Post job

Security engineer jobs in Morrisville, NC - 185 jobs

All
Security Engineer
Information Security Engineer
Network Security Analyst
Securities Research Analyst
Senior Security Analyst
Network Security Consultant
SAP Security Consultant
Information Security Analyst
Information Security Manager
Senior Information Security Engineer
Network Security Engineer
  • Offensive Security Researcher

    Nvidia 4.9company rating

    Security engineer job in Durham, NC

    NVIDIA is looking for security researchers passionate about offensive research across different platforms. Do you have experience with identifying hardware and software vulnerabilities, developing PoC, and tools for automation in vulnerability research? Are you creative and devious in your offensive approach? We want to hear from you! You should demonstrate ability to excel in an environment with innovative and fast paced development on the worlds most powerful integrated software and hardware computing platform. What you'll be doing: * Core job duties will identify vulnerabilities in our embedded firmware and critical system software, building proof of concepts, and collaborating with development teams to remediate them. * Candidates will invest in improving current tools and offensive practices for bug discovery and evaluation while supporting remediation efforts. We expect team members to exercise modern tools for modeling new attack vectors on unreleased and emerging technology platforms. * The most impactful candidates can simulate real attacker behaviors, break systems by exploiting design assumption and effectively communicate their findings for action. Focus will be to increase resilience of the end products against all forms of attack through close collaboration with extended SW and HW offensive security teams. * Products targets span HPC data centers, consumer electronics, autonomous platforms, AI/cloud solutions, and a variety of embedded/IOT platforms providing a rich and complex target space to exercise your skills. What we need to see: * We'd like to see proven experience and offensive security research (CVE's, publications, patents, tools, bounties) with demonstrated responsible disclosure practices. * Strong skills in reverse engineering and automation (IDA, Ghidra), fuzzing (AFL, WinAFL, Syzcaller) and exploitation (ROP, memory corruption) are important to success; as well as understanding of modern embedded cryptography and common security issues. * Experience with ARM/X86/RISCV assembly (include shellcode development) and low-level C programming paired with understanding and experience with micro-architectural attacks (side channels, fault injection, etc) is critical. * Demonstrated skill for secure code reviews of complex source projects, and exposure to code quality practices (SDL, threat modeling) that support development goals. * Candidates should be comfortable working collaboratively and remotely with others to accomplish complex team goals, enabling delivery of outstanding security for our products. * BS/BA degree or equivalent experience * 12+ years in a security related field Ways to stand out from the crowd: * Navigating complex platform concerns and ability to analyze composed systems to identify high risk components and established testing targets and objectives. * Practical skills using Hex-Rays IDA Pro and plugin/loaders development (or similar experience with Ghidra) is valuable * Leveraging innovative strategies and AI advancements to accelerate discovery and resolution of security risks. * Experience with enclave models such as NVIDIA CC, ARM TEE, Intel SGX/TDX, AMD SEV-SNP and other isolation technologies. * Development and integration of AI tooling and skills to accelerate and improve activities and or experience with offensive actions targeting AI models (LLM or other) components within those platforms. NVIDIA has continuously reinvented itself over two decades. Our invention of the GPU in 1999 fueled the growth of the PC gaming market, redefined modern computer graphics, and revolutionized parallel computing. More recently, GPU deep learning ignited modern AI - the next era of computing. NVIDIA is a "learning machine" that constantly evolves by adapting to new opportunities that are hard to solve, that only we can pursue, and that matter to the world. This is our life's work, to amplify creativity and intelligence. Make the choice to join us today! Your base salary will be determined based on your location, experience, and the pay of employees in similar positions. The base salary range is 224,000 USD - 356,500 USD for Level 5, and 272,000 USD - 425,500 USD for Level 6. You will also be eligible for equity and benefits. Applications for this job will be accepted at least until October 5, 2025. NVIDIA is committed to fostering a diverse work environment and proud to be an equal opportunity employer. As we highly value diversity in our current and future employees, we do not discriminate (including in our hiring and promotion practices) on the basis of race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law.
    $117k-152k yearly est. Auto-Apply 16d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • SAP Security Analyst/Admin

    The Maven Group 4.5company rating

    Security engineer job in Raleigh, NC

    Direct Hire REMOTE but must reside within 3 hours of Raleigh US Citizens, Green Card, Perm Resident (no sponsorship) This primarily remote role involves SAP Security Administration tasks of planning, coordination, execution, and production support. Currently on ECC, and should be moving to S4 Hana in the next couple years. The candidate needs to possess a complete understanding of industry practices regarding application principles, concepts, practices, and standards. The candidate will interact with senior internal and external personnel on significant matters often requiring coordination between organizations. Qualifications/Requirements: • Bachelor's degree with 5+ years of professional SAP technical experience • Minimum 5 years of experience in SAP Security • Experience with SAP NetWeaver, ABAP, and related technologies • Knowledge of database management systems (MS SQL Server) • Legal authorization to work in the U.S. (no visa sponsorship). • Experience with GRC Access Control 10.x minimum (with 12.0 preferred). • Strong communication and collaboration skills to work effectively with cross-functional teams. Preferred Qualifications: • Experience with SAP ECC HANA and MSSQL databases. • Some knowledge of SAP Basis (doesn't have to be current or hands on, just enough to interface with our outsourced Basis vendor). • Experience with HANA/FIORI Security. • Strong problem-solving, analytical, and communication skills. • Familiarity with cross-functional team dynamics. • Ability to work independently and with global teams.
    $86k-110k yearly est. 60d+ ago
  • Network Security Analyst

    Collabera 4.5company rating

    Security engineer job in Durham, NC

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) Collabera listed in GS 100 - recognized for excellence and maturity Collabera named among the Top 500 Diversity Owned Businesses Collabera listed in GS 100 & ranked among top 10 service providers Collabera was ranked: 32 in the Top 100 Large Businesses in the U.S 18 in Top 500 Diversity Owned Businesses in the U.S 3 in the Top 100 Diversity Owned Businesses in New Jersey 3 in the Top 100 Privately-held Businesses in New Jersey 66th on FinTech 100 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Work Location: Durham NC 27703 Job Title: Network Security Analyst Duration: 24 Months Roles & Responsibilities: • Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis. • Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired. • The Operations team supports 24x7 and an off shift work schedule may be required. Qualifications IDS/IPS "Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer" Additional Information Should you have any questions, please feel free to call: ************ Aditika Sithta
    $75k-101k yearly est. 12h ago
  • Sr. Security Researcher, Offensive Security (Red Team)

    Corebridge Financial Inc.

    Security engineer job in Durham, NC

    Who We Are At Corebridge Financial, we believe action is everything. That's why every day we partner with financial professionals and institutions to make it possible for more people to take action in their financial lives, for today and tomorrow. We align to a set of Values that are the core pillars that define our culture and help bring our brand purpose to life: * We are stronger as one: We collaborate across the enterprise, scale what works and act decisively for our customers and partners. * We deliver on commitments: We are accountable, empower each other and go above and beyond for our stakeholders. * We learn, improve and innovate: We get better each day by challenging the status quo and equipping ourselves for the future. * We are inclusive: We embrace different perspectives, enabling our colleagues to make an impact and bring their whole selves to work. Who You'll Work With The Information Technology organization is the technological foundation of our business and works in collaboration with our partners from across the company. The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles. About The Role The Sr. Security Researcher is responsible for leading and executing offensive security assessments (red teaming) against the organization's systems and networks. This role will leverage advanced penetration testing, social engineering, and other offensive security techniques to identify and exploit vulnerabilities, simulate real-world threats, and enhance the organization's overall security posture. Responsibilities * Lead and execute red team engagements: * Develop and execute comprehensive red team assessments, including reconnaissance, vulnerability scanning, exploitation, and post-exploitation activities. * Lead and mentor junior red team members, providing guidance, training, and hands-on experience. * Develop and maintain red team methodologies, tools, and infrastructure. * Conduct threat modeling and risk assessments to identify potential attack vectors and prioritize targets. * Develop and execute social engineering campaigns, including phishing, vishing, and physical penetration tests. * Vulnerability research and exploitation: * Stay abreast of the latest threat intelligence, vulnerabilities, and exploits. * Research and develop new exploitation techniques and tools. * Conduct in-depth analysis of vulnerabilities and their potential impact. * Reporting and communication: * Prepare detailed and concise reports documenting red team findings, including technical details, impact assessments, and remediation recommendations. * Effectively communicate findings to technical and non-technical audiences, including senior management. * Present findings and recommendations at security forums and conferences (optional). * Security awareness and training: * Develop and deliver security awareness training programs to employees on topics such as social engineering, phishing, and secure coding practices. * Conduct security awareness campaigns to raise employee awareness of security threats and best practices. * Collaboration: * Collaborate with other security teams (e.g., blue team, incident response) to improve overall security posture. * Work with development teams to identify and remediate security vulnerabilities in applications and systems. * Build and maintain relationships with external security researchers and the cybersecurity community. Skills and Qualifications * Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). * 5+ years of experience in cybersecurity, with 3+ years of hands-on experience in penetration testing, red teaming. * Understanding of blended attacks. * Proven experience leading and mentoring junior security professionals. * Strong understanding of networking, systems administration, and programming concepts. * Expertise in penetration testing methodologies and tools (e.g., Cobalt Strike, Outflank, Sliver, PowerShell Empire, Metasploit, Kali Linux, Nmap). * Proficiency in scripting languages (e.g., Python, Ruby, PowerShell). * Strong understanding of network protocols (e.g., TCP/IP, HTTP, DNS). * Experience with vulnerability scanners, intrusion detection systems, and firewalls. * Experience with cloud security (e.g., AWS, Azure, GCP) is a plus. * Relevant security certifications (e.g., RTO I, RTO II, OSCP, OSCE, GPEN, CRTP) are highly desired. * Excellent analytical and problem-solving skills. * Strong communication and interpersonal skills. * Ability to work independently and as part of a team. * Strong attention to detail and accuracy. * Ability to adapt to new technologies and challenges. * Project Management. Compensation The anticipated salary range for this position is $140,000 to $165,000 at the commencement of employment. Not all candidates will be eligible for the upper end of the salary range. The actual compensation offered will ultimately be dependent on multiple factors, which may include the candidate's geographic location, skills, experience and other qualifications. In addition, the position is eligible for a discretionary bonus in accordance with the terms of the applicable incentive plan. Corebridge also offers a range of competitive benefits as part of the total compensation package, as detailed below. Work Location This position is based in Corebridge Financial's Jersey City, NC, Houston, TX, or Durham, NC office and is subject to our hybrid working policy, which gives colleagues the benefits of working both in an office and remotely. #LI-SAFG #LI-CW1 #LI-Hybrid Why Corebridge? At Corebridge Financial, we prioritize the health, well-being, and work-life balance of our employees. Our comprehensive benefits and wellness program is designed to support employees both personally and professionally, ensuring that they have the resources and flexibility needed to thrive. Benefit Offerings Include: * Health and Wellness: We offer a range of medical, dental and vision insurance plans, as well as mental health support and wellness initiatives to promote overall well-being. * Retirement Savings: We offer retirement benefits options, which vary by location. In the U.S., our competitive 401(k) Plan offers a generous dollar-for-dollar Company matching contribution of up to 6% of eligible pay and a Company contribution equal to 3% of eligible pay (subject to annual IRS limits and Plan terms). These Company contributions vest immediately. * Employee Assistance Program: Confidential counseling services and resources are available to all employees. * Matching charitable donations: Corebridge matches donations to tax-exempt organizations 1:1, up to $5,000. * Volunteer Time Off: Employees may use up to 16 volunteer hours annually to support activities that enhance and serve communities where employees live and work. * Paid Time Off: Eligible employees start off with at least 24 Paid Time Off (PTO) days so they can take time off for themselves and their families when they need it. Eligibility for and participation in employer-sponsored benefit plans and Company programs will be subject to applicable law, governing Plan document(s) and Company policy. We are an Equal Opportunity Employer Corebridge Financial, is committed to being an equal opportunity employer and we comply with all applicable federal, state, and local fair employment laws. All applicants will be considered for employment based on job-related qualifications and without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, neurodivergence, age, veteran status, or any other protected characteristic. The Company is also committed to compliance with all fair employment practices regarding citizenship and immigration status. At Corebridge Financial, we believe that diversity and inclusion are critical to building a creative workplace that leads to innovation, growth, and profitability. Through a wide variety of programs and initiatives, we invest in each employee, seeking to ensure that our colleagues are respected as individuals and valued for their unique perspectives. Corebridge Financial is committed to working with and providing reasonable accommodations to job applicants and employees, including any accommodations needed on the basis of physical or mental disabilities or sincerely held religious beliefs. If you believe you need a reasonable accommodation in order to search for a job opening or to complete any part of the application or hiring process, please send an email to ******************************************. Reasonable accommodations will be determined on a case-by-case basis, in accordance with applicable federal, state, and local law. We will consider for employment qualified applicants with criminal histories, consistent with applicable law. To learn more please visit: *************************** Functional Area: IT - Information Technology Estimated Travel Percentage (%): Up to 25% Relocation Provided: No American General Life Insurance Company
    $140k-165k yearly Auto-Apply 60d+ ago
  • Product Security Engineer, Instagram

    Meta 4.8company rating

    Security engineer job in Raleigh, NC

    The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform. **Required Skills:** Product Security Engineer, Instagram Responsibilities: 1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products 2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code 3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities 4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage 5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers 6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world **Minimum Qualifications:** Minimum Qualifications: 7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience 8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP) 9. Extensive, proven experience in threat modeling and secure systems design 10. Experience with exploiting common security vulnerabilities **Preferred Qualifications:** Preferred Qualifications: 11. Product software engineering or product management experience 12. Experience in security consulting or other leadership-facing security advisory roles 13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response 14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.) **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Security Engineer - IAM

    State Employees' Credit Union 3.3company rating

    Security engineer job in Raleigh, NC

    If you are motivated and believe in the credit union philosophy of "People Helping People," join our team! The Security Engineer - IAM is a mid-level role responsible for enhancing and evolving SECU's IAM practices, processes, and solutions. This individual will serve as a key technical resource, providing operational support, management, implementation, and strategic development of IAM solutions, including Privileged Access Management (PAM), Single Sign-On (SSO), Identity Governance and Administration (IGA), Multi-Factor Authentication (MFA), Active Directory (AD), Customer Identity and Access Management (CIAM), and other IAM technologies. The engineer will provide input and have some responsibility with designing and optimizing IAM frameworks, driving automation, and ensuring alignment with security best practices and compliance requirements. Additionally, they will actively collaborate with cross-functional teams, mentor junior engineers, and work closely with key stakeholders to strengthen the adoption of IAM controls and solutions while contributing to the overall cybersecurity strategy. Responsibilities: (30%) Perform operational support and maintenance of technical security solutions to enhance SECU's security posture. (20%) Assist in the configuration and tuning of security tools and integrations with enterprise controls and tools. (20%) Participate in identification of service quality, documentation, and operational efficiency and improvement opportunities. (10%) Participate in on-call rotation and serve as a resource for technical support of information security technologies. (10%) Mentor and collaborate with junior engineers. (10%) Pursue and maintain additional skills and certifications commensurate with the role to remain current on advancing cyber security trends. Responsibilities will include participation in special assignments and cross-functional initiatives as required. Required Education & Experience (Knowledge, Skills, & Abilities): Candidate must live in North Carolina or contiguous state. Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. Additional 2 years of relevant experience can be considered in lieu of degree. Minimum 2 year of experience in related field. General IAM Solutions Experience supporting one or more IAM solutions such as PAM, SSO, Directory Services, IGA, CIAM, and MFA Understanding of IAM Concepts Demonstrated experience and understanding of core IAM principles, such as authentication, authorization, provisioning, and access control. Demonstrated experience and understanding of identity lifecycle management (creation, modification, and deletion of user accounts). Basic Programming/Scripting Skills Ability to leverage and understand scripting languages such as Python, PowerShell, or Bash for automating tasks. User and Role Management Experience in managing user accounts, groups, roles, and permissions within an IAM system. Security Awareness Understanding of security principles, including least privilege, segregation of duties, and access reviews. Incident Response and Troubleshooting Ability to investigate and resolve access-related issues and incidents. Experience with IAM-related logs and monitoring tools for diagnosing and fixing issues. Ability to identify discrepancies or potential security risks in access control settings. Communication Skills Ability to document processes, policies, and procedures clearly and concisely. Skills in communicating technical concepts to non-technical stakeholders. Preferred Education & Experience (Knowledge, Skills, & Abilities): Bachelors degree in Computer Science, Information Technology, Cyber Security, or related field. Preferred 2-5 direct years of experience. Ability to manage role-based access control (RBAC) policies. Experience working in cross-functional teams, including IT, security, and compliance. Ability to collaborate with stakeholders to understand access requirements and implement them effectively. Experience working within a DevOps environment. Professional certifications such as: CISSP, CISA, CISM, GIAC, CGEIT, CRISC, OSCE, or other relevant industry certification and/or desire to obtain such certifications. Work Environment & Physical Requirements: *Note: “Working Conditions” or “ADA” - open to other language Computer for prolonged periods SECU provides equal employment opportunity to all qualified persons regardless of race, color, religion, age, sex, sexual orientation, gender identity, national origin, genetic information, disability, veteran status, or other classification protected by law. Disclaimer State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.
    $96k-131k yearly est. Auto-Apply 59d ago
  • Tealeaf Security Engineer

    GDIT

    Security engineer job in Morrisville, NC

    Type of Requisition: Pipeline Clearance Level Must Currently Possess: None Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: MBI (T2) Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Analytics, Collaborating, IBM Tealeaf Certifications: None Experience: 5 + years of related experience US Citizenship Required: No Job Description: Seize your opportunity to make a personal impact as a Tealeaf Security Engineer supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As a Tealeaf Security Engineer, you will help ensure today is safe and tomorrow is smarter. Our work depends on a Tealeaf Security Engineer joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service. HOW A TEALEAF SECURITY ENGINEER WILL MAKE AN IMPACT In this role, a typical day will include: Responsible for web application security to monitor, analyze, and report on suspicious activities in support of USPS CSOC and the Fraud team. Deploying, configuring, and maintaining Tealeaf components (cx Impact, cx Replay, cx View, Overstat, SDK, PCA, Canisters, Portal, Replay server) Supporting secure integration with websites, mobile apps, proxies, and backend services. Maintaining and optimizing sessions capture fidelity, replay accuracy, and overall system stability. This role sits at the intersection of customer experience analytics, data security, and enterprise cybersecurity, ensuring that all Tealeaf data capture and replay functions are implemented securely, reliably, and in compliance with organizational and regulatory requirements. WHAT YOU'LL NEED TO SUCCEED: Education: Bachelor's or master's degree in computer science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience. NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required. Required Experience: 3+ years Tealeaf analytics and replay configuration - Events, dimensions, privacy rules, replay rules Good understanding of website and web server architecture, cloud computing, including web 2.0 (JSON, JavaScript) Understanding of AI and LLM and how it can be leveraged to automate some of the Tealeaf activities and notifications. Professional communication/presentation skills, focus on value-added delivery On-call availability for, cybersecurity issues, network impacting or network outage situations outside of business hours Effectively work within a Security team, and support and collaborate with other teams Build and maintain dashboards to monitor Tealeaf infrastructure health and capture quality. Develop alerts for anomalies, unauthorized access attempts, or abnormal capture behaviors. Support incident response teams by providing Tealeaf session data during investigations. Hands-on experience with: Tealeaf capture mechanisms (PCF, SDK, JavaScript Event Capture) Maintaining capture servers, replay servers, and data pipelines Log parsing and structured data formats Proficiency in at least one scripting language (Python, Bash, PowerShell). Experience integrating telemetry with SIEMs (Splunk, QRadar, Elastic, etc.). Security Clearance Level: Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years. Location: Morrisville, NC Falls Church, VA Eagan, MN Remote considered GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career. Professional growth opportunities including paid education and certifications. Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays #GDITCareers #Tealeaf #SecurityEngineer The likely salary range for this position is $128,039 - $173,229. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA NC Morrisville Additional Work Locations: USA VA Falls Church Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $128k-173.2k yearly Auto-Apply 14d ago
  • Security Engineer, Level III

    Corporate & Technical Recruiters, Inc.

    Security engineer job in Durham, NC

    This individual will be responsible for providing tier III support for a Managed Service Security Provider (MSSP). The successful candidate will be an integral member of the security engineering team and will need to be fully cognizant of state-of-the-art network, firewall, and other security technologies, products and solutions as well as industry best practice with regard to the design, implementation and deployment of next generations security devices. This individual should have hands-on experience configuring, installing and managing Fortigate, Cisco ASA, Checkpoint, SonicWall or Blue Coat security devices. This person must be able to communicate, and document instructions effectively with Tier 1 and 2 support teams. Excellent customer service skills and written communication are required. This position is located in Durham, NC. Qualifications: A Bachelors or Master's degree preferably in Computer Engineering/Networking, international equivalent, or equivalent experience Minimum of 5 years of experience designing, implementing and deploying next generation firewalls based on Information Security Best Practices Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc Minimum of 7 years experience in networking, troubleshooting, and analysis tools Expert understanding and working knowledge of TCP/IP, access-control lists, VLANs, VPNs, firewalls, and dynamic routing protocols such as BGP, OSPF and EIGRP Evaluates and recommends solutions for highly complex security systems according to industry best practices to safeguard internal information systems and databases Excellent communication skills and experience working collaboratively in cross-functional teams. On-call Duties Ability to travel as needed, approximately 1-3 times a quarter. Can be both domestic and global travel. Desired: Vender Certification, preferably Fortinet/Cisco/Blue Coat Security Certifications: CCNA, CCNP-Security The ability to define security requirements and subsequently reviews complex systems to determine if they have been designed to comply with established standards The ability to conduct research and inform management of appropriate developments in firewall, IDPS, WCF, DLP, Application Control and VPN and secure networking technologies and products Compensation: A competitive package consisting of a base salary, and full company benefits Company information We help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analyzing huge volumes of data. We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA
    $80k-111k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 39d ago
  • Network Security Consultant

    Akkodis

    Security engineer job in Raleigh, NC

    Akkodis is seeking a Network Security Consultant for a Contract with a client in Raleigh, NC. You will design and optimize Next Generation Firewall (NGFW) solutions while developing and fine-tuning Snort and Suricata rules to strengthen network security. Rate Range: $56/hour to $64/hour; The rate may be negotiable based on experience, education, geographic location, and other factors. Network Security Consultant job responsibilities include: * Design, implement, and optimize Next Generation Firewall (NGFW) solutions to ensure robust network security across enterprise environments. * Develop, update, and fine-tune Snort and Suricata intrusion detection/prevention rules to detect and mitigate threats effectively. * Perform security assessments and vulnerability analysis to identify risks and recommend remediation strategies. * Collaborate with network and security teams to integrate NGFW policies with broader security architecture and compliance requirements. * Monitor and analyze network traffic and security logs to proactively identify anomalies and potential breaches. * Provide expert guidance and documentation on firewall configurations, IDS/IPS tuning, and best practices for secure network operations. Required Qualifications: * Bachelor's degree in computer science, Information Security, or a related field (master's preferred). * Minimum 5+ years in network security with hands-on NGFW design and operations experience. * Proven expertise in Next Generation Firewalls (NGFW) design, configuration, and optimization. * Strong experience in developing and fine-tuning Snort and Suricata rules for IDS/IPS systems. If you are interested in this role, then please click APPLY NOW. For other opportunities available at Akkodis, or any questions, feel free to contact me at ***************************. Pay Details: $56.00 to $64.00 per hour Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable. Equal Opportunity Employer/Veterans/Disabled Military connected talent encouraged to apply To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to ************************************************* The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable: * The California Fair Chance Act * Los Angeles City Fair Chance Ordinance * Los Angeles County Fair Chance Ordinance for Employers * San Francisco Fair Chance Ordinance Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
    $56-64 hourly Easy Apply 9d ago
  • Sr. Security Analyst

    Procom Consultants Group 4.2company rating

    Security engineer job in Durham, NC

    Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company. Procom's areas of staffing expertise include: • Application Development • Project Management • Quality Assurance • Business/Systems Analysis • Datawarehouse & Business Intelligence • Infrastructure & Network Services • Risk Management & Compliance • Business Continuity & Disaster Recovery • Security & Privacy Specialties• Contract Staffing (Staff Augmentation) • Permanent Placement (Staff Augmentation) • ICAP (Contractor Payroll) • Flextrack (Vendor Management System) Job Description Sr. Security Analyst On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC. Sr. Security Analyst Job Details Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure. Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations. Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management. Educate information / resource owners in the implementation of necessary information security controls. Perform standard and non-standard processing of security authorization requests. Work with resource owners to determine appropriate security policies for securable customer resources. Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures. Report suspected information security misuse to manager or director. Assist resource owners and IT staff in understanding and responding to security access exceptions. Sr. Security Analyst Mandatory Skills - Bachelor's degree in Computer Science. - 2 years of security administration experience, or related technical system administration experience. - In lieu of degree 5 years of security administration experience. - Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA. - Systems administration experience within other aspects of IT - Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) - Demonstrated experience working with a managed services organization. - Demonstrated experience working with a request ticketing system, such as Triole. - Strong analytical and problem-solving skills. - Ability to present and discuss technical information to users with varying technical expertise. - Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously. - Must be detail-oriented with a high level of accuracy. - Excellent written and verbal communication skills. - Demonstrated ability to develop and maintain collaborative working relationships across multiple teams. - Strong customer focus and the ability to manage customer expectations. - Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people. - Demonstrated commitment to continuous process improvement. - CISSP, CISA, or other security / audit / field related certifications a plus Sr. Security Analyst Start Date ASAP Sr. Security Analyst Assignment Length 7+ months Additional Information All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
    $75k-95k yearly est. 12h ago
  • Information Security Manager

    ZP Group 4.0company rating

    Security engineer job in Raleigh, NC

    Piper Companies is seeking an Information Security Manager who will be responsible for developing, implementing, and maintaining the organization's information security program. This role ensures the confidentiality, integrity, and availability of data and systems by managing security policies, risk assessments, compliance initiatives, and incident response processes. The candidate will sit 3 days a week on-site in Raleigh, NC. Responsibilities for the Information Security Manager: * Develop and enforce security policies, standards, and procedures aligned with industry best practices * Lead risk assessments and vulnerability management programs * Manage security tools such as firewalls, SIEM, endpoint protection, and DLP solutions * Monitor and respond to security incidents, coordinating investigations and remediation * Lead and mentor a team of security analysts and engineers * Collaborate with IT, DevOps, and business units to integrate security into processes and Qualifications for the Information Security Manager include: * Bachelor's degree in computer science, Information Technology, Cybersecurity, or related field * 7+ years in information security roles, with at least 1-2 years in a leadership position * Certifications such as CISSP, CISM, or equivalent preferred * Strong knowledge of security frameworks (NIST, ISO 27001) * Expertise in network security, cloud security, and IAM Compensation of the Information Security Manager: * $120,000-$165,000 * Comprehensive Benefits: Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law, and Holidays This job opens for applications on 12/19/2025. Applications for this job will be accepted for at least 30 days from the posting date. Information Security Manager, Risk Assessment, CISSP, CISM, NIST, network security, IAM, cloud security, leadership, firewall, DLP, Compliance, Hybrid #LI-HL1 #LI-HYBRID
    $120k-165k yearly 10d ago
  • Sr. Information Security Engineer

    Bandwidth 4.5company rating

    Security engineer job in Raleigh, NC

    Who We Are: Bandwidth, a prior “Best of EC” award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and emergency services. Reaching 65+ countries and over 90 percent of the global economy, we're the only provider offering an owned communications cloud that delivers advanced automation, AI integrations, global reach, and premium human support. Bandwidth is trusted for mission-critical communications by the Global 2000, hyperscalers, and SaaS builders! At Bandwidth, your music matters when you are part of the BAND. We celebrate differences and encourage BANDmates to be their authentic selves. #jointheband What We Are Looking For: The mission of the Security Operations team is to build, deploy, and operate information security systems, infrastructure, and tools. The Senior Security Engineer will act as a leader in monitoring, administration, ticketing and support. In addition, mentoring other security team members in operations functions, as well as assisting management in growing and maturing security detection, monitoring and response. As a Senior Security Engineer, you will work closely with not only other Information Security teams but also partner with the IT, development and architecture organizations. You will be part of a talented team of security professionals who demonstrate superb technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security across the enterprise. What You'll Do: Provide technical and operational leadership for aspects of security operations, security architecture and security tools administration. Serve as an escalation point in incident response scenarios; acting as the incident lead and conducting investigations and forensics as needed. Actively engages in the performance of Incident Response activities, including but not limited to, triage, escalation, conducting post-mortem and lessons learned, as well as remediation tracking. Displays a strong knowledge and understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR Advanced understanding of securing both cloud-based (AWS, GCP) and on-prem workloads including traditional architecture design and containerized environments. Identify gaps in current monitoring or operational processes and workflows, and recommend changes or enhancements to improve efficiency through security best practices.. Provide security consulting on medium to large scale projects for internal clients to ensure conformity with corporate information, security policy and standards Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations, and designing strategic preventative and compensating controls Drives process improvement and control implementation projects in coordination with the other Enterprise teams Engages with neighboring Bandwidth technology teams to drive awareness and compliance to security policies and standards Participate in security on-call rotation, supporting off-hours general security incidents and production systems. Maintain working relationships with business partners to understand business processes, and the impact of implementing security controls in their ability to do business Train and mentor team members for security operations, support, and/or administration tasks What You Need: Education: Degree in an IT or Information Security discipline or other equivalent combination of education and/or experience that is focused on IT Security and Technology Operations. One or more of the following certifications: GIAC Information Security Professional (GISP) Certified Information Systems Security Professional (CISSP) AWS Certified Security Specialty Experience: 5 or more years of specific Security Operations experience required. 5 or more years SIEM, SOAR and vulnerability management experience, including integrating endpoints 3 or more years of incident response experience across a variety of environments and resource types: on-prem, cloud, endpoints, servers, containers, etc. Knowledge: Familiarity with cutting-edge security technologies such as Zero-Trust Network Access, SSO, Endpoint Detection and Response (EDR), and Security Incident and Event Management required (SIEM). Experience working in multi-cloud organizations utilizing cloud security posture management (CSPM) and cloud-native security tools with a “shift-left” DevSecOps mentality Experience working with a third-party Managed Security Service Provider (MSSP) Skills: Proficient in Windows and Linux operating systems. Ability to analyze a complex technical environment and quickly build a conceptual understanding of how the pieces all fit together Proficient in automation and scripting languages (Python, Bash, etc) Ability to analyze and correlate information from multiple sources to determine and articulate potential risk to the business in non-technical terms. Team player with strong communication skills, ability to collaborate with highly technical colleagues and non-technical end-users at a level they can understand. Bonus Points: Experience: Hands-on experience with Wiz and CrowdStrike - cloud security and container security . Hands-on experience with AWS / cloud security tools (Guard Duty, Amazon Inspector, AWS Shield,Wiz, Lacework, etc.) Strong knowledge of SIEM tools and logging (Splunk, Sumo Logic, Data Dog, Qualys) Understanding of maintaining and administering endpoint detection response tools (CrowdStrike, FireEye, etc) Foundational knowledge of Ai - LLMs (language learning models), MCP (model context protocol) and the impacts of these on securing organizational resources. Knowledge: Understanding of authentication and authorization mechanisms. Familiar with data classification, data protection, and secure data handling practices. Understanding of regulatory requirements (SOX, GDPR, HIPAA … ) The Whole Person Promise: At Bandwidth, we're pretty proud of our corporate culture, which is rooted in our “Whole Person Promise.” We promise all employees that they can have meaningful work AND a full life, and we provide a work environment geared toward enriching your body, mind, and spirit. How do we do that? Well… 100% company-paid Medical, Vision, & Dental coverage for you and your family with low deductibles and low out-of-pocket expenses. All new hires receive four weeks of PTO. PTO Embargo. When you take time off (of any kind!) you're embargoed from working. Bandmates and managers are not allowed to interrupt your PTO - not even with email. Additional PTO can be earned throughout the year through volunteer hours and Bandwidth challenges. “Mahalo moments” program grants additional time off for life's most important moments like graduations, buying a first home, getting married, wedding anniversaries (every five years), and the birth of a grandchild. 90-Minute Workout Lunches and unlimited meetings with our very own nutritionist. Are you excited about the position and its responsibilities, but not sure if you're 100% qualified? Do you feel you can work to help us crush the mission? If you answered ‘yes' to both of these questions, we encourage you to apply! You won't want to miss the opportunity to be a part of the BAND. Applicant Privacy Notice
    $93k-119k yearly est. Auto-Apply 11d ago
  • Network Security Engineer

    System Soft Technologies 4.2company rating

    Security engineer job in Raleigh, NC

    Raleigh, NC (on-site) - local candidates will only be considered US or Green Card will only be considered US based work experience required The Network Security Engineer to protect the integrity and confidentiality of our network systems and data. This role is responsible for monitoring traffic, identifying vulnerabilities, responding to incidents, and maintaining firewall and encryption protocols-all while staying ahead of emerging threats. Key Responsibilities: Monitor network activity and respond to vulnerabilities in a timely manner Design, implement, and maintain security frameworks, policies, and tools Conduct regular vulnerability assessments and penetration tests Manage firewalls, user access, and authentication permissions Document security policies and incident responses Support audits and compliance efforts Qualifications: Bachelor's degree in a technical area of study 5+ years of IT network/security experience in the United States Expertise in TCP/IP networking, MPLS, SD-WAN, and firewalls Proficiency with security tools and technologies; strong knowledge of protocols and best practices Familiarity with Windows networking, SQL/SQL Server, and SAML Cybersecurity certifications (CISSP, CISM, CISA) preferred
    $74k-106k yearly est. 60d+ ago
  • Network Security Analyst

    Collabera 4.5company rating

    Security engineer job in Durham, NC

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) Collabera listed in GS 100 - recognized for excellence and maturity Collabera named among the Top 500 Diversity Owned Businesses Collabera listed in GS 100 & ranked among top 10 service providers Collabera was ranked: 32 in the Top 100 Large Businesses in the U.S 18 in Top 500 Diversity Owned Businesses in the U.S 3 in the Top 100 Diversity Owned Businesses in New Jersey 3 in the Top 100 Privately-held Businesses in New Jersey 66th on FinTech 100 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Job Description Work Location: Durham NC 27703 Job Title: Network Security Analyst Duration: 24 Months Roles & Responsibilities: • Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis. • Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired. • The Operations team supports 24x7 and an off shift work schedule may be required. Qualifications IDS/IPS "Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer" Additional Information Should you have any questions, please feel free to call: ************ Aditika Sithta
    $75k-101k yearly est. 60d+ ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Security engineer job in Raleigh, NC

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 39d ago
  • Information Security Analyst

    GDIT

    Security engineer job in Liberty, NC

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity, Information Security, System Security Certifications: None Experience: 3 + years of related experience US Citizenship Required: Yes : Job Description Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate. At GDIT, people are our differentiator. As an Information Security Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on TS/SCI cleared Information Security Analysts joining our team to support our intelligence customer at Fort Liberty, NC. HOW AN INFORMATION SECURITY ANALYST WILL MAKE AN IMPACT The Information Assurance Analyst is primarily responsible for incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP). Tracks and handles cyber security incidents/events from initial detection to final resolution; coordinates with appropriate parties to investigate and maintain communications. Collaborates with specialty teams to investigate and resolve complex problems. Troubleshoots security tools on the network to ensure successful operation, compatibility with other applications, and minimal impact to the users. Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the vulnerability management and admin teams. Performs Information Systems Security Officer (ISSO) duties, and acts as the POC between parent organization and cyber security teams. Conducts change requests, software authorizations, static code analysis, account reviews, and other Assessment & Authorization (A&A) tasks as required. Acts as a central point of contact for all inquiries potentially regarding cyber security, and if necessary, redirects to the appropriate entities. WHAT YOU'LL NEED TO SUCCEED EDUCATION Associate Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 8570 Certification REQUIRED EXPERIENCE: 3+ years of related experience in data security administration. REQUIRED TECHNICAL SKILLS: Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP Within 6 months of hire - CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User SECURITY CLEARANCE: TS/SCI (Required) REQUIRED SKILLS AND ABILITIES: Proficient at navigating Windows 10/Server 2012/Server 2016 operating systems to perform intrusion analysis and systems maintenance Proficient at navigating Linux: Ubuntu/RHEL 6/7/8 to facilitate cyber security engineering and systems maintenance Basic scripting skills using Windows command-line, PowerShell, or BASH Understanding of network ports, protocols, and services Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, Open Source Intelligence (OSINT) sources Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools Build and maintain ACAS infrastructure; analyze vulnerability scan results and provide recommendations for remediation PREFERRED SKILLS: Strong desire to learn new skills, techniques, tactics, and procedures to improve knowledge and existing processes Must be able to multi-task and adapt to changing priorities in highly stressful situations Highly resilient and motivated to investigate unfamiliar and anomalous problems in a robust OPTEMPO environment, including follow-through to complete resolution Critical thinking skills required to apply and correlate data from multiple sources to solve complex problems Strong ability to quickly and clearly articulate operational impacts of cyber security incidents/events to leadership Ability to communicate efficiently and precisely to target audience, as well as build strong rapport with other teams Location: On Company Site Citizenship Required US citizenship GDIT IS YOUR PLACE: ● 401K with company match ● Comprehensive health and wellness packages ● Internal mobility team dedicated to helping you own your career ● Professional growth opportunities including paid education and certifications ● Cutting-edge technology you can learn from ● Rest and recharge with paid vacation and holidays The likely salary range for this position is $76,500 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 25-50% Telecommuting Options: Onsite Work Location: USA NC Fort Liberty Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $76.5k-103.5k yearly Auto-Apply 20d ago
  • Sr. Security Analyst

    Procom Consultants Group 4.2company rating

    Security engineer job in Durham, NC

    Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company. Procom's areas of staffing expertise include: • Application Development • Project Management • Quality Assurance • Business/Systems Analysis • Datawarehouse & Business Intelligence • Infrastructure & Network Services • Risk Management & Compliance • Business Continuity & Disaster Recovery • Security & Privacy Specialties• Contract Staffing (Staff Augmentation) • Permanent Placement (Staff Augmentation) • ICAP (Contractor Payroll) • Flextrack (Vendor Management System) Job Description Sr. Security Analyst On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC. Sr. Security Analyst Job Details Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure. Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations. Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management. Educate information / resource owners in the implementation of necessary information security controls. Perform standard and non-standard processing of security authorization requests. Work with resource owners to determine appropriate security policies for securable customer resources. Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures. Report suspected information security misuse to manager or director. Assist resource owners and IT staff in understanding and responding to security access exceptions. Sr. Security Analyst Mandatory Skills - Bachelor's degree in Computer Science. - 2 years of security administration experience, or related technical system administration experience. - In lieu of degree 5 years of security administration experience. - Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA. - Systems administration experience within other aspects of IT - Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) - Demonstrated experience working with a managed services organization. - Demonstrated experience working with a request ticketing system, such as Triole. - Strong analytical and problem-solving skills. - Ability to present and discuss technical information to users with varying technical expertise. - Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously. - Must be detail-oriented with a high level of accuracy. - Excellent written and verbal communication skills. - Demonstrated ability to develop and maintain collaborative working relationships across multiple teams. - Strong customer focus and the ability to manage customer expectations. - Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people. - Demonstrated commitment to continuous process improvement. - CISSP, CISA, or other security / audit / field related certifications a plus Sr. Security Analyst Start Date ASAP Sr. Security Analyst Assignment Length 7+ months Additional Information All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
    $75k-95k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Raleigh, NC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 39d ago

Learn more about security engineer jobs

How much does a security engineer earn in Morrisville, NC?

The average security engineer in Morrisville, NC earns between $69,000 and $128,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Morrisville, NC

$94,000

What are the biggest employers of Security Engineers in Morrisville, NC?

The biggest employers of Security Engineers in Morrisville, NC are:
  1. General Dynamics
  2. Verizon Communications
  3. Alliance One International
  4. Verizon Services Corp.
  5. GDIT
Job type you want
Full Time
Part Time
Internship
Temporary