Post job

Security engineer jobs in North Whitehall, PA - 927 jobs

All
Security Engineer
Network Engineer
Information Security Analyst
Hacker
Security System Engineer
Systems Engineer
Securities Analyst
Cyber Security Specialist
Senior Security Specialist
Network Security Engineer
Cyber Security Analyst
Senior Information Security Analyst
Information Security Officer
Network Security Analyst
  • Chief Information Security Officer

    Arma International 4.4company rating

    Security engineer job in Princeton, NJ

    Department Information Security Office Category Information Technology Job Type Full-Time The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research. The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements. The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance. Responsibilities Strategic Planning and Policy Development Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders. Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations. Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies. Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office. Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities. Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications. Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives. As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture. Management Leads the overall management and success of a robust, current and expanding information security office. Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan. Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security. Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs. Training and Outreach Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security. Qualifications Essential Qualifications: At least 10 years of current experience directly related to the responsibilities of the role Demonstrated domain expertise A strategic grasp of information security at both institutional and operational levels The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields Communication and collaboration skills to build support for security-related initiatives and objectives Experience in higher education or a research environment is preferred Broad knowledge of computer security issues, requirements, and trends Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment Integrity and high standards of personal and professional conduct Education : Bachelor's degree required, preferably in computer science or information technology Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials Preferred Qualifications: Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden. Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law. The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly. If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above. The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information. Standard Weekly Hours 36.25 Eligible for Overtime No Benefits Eligible Yes Probationary Period 180 days Essential Services Personnel (see policy for detail) No Physical Capacity Exam Required No Valid Drivers License Required No Experience Level Director Salary Range $265,000 to $325,000 PI279427080 #J-18808-Ljbffr
    $265k-325k yearly 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Specialist

    First National Bank of Pennsylvania 3.7company rating

    Security engineer job in Pittsburgh, PA

    Primary Office Location:626 Washington Place. Pittsburgh, Pennsylvania. 15219.Join our team. Make a difference - for us and for your future. Cyber Security Specialist Business Unit: Risk Management Reports to: Manager of Cyber Security Position Overview: This position is primarily responsible for performing all procedures necessary to ensure the safety of information systems assets and protecting systems from intentional or inadvertent access or destruction under the supervision of the Manager of Cyber Security. The incumbent demonstrates the ability to develop IT security standards and procedures, has demonstrated knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to the corporation and it's objectives. Primary Responsibilities: Investigates, escalates and documents cyber security events or incidents according to standard operating procedures (SOP), as needed. Writes comprehensive reports of incident investigations. Evaluates and improves Security Information and Event Management (SIEM) rule set based on threat and vulnerability indicators. Analyzes information from variable threat sources and provide necessary awareness to management, IT and impact business areas. Tracks remediation of identified issues based on incident investigations. Utilizes forensic resources to understand event impacts and generates incident reports. Assists management in preparation of reports of current threats. Uses PowerShell scripting or other programming languages to automate tasks. Leverages various toolsets to gain awareness of potentially suspicious activity and alerts to threats, intrusions and/or compromises. Performs other related duties and projects as assigned. All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing and monitoring the risk they encounter daily as required by F.N.B. Corporation's risk management program. F.N.B. Corporation is committed to achieving superior levels of compliance by adhering to regulatory laws and guidelines. Compliance with regulatory laws and company procedures is a required component of all position descriptions. Minimum Level of Education Required to Perform the Primary Responsibilities of this Position: BA or BS Minimum # of Years of Job Related Experience Required to Perform the Primary Responsibilities of this Position: 3 Skills Required to Perform the Primary Responsibilities of this Position: Excellent communication skills, both written and verbal Excellent customer service skills Excellent project management skills Detail-oriented Strong security background in network/systems/physical security, authentication, authorization and usability. Comprehensive knowledge of the OSI model. Working knowledge of packet collection and analysis tools. Licensures/Certifications Required to Perform the Primary Responsibilities of this Position: Valid Drivers License CISSP, Security+, Network+, GCIA, GCIH, CEH, CISM, CSX Physical Requirements or Work Conditions Beyond Traditional Office Work: Heavy Lifting over 45 lbs. Equal Employment Opportunity (EEO): It is the policy of FNB not to discriminate against any employee or applicant for employment because of his or her race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, or status as a protected veteran. FNB provides all applicants and employees a discrimination and harassment free workplace.
    $86k-120k yearly est. 4d ago
  • senior security specialist-Akamai

    Vbeyond Corporation 4.1company rating

    Security engineer job in Morristown, NJ

    Akamai- Senior Security Specialist Must have skills • SOC/SIEM, Threat Hunting, Incident Response, Endpoint Security - EDR/XDR • WAF/DDoS implementation and configuration using Cloudflare/Akamai platforms • Client management skills 10+ yrs exp Job Description: As a Senior Security Specialist, you will play a critical role in safeguarding our organization's information assets and infrastructure. Your expertise in Cybersecurity, EPP, EDR, XDR, AI Security, threat hunting, network security, WAF, cloud security, threat detection, incident response, malware analysis, data and log analysis, and timeline forensics will be instrumental in identifying and mitigating security risks. You will work collaboratively with cross-functional teams, security analysts, IT professionals, and management to ensure the protection of our systems, networks, and data. Key Responsibilities: Design, develop and implement security solutions and tools like Aurora, Palo Alto Cortex to improve security posture and protect organizations infrastructure and data. Review and validate policy configurations and utilize security tools including EPP, EDR, XDR, cloud security configurations, network security technologies to improve and fine-tuning. Work with MFX and clients for endpoint security related report review and provide technical details. Proven security engineering and administration experience with EPP, EDR, XDR technologies preferably Aurora, Cortex etc. Research the latest security best practices and technologies, staying abreast of new threats and vulnerabilities and helping disseminate this information within the groups at the company. Develop and implement cybersecurity strategies, policies, and procedures. Lead and coordinate incident response activities, including containment, eradication, and recovery. Conduct post-incident analysis to identify lessons learned and recommend improvements. Work closely with internal and external stakeholders to manage and mitigate security incidents. Provide guidance and support to junior security team members during incident response activities. Perform analysis of suspicious files and malware samples. Identify malware behavior, capabilities, and potential impact. Develop and maintain a malware analysis lab and related tools. Provide recommendations for mitigation and response to malware incidents. Stay updated with emerging malware trends and techniques. Familiarity with Cyber Kill chain and MITRE ATT&CK framework. Establish, execute, communicate, and oversee project management for MFX and clients. Education / Work Experience: Minimum 10+ years of experience in cybersecurity, network security, cloud security, threat hunting including a minimum of 5+ years of experience in Endpoint Security technologies. Work experience with securing cloud infrastructure in Azure/AWS. Experience in WAF, DDoS configurations and incident handling skills. Preferred Certifications: GIAC, CISM, CCSP, CISSP, or equivalent certification, work experience, or skills. Strong knowledge of cybersecurity principles, best practices, and industry frameworks (e.g., NIST, ISO 27001). Good to have digital forensic investigations, including timeline analysis. Knowledge / skills: Advanced knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security. Experience using endpoint security technologies like Aurora, Cortex, or similar. Strong technical experience in cloud security services - network and storage encryption, network security groups, web security and identity and access management. Administering and improving industry standard security controls using security tools like EPP, EDR, XDR etc. and driving operational excellence. Experience with multiple Operating systems (Linux, Unix, Windows) Understanding of forensic principles and methodologies, including timeline forensics (Good to have) Excellent customer relationship and strong communication (i.e., written and verbal), presentation, teamwork skills and resourcefulness.
    $89k-135k yearly est. 1d ago
  • Sr. Specialist, Security Operations

    Rennerbrown

    Security engineer job in Princeton, NJ

    A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments. The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership. Key Responsibilities Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments. Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness. Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments. Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes. Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration. Support remediation and post-incident activities to strengthen resilience across technology domains. Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices. Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards. Required Experience Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection. Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors. Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments. Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings. Strong analytical and communication skills, with the ability to work effectively across technical and business teams. Technical Expertise Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains. Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms. Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF. Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows. Experience collaborating on vulnerability management and remediation across IT and OT environments. Certifications Required: CISSP Preferred: GICSP, GRID, or other OT/ICS-specific certifications. Education Bachelor's degree in Information Security, Computer Science, or a related technical field required. Advanced coursework or training in OT/ICS cybersecurity preferred.
    $86k-133k yearly est. 5d ago
  • System Engineer

    Clark Davis Associates 4.4company rating

    Security engineer job in Bridgewater, NJ

    Pharmaceutical Company, 40 per hour, Bridgewater, 6 month contract, ON SITE US CITIZEN OR GREEN CARD ONLY NO C2C NO CORP TO CORP FIVE PLUS YEARS EXPERIENCE MUST HAVE PHARMA EXPERIENCE The Systems Engineer is responsible for managing day-to-day end user support for users as well as Servers (on-prem/cloud), networking, telecommunications & cyber security tools in the Pharmaceuticals North American GMP compliant sites, including Data Centers, Cloud, Network, Communication link services 3 - 5 years' experience working in a GMP compliant pharmaceutical laboratory/manufacturing environment. Knowledgeable of Cisco, Juniper, Aruba Technologies & Architectures (examples- Cloud & Cloud Security, Networking- Network Segmentation, Patching, Next-Gen AV, Avaya VOIP, Teams based Conferencing systems) 3-5 years of hands-on experience managing and maintaining servers, LAN, IP Phone and WAN systems; Switches/ Routers/ Access Points, VPNs; Knowledge of IT-OT Network Segregation. As part of a team, works to maintain Juniper network infrastructure, including all configuration and maintenance; Owns responsibility for multi-site Aruba WiFi infrastructure. Has working knowledge of Microsoft 365 and Microsoft Teams rooms (conferencing systems) Oversee and ensure timely repair/replacement of faulty hardware including endpoint devices, network hardware and appliances. Maintain hardware inventories of endpoint devices, servers, network equipment, GMP assets and applications Author, revise or update approved documentation and SOP's following established change control and regulatory compliance procedures Ensure 100% compliance with GMP policies and procedures
    $79k-112k yearly est. 3d ago
  • Network Engineer (Boston MA or New England)

    Presidio Networked Solutions, LLC

    Security engineer job in Morristown, NJ

    Presidio, Where Teamwork and Innovation Shape the Future AtPresidio, we're at the forefront of a global technology revolution, transforming industries throughcutting-edge digital solutions and next-generation AI. We empower businesses-and their customers-to achieve more through innovation, automation, and intelligent insights. The Role Presidio is seeking a Network Engineer to join our team to support our client base. This individual will lead small to large projects on their own or as part of a team, which includes planning, design, and implementation of complex network and security engagements. This is a consultative role providing network engineering services on project work and effectively managing the implementation process from design to customer acceptance. Travel Requirements: In this role you will be expected to travel up to 25%. Key Responsibilities: Primary responsibilities include performing project-based engineering, design, staging, installation, validation, testing, and troubleshooting of data/security networks Lead complex, large scale Network and Security projects Create low-level detailed designs that align with the business strategy, the customer's budget, and operational support capabilities. Network discoveries Perform Network and Security Assessments Presenting documentation and engagement deliverables to customers Collaborating as part of a multi-functional team with Sales, Pre-Sales, Project Management, and other delivery/engineering resources Trouble resolution of complex issues and assisting team members in solving problems with their deployments. Working with junior members of the engineering team to successfully implement secure network solutions Execute network maintenance MOP both onsite and remotely with minimal downtime Required Qualifications: Experienced expert with complex multi-protocol routing and switching solutions Various security parameters and harden access to devices Core Routing and Switching platforms with a focus on design, configuration, and troubleshooting using Cisco Best Practices Network design and applications, including designing IP addressing OSPF, BGP, EIGRP. Redistribution of protocols and loop prevention TCP/IP protocol stack, TCP/IP headers and packets, the OSI model, and commonly used TCP/UDP ports and associated services Cloud Networking Experience AWS, Azure, GCP in Networking context Aviatrix Experienced deploying at least one SDWAN Solution with Viptela, Silverpeak, or Palo Prisma SDWAN Experienced in implementing security solutions such as: Palo Alto Networks Product Portfolio Panorama Prisma Access Prisma Cloud Cisco Security Product Portfolio FirePower / FTD Firewalls, Meraki MX: Configuration, tuning, troubleshooting FMC Management Strong level in routing and switching troubleshooting Solid verbal and written communication skills Bachelor's Degree or equivalent experience and/or military experience Must have 4-5 years of related project implementation experience Additional/Preferred Skills/Certifications: Fortinet Product Portfolio Fortigate FWs, FortiManager/FortiAnalyzer Arista Networking solutions, including CloudVision Aruba Product Suite Experience with Aruba CX and Aruba OS software VSX and VSF technologies High availability configurations Automation / Scripting: Python, EMM and TCL Active Cisco certification; CCNP, CCIE Preferred Active Palo Alto certification; PCNSA, PCCSE, PCNSE Preferred Your future at Presidio JoiningPresidiomeans stepping into aculture of trailblazers-thinkers, builders, and collaborators-who push the boundaries of what's possible. With our expertise in AI-driven analytics, cloud solutions, cybersecurity, and next-gen infrastructure, we enable businesses to stay ahead in an ever-evolving digital world. Here,your impact is real.Whether you're harnessing the power of Generative AI, architecting resilientdigital ecosystems, or drivingdata-driven transformation, you'll be part of a team that is shaping the future. Ready to innovate? Let's redefine what's next-together. About Presidio Presidio is committed to hiring the most qualified candidates to join our amazing culture. We aim to attract and hire top talent from all backgrounds, including underrepresented and marginalized communities. We encourage women, people of color, people with disabilities, and veterans to apply for open roles at Presidio. Diversity of skills and thought is a key component to our business success. At Presidio, speed and quality meet technology and innovation. Presidio is a trusted ally for organizations across industries with a decades-long history of building traditional IT foundations and deep expertise in AI and automation, security, networking, digital transformation, and cloud computing. Presidio fills gaps, removes hurdles, optimizes costs, and reduces risk. Presidio's expert technical team develops custom applications, provides managed services, enables actionable data insights and builds forward-thinking solutions that drive strategic outcomes for clients globally. For more information, visit **************** ***** Applications will be accepted on a rolling basis. Presidio is an Equal Opportunity / Affirmative Action Employer / VEVRAA Federal Contractor. All qualified candidates will receive consideration for this position regardless of race, color, creed, religion, national origin, age, sex, citizenship, ethnicity, veteran status, marital status, disability, sexual orientation, gender identification or any other characteristic protected by applicable federal, state and local statutes, regulations and ordinances. To read more about discrimination protections under Federal Law, please visit: If you have any difficulty using our online system and need an accommodation in the job application process due to a disability, please send an email to for assistance. Presidio is a VEVRAA Federal Contractor requesting priority referrals of protected veterans for its openings. State Employment Services, please provide priority referrals to . Notice to Massachusetts Candidates: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. Recruitment Agencies, Please Note: Presidio does not accept unsolicited agency resumes/CVs. Do not forward resumes/CVs to our careers email address, Presidio employees or any other means. Presidio is not responsible for any fees related to unsolicited resumes/CVs. #LI-AV1 Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.
    $70k-93k yearly est. 1d ago
  • Cyber Security Analyst

    Robert Half 4.5company rating

    Security engineer job in Bethlehem, PA

    We are looking for a skilled Cyber Security Analyst to join our team in Bethlehem, Pennsylvania. In this long-term contract role, you will be responsible for managing and maintaining cybersecurity tools and systems to protect sensitive data and ensure system integrity. Collaborating closely with IT teams and external vendors, you will play a vital role in safeguarding information systems and supporting business operations. Responsibilities: Oversee the daily operations and management of cybersecurity tools, including log management systems, endpoint detection and response agents, firewalls, vulnerability management systems, zero trust solutions, and remote access systems. Monitor and maintain the performance, reliability, and security of cybersecurity infrastructure to support business needs. Collaborate with the Infrastructure team to identify, address, and resolve cybersecurity issues or incidents impacting systems. Develop, implement, and maintain cybersecurity policies, standards, and procedures in alignment with governance frameworks and best practices. Provide technical guidance and support to IT and OT teams regarding cybersecurity technologies and solutions. Conduct regular assessments of cybersecurity tools and systems to ensure optimal functionality and compliance. Stay updated on emerging cybersecurity trends and recommend enhancements to the existing infrastructure. Coordinate with vendors and third-party providers to ensure effective implementation and operation of cybersecurity solutions. Perform vulnerability assessments and work to mitigate risks within the organization's network and systems Requirements Possess relevant cybersecurity certifications such as CISSP, Security+, or equivalent. Have at least 2 years of experience in cybersecurity, with prior experience in incident response roles being highly desirable. Demonstrate expertise in public cloud platforms and associated cybersecurity best practices. Show proficiency in managing cybersecurity tools, including firewalls, vulnerability management systems, and zero trust architecture. Exhibit knowledge of IT infrastructure technologies such as Active Directory, TCP/IP, and DNS. Possess strong analytical and problem-solving skills to address complex security challenges. Display excellent communication and collaboration skills to work effectively with cross-functional teams. Have hands-on experience with tools like CrowdStrike, Netskope, and other security platforms. Technology Doesn't Change the World, People Do. Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles. Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information. © 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) and Privacy Notice (https://www.roberthalf.com/us/en/privacy) .
    $77k-111k yearly est. 3d ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Security engineer job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • DO NOT USE - HackerRank Scorecard Testing

    JPMC

    Security engineer job in Jersey City, NJ

    Push the limits of what's possible with us as an experienced member of our Software Engineering team. As an Experienced Software Engineer at JPMorganChase within the Global Technology team, you serve as member of an agile team to design and deliver trusted market-leading technology products in a secure, stable, and scalable way. Depending on the team that you join, you could be developing mobile features that give our customers and clients more control over how they bank with us, strategizing on how big data can make our trading systems quicker, creating the next innovation in payments for merchants, or supporting the integration of our private and public cloud platforms. Job Responsibilities Participates in, design and develop scalable and resilient systems using Java or Python to contribute to continual, iterative improvements for product teams Executes software solutions, design, development, and technical troubleshooting Creates secure and high-quality production code and maintains algorithms that run synchronously with appropriate systems Produces or contributes to architecture and design artifacts for applications while ensuring design constraints are met by software code development Gathers, analyzes, synthesizes, and develops visualizations and reporting from large, diverse data sets in service of continuous improvement of software applications and systems Identifies hidden problems and patterns in data and uses these insights to drive improvements to coding hygiene and system architecture Contributes to software engineering communities of practice and events that explore new and emerging technologies Adds to team culture of diversity, opportunity, inclusion, and respect Required qualifications, capabilities, and skills Hands-on practical experience in system design, application development, testing and operational stability Proficient in coding in Java or Python languages Experience in developing, debugging, and maintaining code in a large corporate environment with one or more modern programming languages and database querying languages Overall knowledge of the Software Development Life Cycle Understanding of agile methodologies such as CI/CD, Application Resiliency, and Security Knowledge of software applications and technical processes within a technical discipline (e.g., cloud, artificial intelligence, machine learning, mobile, etc.) Preferred qualifications, capabilities, and skills Familiarity with modern front-end technologies Exposure to cloud technologies To be eligible for this opportunity, you must be authorized to work in the United States. We do not offer any type of employment-based immigration sponsorship for this position. Likewise, JPMorgan Chase & Co., will not provide any assistance or sign any documentation in support of any other form of immigration sponsorship or benefit including optional practical training (OPT) or curricular practical training (CPT). Your Role Level JPMorganChase is looking to hire Software Engineers at Software Engineer II and Software Engineer III levels. A determination will be made on placement for successful candidates based on the results of a skills-based assessment which applicants will be asked to complete during the hiring process, as well as, the candidate interview. The assessment will evaluate ability to perform basic coding and systems design responsibilities. For the Software Engineer II level, the role requires the ability to understand advance features of a coding language, design a viable system, and solve functional problems through basic language applications. For the Software Engineer III level, the role requires a higher level of proficiency and the ability to function independently, including the ability to use and explain advance features of a coding language, design systems across technologies and platforms, solve functional and non-functional problems through an application of language best practices, as well as, the ability to assess issues broadly, identify alternative or innovative solutions, collaborate effectively, and provide guidance to others.
    $78k-122k yearly est. Auto-Apply 47d ago
  • Manual Ethical Hacker

    Bank of America Corporation 4.7company rating

    Security engineer job in Jersey City, NJ

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Job Description: Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. Key Responsibilities in order of importance: * Perform assigned analysis of internal and external threats on information systems and predict future threat behavior * Incorporate threat actors' tactics, techniques, and procedures into offensive security testing * Perform assessments of the security, effectiveness, and practicality of multiple technology systems * Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. * Prepare and present detailed technical information for various media including documents, reports, and notifications * Provide clear and practical advice regarding managed risks * Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills Required Skills: * Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment * Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services * SQL injection/XSS attack without the use of tools * Experience performing manual code reviews for security relevant issues * Experience working with SAST tools to identify vulnerabilities * Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings * Experience performing manual web application assessments i.e., must be able to simulate a * Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) * Experience with vulnerability assessment tools and penetration testing techniques * Solid programming/debugging skills * Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map * Threat Analysis * Innovative Thinking * Technology Systems Assessment * Technical Documentation * Advisory Desired: * CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar * Strong programming/scripting skills * Mobile application analysis * Frida * Binary analysis (disassembly skills) Skills: * Advisory * Innovative Thinking * Technical Documentation * Technology System Assessment * Threat Analysis * Adaptability * Collaboration * Executive Presence * Scenario Planning and Analysis * Test Engineering * Controls Management * Information Systems Management * Issue Management * Mentoring * Presentation Skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift: 1st shift (United States of America) Hours Per Week: 40
    $94k-135k yearly est. 5d ago
  • AI Security Analyst

    PPL Corporation 4.8company rating

    Security engineer job in Allentown, PA

    Company Summary Statement As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities - PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy - provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL's companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today. Overview NOTE: This is a hybrid position requiring on-site presence three days per week at one of our local offices in: Allentown, PA (Lehigh Valley); Louisville, KY or Providence, RI. LI-Hy #INDPPL PPL is seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors' controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals. Responsibilities * Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC. * Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines. * Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations. * Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability. * Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations. * Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection. * Help build awareness and training materials for secure AI development practices across agile teams. * All other duties and projects as assigned. Qualifications Required Experience: * Bachelor's degree in Computer Science, Information Security, or a related field. * 2+ years of experience in cybersecurity, with exposure to AI/ML technologies. * Familiarity with secure coding practices, threat modeling, and cloud-native environments. * Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks. * Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required. * Strong communication and collaboration skills in agile environments (SAFe experience a plus). * Strong analytical skills to assess risks and vulnerabilities in complex systems. Preferred Qualifications: * Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable. * Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview). * Experience with AI security tools (e.g., Zenity, HiddenLayer). * Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus. * Experience specifically in AI security or ML model governance is a strong plus. * Proficiency in scripting and automation for security testing is a plus.
    $71k-85k yearly est. Auto-Apply 26d ago
  • Cyber Security Systems Engineer

    Penn State University

    Security engineer job in Parkesburg, PA

    APPLICATION INSTRUCTIONS: * CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process. Please do not apply here, apply internally through Workday. * CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. Please do not apply here, apply internally through Workday. * If you are NOT a current employee or student, please click "Apply" and complete the application process for external applicants. Approval of remote and hybrid work is not guaranteed regardless of work location. For additional information on remote work at Penn State, see Notice to Out of State Applicants. POSITION SPECIFICS We are searching for a self-motivated Cyber Security Systems Engineer to join our Research Office Information Technology Division at the Applied Research Laboratory (ARL) at Penn State University. The Research Office Information Technology Division provides systems design, administration, and support services for the enablement of key research functions. This is a research support position where building sustained awareness of research activities, documenting emerging needs, and advocating effectively to ensure that critical dependencies are resourced and addressed is paramount. Ideal candidates will possess a broad scope of information technology (IT) skills, the ability to establish and grow partnerships, and adapt quickly to emerging and complex needs. ARL is an authorized DoD SkillBridge partner and welcomes all transitioning military members to apply. You will: * Lead ITS's engagement with the Research Office to: * Bridge communication between researchers and ITS; translating complex research requirements into actionable, prioritized IT strategies * Surface IT needs proactively and co-create solutions * Develop a robust understanding of sponsor and research objectives to anticipate IT dependencies and construct/align technical solutions with sponsor goals * Demonstrate understanding of research needs and priorities by acting as a partner in problem solving to identify solutions * Develop and maintain documentation of current and emerging IT needs and priorities * Advocate for research needs within ITS while providing information to support prioritization at the Lab leadership level * Provide a broad scope of technical support for research related operations * Ensure IT hardware and software follow proper system design, operations, configurations, and maintenance * Generate and maintain system and process documentation * Provide general consultative services to researchers on a broad scope of technology * Provide field testing support at off-site locations Required skills/experience areas include: * Advanced Linux administration and support * Broad scope of IT hardware (server, workstation, networking, peripherals, etc.) * General scripting languages (Bash, PowerShell, Python, etc.) * Containerization technologies (Docker, Podman, Kubernetes, Rancher, etc.) * Ability to communicate clearly with technical and non-technical audiences in written and verbal form * Exceptional ability to translate complex research objectives and technical requirements to both technical and non-technical audiences * Exceptional problem-solving skills and the ability to leverage them to resolve technical and procedural issues * Networking concepts and technologies * Demonstrated ability to problem solve collaboratively, build relationships, and foster cohesion * Current eligibility for access to classified information at the TS/SCI level or higher and may be subject to a government background investigation to upgrade clearance eligibility, if required Preferred skills/experience areas include: * Familiarity with DCSA, DoD, and/or IC Authorization to operate processes, procedures and framework * Support of CI/CD pipelines (Bamboo, Jenkins, GitLab, etc.) * Automation and management of Linux and Windows system configurations with scripting, policy, and management tools (shell scripting, Satellite, Puppet, Ansible, MCM, system and group policy, etc.) * Vulnerability and security scanning tools (ACAS, Nessus, SCC, Trivy, Grype, SCAP, OpenSCAP, Evaluate STIG, etc.) * Commercial, government, and DoD cloud computing environments * Support of research computing environments and projects Your working location can be hybrid on-site/work from home located in State College, PA. This position may require periodic travel to remote locations in support of testing. Questions related to flexible work should be directed to the hiring manager during the interview process. MINIMUM EDUCATION, WORK EXPERIENCE & REQUIRED CERTIFICATIONS If filled as Cyber Security Systems Engineer - Principal Professional, this position requires: Master's Degree 8+ years of relevant experience; or an equivalent combination of education and experience accepted Required Certifications: None If filled as Cyber Security Systems Engineer - Senior Professional, this position requires: Bachelor's Degree 6+ years of relevant experience; or an equivalent combination of education and experience accepted Required Certifications: None ARL's purpose is to research and develop innovative solutions to challenging scientific, engineering, and technology problems in support of the Navy, the Department of Defense (DoD), and the Intel Community (IC). FOR FURTHER INFORMATION on ARL, visit our web site at **************** BACKGROUND CHECKS/CLEARANCES Employment with the University will require successful completion of background check(s) in accordance with University policies. All positions at ARL require candidates to possess the ability to obtain a government security clearance; you will be notified during the interview process if this position is subject to a government background investigation. You must be a U.S. citizen to apply. Employment with the ARL will require successful completion of a pre-employment drug screen. SALARY & BENEFITS The salary range for this position, including all possible grades, is $86,300.00 - $164,000.00.THE PROPOSED SALARY RANGE MAY BE IMPACTED BY GEOGRAPHIC DIFFERENTIAL Salary Structure - Information on Penn State's salary structure Penn State provides a competitive benefits package for full-time employees designed to support both personal and professional well-being. In addition to comprehensive medical, dental, and vision coverage, employees enjoy robust retirement plans and substantial paid time off which includes holidays, vacation and sick time. One of the standout benefits is the generous 75% tuition discount, available to employees as well as eligible spouses and children. For more detailed information, please visit our Benefits Page. CAMPUS SECURITY CRIME STATISTICS Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here. EEO IS THE LAW Penn State is an equal opportunity employer and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact ************. Federal Contractors Labor Law Poster PA State Labor Law Poster Penn State Policies Copyright Information Hotlines
    $86.3k-164k yearly Auto-Apply 13d ago
  • Systems Engineer - Cyber Security

    Penske 4.2company rating

    Security engineer job in Reading, PA

    **Summary Statement:** You will be working with a team of experts to resolve issues and create new security infrastructure based on current market trends. **What you will be doing:** As a Penske Systems Engineer - Cyber Security you will maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities. You will provide security reviews and define security models for new systems based on current trends and developments. You will also collaborate with different teams within the IT department to discuss, analyze or resolve usability issues and work on projects to update or create new security infrastructures. **Major Responsibilities:** - Ensure associates follow security standards through oversight of the set-up of a user's security access, administer network security access and monitor the associate's use of data systems to safeguard company information - Provide security reviews and define security models for new systems - Analyze and recommend security products based on their performance - Audit access to mission critical applications and to maintain compliance documentation for SOX and PCI - Analyze and review annual SOX and other compliance reports - Collaborate with different teams within the IT department to discuss, analyze, or resolve usability issues - Work on 1-3 mid to large-scale projects concurrently, assigned from department and group senior leadership - Mentor Security Administrators and Offshore Contractors - Define, implement, communicate and update security architecture for multiple computing platforms, operating systems, data networks, applications, and client software - Develop, implement, communicate, and update security policies and procedures for hardware, software, and network infrastructure - Develop, implement, and maintain tools for effective security administration and monitoring compliance IT security policies and procedures as well as detection of attempted security breaches and intrusion - Develop, test, and update disaster recovery plans to ensure that plans achieve desired results in protecting company assets and plans meet corporate risk and business resumption goals - Develop training material to be used to develop awareness within corporation of security policies, procedures, best practices and other issues as needed - Detailed understanding of Cloud Security fundamentals, including cryptography and the shared responsibility model - Other projects as assigned **Qualifications:** - Bachelor's degree or equivalent experience required, advanced degrees or certifications preferred - Minimum of 3+ years' experience - A background in auditing is also desirable - Knowledge of current state of the art security products is required - Firewall software/hardware - Proxy Filtering - Centralized Log configuration and analysis - IDS/IPS configuration and analysis. - SSO Infrastructure - Network Vulnerability Scanning - Advanced User Authentication Structures - OS Hardening and Security - Application vulnerability scanning - Networking TCP/IP and packet capture applications - Endpoint Protection solutions - Encryption Technology - Good documentation and presentation skills are also necessary for this position - Familiarity with disaster recovery planning and test execution - Regular, predictable, full attendance is an essential function of the job - Willingness to travel as necessary, work the required schedule, work at the specific location required, complete Penske employment application, submit to a background investigation (to include past employment, education, and criminal history) and drug screening are required **Physical Requirements:** -The physical and mental demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. -The associate will be required to read; communicate verbally and/or in written form; remember and analyze certain information; and remember and understand certain instructions or guidelines. -While performing the duties of this job, the associate may be required to stand, walk, and sit. The associate is frequently required to use hands to touch, handle, and feel, and to reach with hands and arms. The associate must be able to occasionally lift and/or move up to 25lbs/12kg. -Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus. Penske is an Equal Opportunity Employer **About Penske Truck Leasing/Transportation Solutions** Penske Truck Leasing/Transportation Solutions is a premier global transportation provider that delivers essential and innovative transportation, logistics and technology services to help companies and people move forward. With headquarters in Reading, PA, Penske and its associates are driven by a dedication to excellence and a commitment to customer success. Visit Go Penske to learn more. Job Category: Information Technology Job Function: Software Engineering Job Family: Information Technology Address: 100 Gundy Drive Primary Location: US-PA-Reading Employer: Penske Truck Leasing Co., L.P. Req ID: 2510735
    $88k-124k yearly est. 60d+ ago
  • Security Systems Engineer

    Dagostino Electronic Services 4.1company rating

    Security engineer job in Pittsburgh, PA

    The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required. Requirements Essential functions and responsibilities: Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems. Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment. Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer. Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions. Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project. Direct the work responsibilities of union labor personnel based on specific project needs. Design and oversee training programs for new and existing customers; Determine which customers receive training. Collaborate with Customer Relationship Managers on demonstrations for new and potential clients. Perform installation, configuration, programming, and final commissioning of customer systems. Work collaboratively with installation, project management and engineering teams. Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required. Perform system wiring and terminations services, as required. Deliver on-going remote and on-site technical support for existing customers and systems. Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting. Organizes and manage parts stock and tools. Perform other duties as needed. Success factors/job competencies: Effectively communicate both in writing and verbally Work independently and prioritize multiple tasks and adapt to needed change Analysis Mechanical aptitude Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics Safety orientation Customer Focus Attention to Detail Teamwork/Collaboration Stay abreast of changes in security technology Physical demands and work environment: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Individual will be required to travel to customer sites as needed. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts. The employee is occasionally exposed to outside weather conditions and risk of electrical shock. Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds. Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed. Incumbent must be able to read, see, hear, and speak. Workdays and Shifts: Position works Monday-Friday, daylight hours, and additional time as needed to complete work. Education/Certification(s)/License(s) required: Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience. May be required to participate in safety trainings and/or certifications provided by the Company or customers. Valid driver's license, as employee will be required to travel to local and overnight client sites as needed. Manufacturer specific certifications, as required. Responsible to maintain active certifications and obtain new and updated certifications as required by the Company. Experience/Other required: Position requires two (2) to three (3) years of relevant experience in the electronic services. Strong knowledge of Microsoft Office. Strong computer skills with advanced software aptitude. Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP. Applicants must be currently authorized to work in the United States on a full-time basis. Visa sponsorship is not available for this position. This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
    $90k-127k yearly est. 60d+ ago
  • Security System Engineer

    Network Mountain

    Security engineer job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 22d ago
  • Information Security Specialist (US) - Data Analytics & Reporting

    TD Bank 4.5company rating

    Security engineer job in Mount Laurel, NJ

    Hours: 40 Pay Details: $98,160 - $159,270 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area. Depth & Scope: * Participates on complex, comprehensive or large projects and initiatives * Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors * Has advanced knowledge of organization, technology controls / security/ risk issues Education & Experience: * Bachelor's degree preferred * Information security certification / accreditation an asset * 7+ years of relevant experience * Expert knowledge of IT security and risk disciplines and practices Preferred Qualifications: * Ability to support risk management by analyzing findings rigorously, enabling data-driven decisions to improve compliance and remediation sustainability * Strong skills in data strategy, advanced analytics design, mentoring, and predictive modeling for risk forecasting and severity scoring * Experience developing AI and machine learning models, creating dashboards, and collaborating with governance teams to meet regulatory standards * Advanced skills in Python, R, SQL, data visualization tools, and familiarity with cloud platforms and GRC systems * Skills applying AI/ML techniques, and developing Confluence web applications to enhance data management and insights delivery * Certifications such as CRISC, CISA, or CISSP * Experience in information security, technology risk, Big Four firms, and AI/ML tools is advantageous * Ability to ensure all analytics and reporting adhere to regulatory expectations, NIST/ISO frameworks, and risk governance standards. * Knowledge of audit methodologies, regulatory frameworks (e.g., OCC, Fed, Basel, SOX, NIST, ISO 27001), and issue management practices Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% * Domestic Travel - Occasional * International Travel - Never * Performing sedentary work - Continuous * Performing multiple tasks - Continuous * Operating standard office equipment - Continuous * Responding quickly to sounds - Occasional * Sitting - Continuous * Standing - Occasional * Walking - Occasional * Moving safely in confined spaces - Occasional * Lifting/Carrying (under 25 lbs.) - Occasional * Lifting/Carrying (over 25 lbs.) - Never * Squatting - Occasional * Bending - Occasional * Kneeling - Never * Crawling - Never * Climbing - Never * Reaching overhead - Never * Reaching forward - Occasional * Pushing - Never * Pulling - Never * Twisting - Never * Concentrating for long periods of time - Continuous * Applying common sense to deal with problems involving standardized situations - Continuous * Reading, writing and comprehending instructions - Continuous * Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $98.2k-159.3k yearly Auto-Apply 3d ago
  • Security Analyst - Systems Operations

    Adpcareers

    Security engineer job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 1d ago
  • Security Analyst - Systems Operations

    Blueprint30 LLC

    Security engineer job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 1d ago
  • Network Security Engineer

    Customers Bank 4.7company rating

    Security engineer job in West Reading, PA

    At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives. This role is IN OFFICE in Malvern, PA Monday through Thursday with Friday remote. Must be eligible to work in the U.S without requiring sponsorship now or in the future. Who is Customers Bank? Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with. We get you further, faster. Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow. On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead. Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust. What you'll do: We are seeking a motivated and detail-oriented Network Security Engineer to secure, monitor, and enhance our enterprise network environment. This role focuses heavily on firewall administration, network segmentation, and security hardening. You will support the design and enforcement of security policies, maintain next‑generation firewalls, and collaborate with Security and Infrastructure teams to ensure a resilient and compliant network. * Configure, maintain, and troubleshoot next‑generation firewalls (especially Palo Alto Networks) including security policies, NAT, threat profiles, URL filtering, and VPN configurations. * Lead efforts in network segmentation, micro‑segmentation, and Zero Trust architecture adoption. * Implement and maintain network security controls across wired, wireless, and cloud environments. * Monitor security logs, analyze firewall events, and respond to network security incidents. * Manage VPN technologies including remote access and site‑to‑site tunnels. * Support network architecture reviews and security assessments. * Ensure adherence to regulatory and security frameworks (SOX, FFIEC, PCI, HIPAA, etc.). * Maintain detailed documentation of firewall rulesets, segmentation maps, topology changes, and security configurations. * Work cross‑functionally with Information Security, Cloud, and Infrastructure teams. * Participate in IT change management processes and follow ITIL best practices. What do you need? * 3-5 years of experience in network security, network engineering, or related IT roles. * Strong understanding of network security concepts: segmentation, ACLs, IPS/IDS, threat prevention, SSL decryption, Zero Trust principles. * Hands‑on experience with Palo Alto firewalls and Panorama; experience with Cisco firewalls is a plus. * Experience designing and implementing network segmentation (VLANs, VRFs, micro‑segmentation). * Experience with VPN technologies and troubleshooting secure remote access solutions. * Experience with wireless security protocols and enterprise authentication (WPA2‑E, 802.1X). * Experience with Cloud security concepts. * Solid knowledge of TCP/IP, DNS, DHCP, NAT, VPN, VLANs, OSPF, BGP. * Familiarity with network monitoring/logging tools (e.g., Splunk, Syslog). * Strong communication and documentation skills. Technology Skills: * Relevant certifications are preferred such as Palo Alto PCCSA/PCNSA/PCNSE, Cisco CCNA Security, CompTIA Security+ or Network+. * Experience with Palo Alto firewalls, Panorama, and threat prevention tools. * Experience with Cisco networking including Cisco Identity Services Engine (ISE). * Exposure to cloud security/networking (Azure) is a plus. * Working knowledge of ITIL frameworks. Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also provide "reasonable accommodations", upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws. Diversity Statement: At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
    $65k-77k yearly est. Auto-Apply 28d ago
  • Specialist, Information System Security III (SISS3)

    Armada Ltd. 3.9company rating

    Security engineer job in Philadelphia, PA

    Job Description Type: Full Time Overtime Exempt: Exempt Reports To: ARMADA HQ Travel Required: Yes Security Clearance Required: Active Secret Security Clearance ************CONTINGENT UPON AWARD*************** Duties & Responsibilities: Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review. Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities. Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system. Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS). Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command. Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities. Perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution. Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner. Perform risk management and security engineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance. Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS. Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM). Manage, attend, and support configuration control board practices. Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results. Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including configuration management, milestone, issue tracking, web site content management and RMF documentation. Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel). Other duties as assigned. Knowledge, Skills, and Abilities (KSAs): Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum). Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance. Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision. Possess excellent oral and written communication skills. Required Certifications: Minimum of one (1) IAT Level II listed certificate required: CompTIA Security+ (CE) CompTIA CySA+ GIAC Security Essentials (GSEC) ISC² SSCP (Systems Security Certified Practitioner) Minimum/General Experience: Five (5) years of experience in the following: Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field. Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS). Command line interface, PowerShell, and performing automated tasking through use of code. Minimum Education: College degree in any technical discipline from an accredited college or university. Disclaimer: The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ****************** Special Notes: Relocation is not available for these jobs ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
    $84k-127k yearly est. 30d ago

Learn more about security engineer jobs

How much does a security engineer earn in North Whitehall, PA?

The average security engineer in North Whitehall, PA earns between $69,000 and $128,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in North Whitehall, PA

$94,000
Job type you want
Full Time
Part Time
Internship
Temporary