with Microsoft technologies + 5+ years of hands-on technical experience with securing Microsoft 365 enterprise-level messaging and collaboration and/or Azure Infrastructure in implementation and operations. + 5+ years of hands-on technical experience with enterprise-level systems management systems such as SCCM, End point security and Intune and endpoint engineering (MEM) and mobile device management (MAM & MDM)) implementation or operations. + 5+ years of hands-on technical and project / professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (e.g. Defender for Endpoints and Defender for Servers), Microsoft Sentinel, Microsoft's email security platform (Defender for Office), Microsoft Purview, Azure security & Entra ID + Ability to travel up to 50%, on average, based on the work you do and the clients and industries/sectors you serve + Limited sponsorship may be available Preferred: + BA/BS Degree preferred. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. + Microsoft Certifications such as: (SC-900, SC-100, SC-200, SC-300, SC-400, AZ 500), + Cyber Certifications such as: CCSP, CCSK, CISSP, CCNP, and CCNA. Ideally the following technical experience is a plus in any of the technologies below: + Microsoft Security Copilot + Defender for Vulnerabilities + Defender for Cloud Apps + Defender XDR + Experience with Azure data, analytics, or AI/ML services (Azure SQL, HDInsight, Databricks, Data Factory, Data Lake Storage, Azure Analysis Services, Synapse Analytics, Azure Machine Learning, etc.) The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500.00 to $210,600.00. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Information for applicants with a need for accommodation:Hyperlink: ************************************************************************************************************ #DeloitteNDO, #SalesOpsGreenDot All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
    $102.5k-210.6k yearly 19d ago
  • Enterprise Cloud Security Architect

    Burlington 4.2company rating

    Security Architect Job 20 miles from Upper Darby

    As the Enterprise Cloud Security Architect you will promote and lead the adoption of "secure by design" practices. You will develop, maintain, and evolve enterprise cloud security architecture, and coordinate and manage the successful delivery of cybersecurity architecture services for IT projects to ensure enterprise cloud technology solutions comply with security policies, standards, and requirements. This role will work with project teams to define the cybersecurity scope, work effort, and deliverables and execute multiple projects in parallel. The architect is expected to effectively exercise leadership and provide guidance to enable the team's success. This role is also responsible for the continued improvement and development of the cloud cybersecurity architecture service. The architect must be able to draw from a deep background in cloud technology and security principles and solutions, as well as their understanding of the business, to clearly articulate and discuss identified business risks and various options for mitigating those risks. A Day In The Life + Develop, deploy and maintain Burlington's cloud cybersecurity architecture standards, including cybersecurity reference architectures and design patterns. + Identify security control requirements for cloud technology initiatives and deliver effective and practical solutions to meet those requirements in alignment with the overall objectives of the project and the business. + Lead the cybersecurity architecture aspects of enterprise cloud initiatives, in particularly in the increasing adoption of various cloud services (IaaS, PaaS, and SaaS) from key cloud service providers. + Develop and improve cloud cybersecurity architecture service in conjunction and alignment with other cybersecurity architecture services. + Assess the business impact of cloud cybersecurity risks in the enterprise and identify options and recommendations for mitigating those risks. + Contribute to the development and maintenance of information security strategy and architecture, promote and adopt "secure by design" practices. + Evaluate and develop secure cloud solutions based on approved security architectures. To Be Successful You Should Possess + Bachelor degree in Computer Science or a similar field is preferred. + Minimum of ten-year experience in a related field, at least five years in cloud cybersecurity architecture. + In-depth knowledge of cybersecurity frameworks including but not limited to NIST, ISO/IEC 27001 and PCI DSS. + Expert knowledge of TOGAF and SABSA frameworks and their respective application. + Thorough understanding of enterprise risk management principles and processes. + Experience in the information security field and expertise in platform, application, storage, data, network, virtualization, cloud and mobile security, accentuated with in-depth knowledge of security capabilities of one or more public cloud platforms (Azure, GCP, AWS). + A strong understanding of enterprise technologies, operations, and architectural principles and models. Knowledge of virtualized data center architectures and operations, SOA-type deployments, web services and multi-tier web applications, directory services, cloud services, and WAN/MAN/LAN wired and wireless protocols and technologies supporting a diverse set of business use cases. + A solid record of successfully designing and deploying numerous enterprise technical security services such as SIEM, DLP, PKI, IDS/IPS, and enterprise authentication/authorization frameworks and models. + Experience in cloud migration and operational optimization. Come join our team. You're going to like it here! You will enjoy a competitive wage, flexible hours, and an associate discount. Burlington's benefits package includes medical, dental and vision coverage including life and disability insurance. Full time associates are also eligible for paid time off, paid holidays and a 401(k) plan. We are a rapidly growing brand and provide a variety of training and development opportunities so our associates can grow with us. Our teams work hard and have fun together! Burlington associates make a difference in the lives of customers, colleagues, and the communities where we live and work every day. Burlington Stores, Inc. is an equal opportunity employer committed to workplace diversity. \#LI-TG1 **Posting Number** _2025-228843_ **Location** _US-NJ-Edgewater Park_ **_Address_** _4287 Route 130 S_ **_Zip Code_** _08010_ **Workplace Type** _Hybrid_ **Position Type** _Regular Full-Time_ **Career Site Category** _Corporate_ **Position Category** _Information Technology_ **Evergreen** _No_ **Min** _USD $150,000.00/Annual_ **Mid** _USD $190,000.00/Annual_
    $150k-190k yearly 27d ago

Learn More About Security Architect Jobs

How much does a Security Architect earn in Upper Darby, PA?

The average security architect in Upper Darby, PA earns between $101,000 and $213,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average Security Architect Salary In Upper Darby, PA

$146,000

What are the biggest employers of Security Architects in Upper Darby, PA?

The biggest employers of Security Architects in Upper Darby, PA are:
  1. Deloitte
  2. EPAM Systems
Job type you want
Full Time
Part Time
Internship
Temporary