Cyber Security Architect
Security engineer job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Network Security Analyst
Security engineer job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network Security Analyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
Ethical Hacker Needed at Web Agency. Work Remotely (USA only)
Security engineer job in New York, NY
We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States.
Job Description
We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department.
We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks.
At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security.
You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us.
Along with your application, please answer the following questions:
How long have you been a hacker?
Do you have an Ethical Hacker Certification? When did you receive it?
What was the most complicated penetration test you have ever performed, and why?
What are the most common security threats that you deal with?
How long does it typically take you to clean common Viagra malware on websites?
Have you managed other hackers?
Qualifications
One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization.
Additional Information
We are growing fast and need motivated and hard-working people to grow with us.
Systems Engineer - Physical Security
Security engineer job in New York, NY
Hudson River Trading (HRT) is looking for a Systems Engineer with a focus on physical security systems to join our Enterprise Technology team. This role will liaise closely with our Workplace and various Security teams to conduct research, design, and maintain physical security platforms. You'll join a lean and technical team with opportunities to architect, own, and evolve HRT's global physical security infrastructure, driving both strategic vision and hands-on execution, to help HRT stay secure while providing a great employee experience.
Responsibilities
Research, architect, and deploy physical security systems across our offices and supporting sites around the globe
Conduct audits and risk assessments of the physical security of equipment and locations globally
Curate an enjoyable employee experience while helping to maintain safety, security and compliance
Manage user roles, permissions, and system access in compliance with company policies and best practices
Troubleshoot hardware/software issues, perform diagnostics, and provide Level 2/3 support
Create and maintain documentation of configurations, procedures, and system architecture
Help lead technical response and forensic analysis for physical security incidents in collaboration with Workplace and Security Operations teams
Collaborate with internal stakeholders to evaluate and adopt next-generation physical security technologies, such as AI-driven analytics, mobile credentials, or zero-trust physical systems
Qualifications
5+ years of experience in the systems architecture, engineering, and administration of physical security systems (camera infrastructure, badge platforms, biometrics, environmental sensors, access control, etc.)
Experience with open protocols and standards in physical security (OSDP, SNMP, etc.)
Experience with consolidating and automating identity management, configuration, and logging for disparate physical security, access control, and digital IAM platforms
Experience with data center physical security systems (VSS, ACS, IDS, anti-tailgating, anti-passback, mantraps, etc.)
Experience automating through code (Python, Go, PowerShell) and working with SDKs/APIs
Strong knowledge of networking concepts and protocols
Familiarity with securing IP-based physical systems and awareness of modern physical security threats (e.g., firmware supply chain, OT/IT convergence)
Willing to travel 20% of time to visit other offices and facilities as needed
A certification like Certified Protection Professional (CPP) or Physical Security Professional (PSP) is a plus
Experience using Linux is a plus
Experience with public cloud providers (GCP, AWS, Azure) is a plus
The estimated base salary range for this position is $150,000 - $250,000 per year, based on job-related skills and experience. This role will also be eligible for discretionary performance-based bonuses and a competitive benefits package.
Culture
Hudson River Trading (HRT) brings a scientific approach to trading financial products. We have built one of the world's most sophisticated computing environments for research and development. Our researchers are at the forefront of innovation in the world of algorithmic trading.
At HRT we welcome a variety of expertise: mathematics and computer science, physics and engineering, media and tech. We're a community of self-starters who are motivated by the excitement of being at the cutting edge of automation in every part of our organization-from trading, to business operations, to recruiting and beyond. We value openness and transparency, and celebrate great ideas from HRT veterans and new hires alike. At HRT we're friends and colleagues - whether we are sharing a meal, playing the latest board game, or writing elegant code. We embrace a culture of togetherness that extends far beyond the walls of our office.
Feel like you belong at HRT? Our goal is to find the best people and bring them together to do great work in a place where everyone is valued. HRT is proud of our diverse staff; we have offices all over the globe and benefit from our varied and unique perspectives. HRT is an equal opportunity employer; so whoever you are we'd love to get to know you.
Auto-ApplyHackerX D&I Virtual Event
Security engineer job in New York, NY
Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability.
At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same.
Benefits & Culture
Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms.
2U offers a comprehensive benefits package:
Medical, dental, and vision coverage
Life insurance, disability and 401(k)
Unlimited snacks and drinks
Tuition reimbursement program
Generous paid leave policies including unlimited PTO
Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years!
To learn more, visit 2U.com. #NoBackRow
Auto-ApplySocial Media Growth Hacker
Security engineer job in New York, NY
Job Description
Job Title: Social Media Growth Hacker
Salary: $85,000-$95,000 with 10% Annual Bonus
TRUFF is a premium truffle-infused condiments brand - born at the intersection of heat and flavor. In 2015, TRUFF co-founders built the popular food and lifestyle Instagram ******************** 2 years later, in 2017, TRUFF co-founders launched TRUFF Original Hot Sauce, which catapulted into internet virality and beyond. Earning countless awards and accolades, including Oprah's Favorite Things (6x) Adweek's Best Brand Born Out of Social Media, and TheKitchn Essential's Mayo, TRUFF has become one of the fastest growing brands in condiments. TRUFF has partnered with the likes of Hidden Valley Ranch, Star Wars, Taco Bell, Popeyes, Travis Scott and Starbucks, and over the years has expanded into complimentary condiment categories - pasta sauce, mayo, oil, and seasonings. TRUFF's uniquely premium taste and aroma amplify the flavor experience of everyday dishes to make every day a culinary moment.
Job Summary
We're looking for a Social Media Growth Hacker. A creative, data-driven, internet-native operator obsessed with building cultural moments and engineering virality. This role blends content creation, distribution strategy, and cultural pattern recognition to fuel TRUFF's next wave of organic growth.
You'll work closely with our founders and marketing leadership to turn ideas into scroll-stopping moments across TikTok, Instagram, YouTube Shorts, and emerging platforms. You'll understand how to produce, how to clip, remix, seed, and distribute content for maximum reach. You'll live in the comment sections, spot trends before they break, and know how to turn a viral moment into a business outcome.
This isn't a “post and pray” social role, it's a creative growth lab for someone who thrives on experimentation, velocity, and storytelling through culture.
Key Responsibilities
Engineer virality: Identify, create, and capitalize on trends, moments, and sounds across TikTok, Instagram, and YouTube.
Build the content engine: Develop daily/weekly content calendars, leveraging UGC, internal/external shoots, and short-form clip strategies that scale across multiple TRUFF and partner accounts.
Clip farming & content distribution: Source, cut, and seed hundreds of short clips across pages to test hooks, angles, and communities for maximum reach and engagement.
Operate like an internet newsroom: Monitor culture, competitors, and community signals in real-time to inform TRUFF's next moves.
Collaborate with founders & SVP Marketing: Concept, shoot, and publish brand-led or personality-driven moments that blur the line between brand and creator.
Community + culture management: Live in the comments, stitch creators, respond with wit, and make TRUFF feel human.
Influencer & creator sourcing: Partner with creators and meme pages for collabs, trend participation, and content amplification.
Experiment & scale: Test new formats, AI tools, social distribution tactics, and “unscalable” experiments that move the algorithm.
Analytics & learning loops: Use data and platform insights to refine creative direction, track virality patterns, and build a playbook of what works.
Content production: Shoot, edit, and publish video/photo content natively optimized for each platform, fast, scrappy, and aesthetic.
Requirements
Deep understanding of internet culture, virality, and meme psychology.
3+ years managing or creating social media content for a consumer brand or creator-driven business.
Proven track record of creating viral or high-engagement content.
Strong experience with short-form editing and clipping tools (CapCut, Premiere, Descript, etc.) and multi-platform publishing.
Understanding of content distribution systems - repost networks, collab strategies, paid boosts, and shadow channels.
Excellent copywriting and visual storytelling skills.
Comfortable being on camera and experimenting with creative formats.
Data-driven mindset - able to analyze performance and pivot quickly.
Proficient in Google Suite, Sprout Social, Meta Business Manager, and analytics dashboards.
Bonus: Experience building pages or brands from scratch, creator economy fluency, or running niche meme / content accounts.
You're Probably the Right Fit If You…
Think in hooks, captions, and shareability.
Wake up on TikTok, fall asleep on Reddit.
Can take a raw clip and make it go viral.
Get excited by chaos, creativity, and community.
Love brands that blur lines between food, culture, and humor.
Believe social media is more science than art - but still know how to make it look cool.
Benefits
Performance Bonus
Comprehensive Health, Dental, Vision & Life Insurance
401(k) with 3% company match
Generous PTO, Sick Time, Holidays & Parental Leave
Wellness, Internet & Cell Phone Stipends
Company-provided Laptop
Senior Manual Ethical Hacker
Security engineer job in Jersey City, NJ
Denver, Colorado;Seattle, Washington; Jacksonville, Florida; Addison, Texas; Jersey City, New Jersey; Boston, Massachusetts; Charlotte, North Carolina; Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.** Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge (***********************************************************************************************
**:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
**Job Description:**
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank's applications to malicious hacking activity.
This senior technical role is responsible performing and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. These individuals are expected to perform application security-oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code.
Key Responsibilities in order of importance:
+ Perform assigned analysis of internal and external threats on information systems and predict future threat behavior.
+ Incorporate threat actors' tactics, techniques, and procedures into offensive security testing to identify high-value vulnerabilities/chained attacks.
+ Developing Proof-of-concepts for exploitation.
+ Perform assessments of the security, effectiveness, and practicality of multiple technology systems.
+ Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
+ Prepare and present detailed technical information for various media including documents, reports, and notifications.
+ Provide clear and practical advice regarding managing risks.
+ Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills.
+ Respond to security incidents and provide technical assistance to leadership across the Information Security organization.
Required Skills:
+ Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
+ Detailed technical knowledge in at least 5 of the following areas:
+ security engineering
+ application architecture
+ authentication and security protocols
+ application session management
+ applied cryptography
+ common communication protocols
+ mobile frameworks
+ single sign-on technologies
+ exploit automation platforms
+ Web APIs
+ Cloud environments
+ LLM security
+ Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
+ Experience performing manual web application assessments i.e., must be able to simulate a OWASP Top 10 vulnerabilities without the use of tools
+ Experience performing manual code reviews for security relevant issues
+ Experience working with DAST and SAST tools to identify vulnerabilities
+ Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
+ Experience with vulnerability assessment tools and penetration testing techniques.
+ Solid programming/debugging skills, development frameworks, CVE and CWE research/reproduction
+ Threat Analysis, threat modelling and SBOM analysis
+ Innovative thinking, threat actor simulation
+ Technology Systems Assessment
+ Technical Documentation
+ Advisory
Desired:
+ CEH, OSCP/OSCE/OSWE/GXPN/GPEN/GWAPT/GMOB/All Practitioner Certs [Port Swigger BSP Academy]/Cloud Cert(s)/ eWPT; eWPTX; eMAPT [INE Pentester Academy]
+ Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Cybersecurity Defense SOC Analyst (L2)
Security engineer job in Iselin, NJ
This is an opportunity to join Ascot Group - one of the world's preeminent specialty risk underwriting organizations.
Designed as a modern-era company operating through an ecosystem of interconnected global operating platforms, we're bound by a common mission and purpose: One Ascot. Our greatest strength is a talented team who flourish in a collaborative, inclusive, and entrepreneurial culture, steeped in underwriting excellence, integrity, and a passion to find a better way, The Ascot Way.
The Ascot Way guides our people and our organization. Our underwriting platforms collaborate to find creative ways to deploy our capital in a true cross-product and cross-platform approach. These platforms work as one, deploying our capital creatively through our unique Fusion Model: Client Centric, Risk Centric, Technology Centric.
Built to be resilient, Ascot maximizes client financial security while delivering bespoke products and world class service - both pre- and post-claims. Ascot exists to solve for our clients' brightest tomorrow, through agility, collaboration, resilience, and discipline.
Job Summary:
As part of our 24x7 Cybersecurity Defense function, the SOC Analyst (L2) will be responsible for investigating security incidents, improving detection content and supporting the overall monitoring, detection and cybersecurity incident response activities. This involves working closely with the members of the internal Cybersecurity team and our Managed Security Service Provider (MSSP).
Acting as an escalation point for L1/L2 SOC analysts, this resource will work within an expanding cybersecurity team, collaborating with cybersecurity managers, IT Infrastructure, and Deskside Support Teams.
You must be detail-oriented, diligent, and capable of managing multiple aspects of the incident response lifecycle simultaneously. You will be supporting a 24X7 Cybersecurity Defense function and will be required to work in shifts that will vary based on operational needs to support the global footprint across the UK and US time zones.
This resource will additionally be responsible for maintaining detection content on the detection tool, (detection rules, log ingestion, parsers, forwarders), maintaining playbooks, SOC documentation and supporting integrations and log sources associated with the overall Cybersecurity Defense solution. This role will be in the office with a hybrid work schedule.
Responsibilities:
•Monitor our security tools to triage and respond to suspicious events and abnormal activities, capable of performing deep-dive incident investigations.
•Serve as a point of escalation for the L1, L2 SOC Analysts, and the point of contact for our MSSP, coordinating response efforts with other groups and stakeholders with varying technical expertise, such as IT, Legal, business etc.
•Develop and implement advanced security protocols and incident response procedures and improve our threat intelligence processes.
•Stay current with evolving threats, vulnerabilities, tools, technologies and threat actor TTPs to help improve detection and response capabilities.
•Provide oversight and governance over the daily operations of the MSSP and SOC team at a global level.
•Mentor and provide training to junior SOC team members.
•Develop and refine standard operating procedures in the form of run books and playbooks for incident response and threat detection. Create and make improvements to procedures and playbooks. Conduct technical analysis, log reviews, and assessments of cybersecurity incidents throughout the incident management lifecycle.
•Work with end users where appropriate on security related incident and request workflow.
•Document and manage incident cases to utilize information for stakeholder engagement to provide insight, intelligent recommendations, risk reporting and lessons learned.
•Work in scheduled shift patterns when required.
•Conduct in-depth security investigations, log analysis, network/email traffic assessment, and evaluate other data sources to identify root causes, assess impact, and gather evidence for response and mitigating actions.
•Implement detection use cases within our SIEM for our expanding estate using appropriate scripting languages.
•Manage log sources, log ingestion volumes, detection content and overall SIEM solution system health, maintenance, and upgrades.
•Assist with additional ad hoc projects as required.
Requirements:
•Cybersecurity related bachelor's degree or related field.
•Minimum of 8 years of experience in a security operations role, SOC engineering and or a cybersecurity technical engineering role.
•Exposure to building and migrating log sources onto a new SIEM platform, creating detection content, log parsers and detection engineering will be preferred. Alternatively, candidates that have worked in senior technical roles in a Managed Security Service Provider (MSSP) will be preferred.
•Preference will be given to candidates who also have additional technical and cybersecurity certifications covering both defensive and offensive security such as CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), CySA+, CISSP, GSEC, GCIH, CCSP, Microsoft SC-200, CISSP-ISSMP, CTIA, OSCP.
•Candidates must have solid experience and knowledge of typical enterprise technologies. On-premises and cloud hosting, Windows and Linux operating systems (OS), Microsoft Azure, M365 and the ability to detect signs of compromise in these systems.
•Possess a growth mindset and is willing to learn how to resolve technical security issues.
•Demonstrate a working and genuine interest and talent in Cybersecurity.
•Demonstrate detail orientation and can take a structured approach to procedures and working instructions.
•Work and maintain a calm structured mindset even when under pressure.
•Possess an aptitude for understanding and analyzing data when troubleshooting.
•Strong written communication, critical thinking, and analysis skills, including the ability to present potential risks and actual findings to a wide audience. Ability to communicate complex problems to a non-technical audience.
•Must have a working understanding of key security concepts and attack types such as phishing, malware, vulnerabilities, Cyber Kill Chain, and attack stages.
•A strong analytical mindset, capable of digesting a wide range of information to make practical judgements based on available data and context.
•Experience with security tools and technologies, including SIEM, intrusion detection systems, EDR, XDR, log analysis, and malware analysis.
•Understand threat actor tactics, techniques and procedures, have familiarity with the MITRE-ATT&CK Framework and different stages of an attack lifecycle.
•Maintain a desire to keep learning, with a curious and creative growth mindset.
***This position may be filled at a different level, depending on experience***
Compensation
Actual base pay could vary and may be above or below the listed range based on factors including but not limited to experience, subject matter expertise, and skills. The base pay is just one component of Ascot's total compensation package for employees. Other rewards may include an annual cash bonus and other forms of discretionary compensation awarded by the Company
.
The salary range for this role in the NY Metro and Chicago, IL area is $105,000 - $120,000.
Company Benefits
The Company provides a competitive benefits package that includes the following (eligibility requirements apply):
Health and Welfare Benefits: Medical (including prescription coverage), Dental, Vision, Health Savings Account, Commuter Account, Health Care and Dependent Care Flexible Spending Accounts, Life Insurance, AD&D, Work/Life Resources (including Employee Assistance Program), and more
Leave Benefits: Paid holidays, annual Paid Time Off (includes paid state /local paid leave where required), Short-term Disability, Long-term Disability, Other leaves (e.g., Bereavement, FMLA, Adoption, Maternity, Military, Primary & Non-Primary Caregiver)
Retirement Benefits: Contributory Savings Plan (401k)
#L1 Hybrid
Auto-ApplyLead Information Security Analyst - Identity
Security engineer job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
Lead Information Security Analyst - Identity
Security engineer job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Health Hacker - New York
Security engineer job in New York, NY
About UsAt Next Health, we are redefining health optimization by integrating cutting-edge medical innovation with preventative, data-driven wellness. Through our technology-forward platform and luxury clinical environments, we empower our members to take control of their well-being with personalized longevity solutions. We are rapidly expanding across the U.S., and we are seeking visionary leaders to help scale our digital infrastructure and member experience.
Your ImpactAs the Front Desk Receptionist at Next Health, you will be the first point of contact for our patients, visitors, and vendors. You will play a critical role in creating a positive patient experience and ensuring that our operations run smoothly.
Job DescriptionAs the Front Desk Receptionist, you will be responsible for:
Greeting patients and visitors with a welcoming and professional demeanor Checking in patients and verifying their demographic and payment information Scheduling appointments and managing the clinic schedule Assisting patients with questions and concerns Maintaining patient records and updating them as needed.Coordinating with other departments and healthcare providers to ensure seamless patient care.
What to Expect In this role, you can expect to:
Interact with a diverse group of patients and visitors Manage multiple tasks and responsibilities simultaneously Use electronic medical records and scheduling software Work closely with other departments and healthcare providers Provide excellent customer service and patient care
What You'll BringWe're looking for someone who has:
1+ years of experience in a medical office or healthcare setting Excellent communication and interpersonal skills Strong attention to detail and organizational skills Ability to manage multiple tasks and ************************************** Super AdminExperience with electronic medical records and scheduling software Knowledge of medical terminology and insurance billing practicesA passion for providing exceptional customer service and patient care Aptitude for sales Passion for and knowledge of health & wellness services.Exceptional at customer service.Display a genuine interest in helping other people.Excited to learn new things and be on the cutting edge of health & wellness.
Our Culture & PerksWe're a patient-centered healthcare clinic with a culture that values empathy, respect, and teamwork. We offer:
Competitive salary and benefits package Opportunities for professional growth and developmentA supportive and inclusive work environment Meaningful work that makes a difference in patient's lives
Expected CompensationThe expected compensation for this position is $21 per hour, plus benefits.
Pay offered may vary depending on multiple individualized factors, job-related knowledge, skills, and experience. The total compensation package for this position may also include other elements dependent on the position offered. Details of participation in these benefit plans will be provided if an employee receives an offer of employment.
We are an Equal Opportunity / Affirmative Action employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws.
Please note: We kindly request that applicants refrain from calling our office line regarding job inquiries. All application related questions should be directed to ********************. Thank you for your understanding.
Auto-ApplySecurity Engineer, Operating Systems
Security engineer job in New York, NY
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplySecurity System Engineer
Security engineer job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Information Security Expert
Security engineer job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
What's in it for YOU?
Salary: $120000 to $140000
10% bonus, exceptional perks and benefits
Professional development training, mentoring, career coaching, and more!
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 10 years experience working in the IT security function.
You have working experience in the health care and/or financial services industries with project management and program management experience.
You have good experience with Operating System, Database, Network and Application Security.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cloud Security Specialist Information Security Engineering
Security engineer job in New York, NY
The Cloud Security Specialist is a senior technical and leadership position responsible for implementing, managing, and continuously improving cloud security across multi cloud environments including AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure (OCI).This role combines hands on technical execution with team leadership. The successful candidate will lead a team of cloud security engineers, develop secure architectures, and manage enterprise grade cloud security solutions such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Container Security, API Security, and AI Security Posture Management (AISPM).The individual will partner with cloud service, DevOps, and application teams to design secure deployments, enforce policies, and integrate automation for vulnerability remediation, threat detection, and compliance. They will also implement secure private connectivity between cloud and on premise networks using technologies such as AWS PrivateLink and Azure ExpressRoute. Required Education/Experience
* Master's Degree and with 3 years of relevant experience IT or Information security or
* Bachelor's Degree and with 5 years of relevant experience IT or Information security or
* Associate's Degree and with 6 years of relevant experience IT or Information security or
* High School Diploma/GED and with 8 years of relevant experience IT or Information security.
Preferred Education/Experience
* Master's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 3 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute).
* Bachelor's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 5 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute).
Relevant Work Experience
* Handson experience with at least two major cloud providers (AWS, Azure, GCP, or OCI), required.
* Implementation and management experience with CSPM, CWP, AISPM, and API security platforms, required.
* Knowledge of IAM, rolebased access control, and policy enforcement, required.
* Experience integrating cloud telemetry and logs with SIEM tools, required.
* Understanding of hybrid connectivity and private link technologies (PrivateLink, ExpressRoute), required.
* Experience with scripting (Python, PowerShell, Bash) and automation, required.
* Experience with WAF and cloud API gateway configurations, required.
* Strong understanding of cloud network fundamentals and background in cloud network security, and secure architecture design, required.
* Experience collaborating with cloud service teams for planning and remediation, required.
* Experience implementing application security best practices and training engineering teams, required.
* Familiarity with CDN operations, certificates, and brand monitoring preferred, required.
* Experience with SIEM integration, telemetry collection, and event analysis, preferred.
* Demonstrated experience leading technical teams or project groups, preferred.
* Experience with Container Security, preferred.
* Experience securing API endpoints and implementing advanced cloud application protections, preferred.
* Knowledge of AI/ML data protection and secure model deployment practices, preferred.
* Experience integrating security automation into DevSecOps workflows using Terraform or Ansible, preferred.
* Experience developing and delivering cloud security training and awareness programs, preferred.
Skills and Abilities
* Effective leadership skills
* Demonstrated problem solving skills
* Demonstrated problem solving skills
* Strong written and verbal communication skills
* Ability to drive multiple projects to successful completion
* Proactively approaches responsibilities
Licenses and Certifications
* Driver's License Required
* Other: CISSP, CCNP Security, GSEC, GCIH, CEH, or equivalent certifications. Preferred
* Other: CCSP, AWS Certified Security, Azure Security Engineer Associate, GCP Professional Cloud Security Engineer, or OCI Security Professional. Preferred
Physical Demands
* Ability to push, pull, and lift up to 25 pounds
* Sit or stand to use a keyboard, mouse, and computer for the duration of the workday
Additional Physical Demands
* The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays.
* The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays.
Core Responsibilities
* Lead and mentor a team of cloud security engineers, fostering technical excellence and professional growth.
* Architect and maintain secure multi-cloud environments across AWS, Azure, GCP, and OCI in partnership with Enterprise Architecture.
* Deploy and manage CSPM platforms to drive continuous visibility, compliance, and risk posture improvement.
* Implement CWP solutions to protect cloud workloads, prevent threats, and manage vulnerabilities effectively.
* Define and enforce IAM policies and least-privilege principles to strengthen identity security across all platforms.
* Design and secure private and hybrid connectivity using technologies such as AWS PrivateLink, Azure ExpressRoute, and Google Cloud Interconnect.
* Integrate cloud telemetry and security events with SIEM systems to enhance incident detection and response capabilities.
* Automate provisioning, configuration, and remediation workflows using IaC tools like Terraform and Ansible, supported by Python or PowerShell scripting.
* Implement and manage WAF policies and API gateways to safeguard cloud applications and services.
* Partner with DevOps and engineering teams to embed security within CI/CD pipelines and promote secure development practices.
* Collaborate with risk and architecture teams to assess emerging technologies and align them with enterprise security strategy.
* Stay informed on evolving threats, regulatory frameworks, and AI security trends to continuously improve cloud security posture.
Cyber Security Analyst
Security engineer job in Great Neck, NY
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better .
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
• Competitive base salary and bonus opportunities
• Paid time off (three-week minimum)
• Medical, dental and vision starting day one
• 401(k) with employer match
• Paid parental leave
• Child and family care assistance (dependent care FSA with employer match up to $2500)
• Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
• Tuition assistance
• Wellness program with savings of up to $4,000 per year on insurance premiums
• ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyEthical Hacker Needed at Web Agency. Work Remotely (USA only)
Security engineer job in New York, NY
We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States.
Job Description
We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department.
We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks.
At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security.
You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us.
Along with your application, please answer the following questions:
How long have you been a hacker?
Do you have an Ethical Hacker Certification? When did you receive it?
What was the most complicated penetration test you have ever performed, and why?
What are the most common security threats that you deal with?
How long does it typically take you to clean common Viagra malware on websites?
Have you managed other hackers?
Qualifications
One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization.
Additional Information
We are growing fast and need motivated and hard-working people to grow with us.
Manual Ethical Hacker
Security engineer job in Jersey City, NJ
Denver, Colorado;Seattle, Washington; Jersey City, New Jersey; Boston, Massachusetts; Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge (******************************************************************************************
**:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
**Job Description:**
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
+ Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
+ Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
+ Perform assessments of the security, effectiveness, and practicality of multiple technology systems
+ Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
+ Prepare and present detailed technical information for various media including documents, reports, and notifications
+ Provide clear and practical advice regarding managed risks
+ Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
+ Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
+ Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
+ SQL injection/XSS attack without the use of tools
+ Experience performing manual code reviews for security relevant issues
+ Experience working with SAST tools to identify vulnerabilities
+ Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
+ Experience performing manual web application assessments i.e., must be able to simulate a
+ Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
+ Experience with vulnerability assessment tools and penetration testing techniques
+ Solid programming/debugging skills
+ Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
+ Threat Analysis
+ Innovative Thinking
+ Technology Systems Assessment
+ Technical Documentation
+ Advisory
Desired:
+ CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
+ Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Information Security Analyst
Security engineer job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
Easy ApplyCloud Security Specialist Information Security Engineering
Security engineer job in New York, NY
The Cloud Security Specialist is a senior technical and leadership position responsible for implementing, managing, and continuously improving cloud security across multi cloud environments including AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure (OCI).This role combines hands on technical execution with team leadership. The successful candidate will lead a team of cloud security engineers, develop secure architectures, and manage enterprise grade cloud security solutions such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Container Security, API Security, and AI Security Posture Management (AISPM).The individual will partner with cloud service, DevOps, and application teams to design secure deployments, enforce policies, and integrate automation for vulnerability remediation, threat detection, and compliance. They will also implement secure private connectivity between cloud and on premise networks using technologies such as AWS PrivateLink and Azure ExpressRoute. Required Education/Experience
Master's Degree and with 3 years of relevant experience IT or Information security or
Bachelor's Degree and with 5 years of relevant experience IT or Information security or
Associate's Degree and with 6 years of relevant experience IT or Information security or
High School Diploma/GED and with 8 years of relevant experience IT or Information security.
Preferred Education/Experience
Master's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 3 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute).
Bachelor's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 5 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute).
Relevant Work Experience
Handson experience with at least two major cloud providers (AWS, Azure, GCP, or OCI), required.
Implementation and management experience with CSPM, CWP, AISPM, and API security platforms, required.
Knowledge of IAM, rolebased access control, and policy enforcement, required.
Experience integrating cloud telemetry and logs with SIEM tools, required.
Understanding of hybrid connectivity and private link technologies (PrivateLink, ExpressRoute), required.
Experience with scripting (Python, PowerShell, Bash) and automation, required.
Experience with WAF and cloud API gateway configurations, required.
Strong understanding of cloud network fundamentals and background in cloud network security, and secure architecture design, required.
Experience collaborating with cloud service teams for planning and remediation, required.
Experience implementing application security best practices and training engineering teams, required.
Familiarity with CDN operations, certificates, and brand monitoring preferred, required.
Experience with SIEM integration, telemetry collection, and event analysis, preferred.
Demonstrated experience leading technical teams or project groups, preferred.
Experience with Container Security, preferred.
Experience securing API endpoints and implementing advanced cloud application protections, preferred.
Knowledge of AI/ML data protection and secure model deployment practices, preferred.
Experience integrating security automation into DevSecOps workflows using Terraform or Ansible, preferred.
Experience developing and delivering cloud security training and awareness programs, preferred.
Skills and Abilities
Effective leadership skills
Demonstrated problem solving skills
Demonstrated problem solving skills
Strong written and verbal communication skills
Ability to drive multiple projects to successful completion
Proactively approaches responsibilities
Licenses and Certifications
Driver's License Required
Other: CISSP, CCNP Security, GSEC, GCIH, CEH, or equivalent certifications. Preferred
Other: CCSP, AWS Certified Security, Azure Security Engineer Associate, GCP Professional Cloud Security Engineer, or OCI Security Professional. Preferred
Physical Demands
Ability to push, pull, and lift up to 25 pounds
Sit or stand to use a keyboard, mouse, and computer for the duration of the workday
Additional Physical Demands
The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays.
The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays.
Core Responsibilities
Lead and mentor a team of cloud security engineers, fostering technical excellence and professional growth.
Architect and maintain secure multi-cloud environments across AWS, Azure, GCP, and OCI in partnership with Enterprise Architecture.
Deploy and manage CSPM platforms to drive continuous visibility, compliance, and risk posture improvement.
Implement CWP solutions to protect cloud workloads, prevent threats, and manage vulnerabilities effectively.
Define and enforce IAM policies and least-privilege principles to strengthen identity security across all platforms.
Design and secure private and hybrid connectivity using technologies such as AWS PrivateLink, Azure ExpressRoute, and Google Cloud Interconnect.
Integrate cloud telemetry and security events with SIEM systems to enhance incident detection and response capabilities.
Automate provisioning, configuration, and remediation workflows using IaC tools like Terraform and Ansible, supported by Python or PowerShell scripting.
Implement and manage WAF policies and API gateways to safeguard cloud applications and services.
Partner with DevOps and engineering teams to embed security within CI/CD pipelines and promote secure development practices.
Collaborate with risk and architecture teams to assess emerging technologies and align them with enterprise security strategy.
Stay informed on evolving threats, regulatory frameworks, and AI security trends to continuously improve cloud security posture.
Auto-Apply