Post job

Security engineer jobs in Roselle Park, NJ - 702 jobs

All
Security Engineer
Hacker
Information Security Analyst
Security System Engineer
Security Architect
Network Security Analyst
Defense Analyst
  • Cyber Security Architect

    Wakefern Food Corp 4.5company rating

    Security engineer job in Edison, NJ

    The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.). Essential Functions Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments. Design security solutions that align with business objectives while mitigating risk. Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise. Architect cloud security strategies, leveraging best practices for Azure and GCP. Lead security investigations, conduct root cause analysis, and document incident response actions. Provide threat intelligence and recommend proactive security measures to mitigate risk. Implement and maintain cloud security controls in Azure and GCP. Optimize cloud security solutions for web and network protection. Ensure Active Directory (AD) and IAM policies align with best practices. Support identity governance, access reviews, and privileged access management (PAM). Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls. Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS). Recommend, evaluate, and implement new security technologies based on business needs and threat landscape. • Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles. Additional Functions Threat Modeling & Risk Management: Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks. Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations. Develop and maintain security policies, standards, and playbooks for security operations. Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2). Identity & Access Management (IAM) & Authentication: Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC). Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD. Define identity threat detection and response (ITDR) strategies. Security Governance & Compliance: Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK). Assist with audit, regulatory compliance, and security assessments. Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs. Provide security guidance for third-party risk management and vendor security evaluations. Leadership & Collaboration: Act as a subject matter expert (SME) in cybersecurity architecture and best practices. Provide mentorship and training to security engineers and analysts. Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals. Develop security roadmaps and strategic initiatives for continuous security improvement. Maintain and fine-tune security configurations across various security platforms. Identify security gaps and recommend security enhancements and process improvements. Develop playbooks and automation scripts to enhance security operations efficiency. Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications. Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements. Investigate security breaches and other security incidents to determine the root cause and implement corrective actions. Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures. Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure. Participate in security audits and assessments to identify and address security gaps. Develop and maintain incident response plans and procedures. Evaluate and recommend security technologies and solutions to improve the organization's security posture. Qualifications 7-10 years of experience in cybersecurity architecture, security operations, or cloud security. Deep understanding of: Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices Email secure gateway (Proofpoint, Mimecast) Firewalls (Palo Alto, Cisco) and network security principles Cloud security (Azure, GCP) and security automation IAM, MFA, AD, Okta, Microsoft Authenticator Endpoint security, EDR, ITDR, and threat intelligence Data classification, DLP, and information protection Experience designing secure architectures for large-scale enterprises and cloud environments. Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform). Excellent communication and leadership skills, capable of influencing security strategies across the organization. CISSP Certifications (Required): CISM and CCSP is plus A bachelor's degree in computer science, information systems, or a related experience. 7-10 years of experience in cybersecurity, security operations, or network security. Hands-on expertise with: Zscaler, CrowdStrike, Microsoft Defender, Sophos Proofpoint (Email Security Gateway) EDR & ITDR solutions Palo Alto & Cisco Firewalls Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM Cloud Security (Azure and GCP) Data classification and protection strategies Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response. Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks. Strong analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams. Working Conditions & Physical Demands This position requires in person office presence at least 4x a week.
    $123k-162k yearly est. 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Network Security Analyst

    Integrated Resources 4.5company rating

    Security engineer job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Experienced Analyst - Strategic, Defense, and Shareholder Advisory

    Evercore Inc. 4.9company rating

    Security engineer job in New York, NY

    Primary Responsibilities: The Analyst will provide value add analysis and research as part of the Strategic, Defense, and Shareholder Advisory team within the Advisory business. In this role, the Analyst will create client presentations regarding hostile activity, proxy fights, shareholder activism, and corporate governance. The Analyst will work on live activism and raid defense situations, as well as create materials for use in client presentations, internal meetings, and marketing initiatives. The Analyst will work in a team environment within Evercore's Strategic, Defense, and Shareholder Advisory practice. Responsibilities include, but are not limited to the following: * Create materials related to shareholder activism, hostile activity, shareholder engagement and corporate governance for use in client presentations, internal meetings and marketing initiatives * Support live engagements, including proxy fights and raid defense situations, contested M&A and special committee assignments * Perform research and analysis to identify company's potential vulnerabilities to activist shareholders or potential acquirors * Monitor relevant trends and regulatory developments * Collaborate closely with senior bankers and other internal teams on strategic mandates Specific Qualifications: * Graduate of Class of 2024 through Class of 2025 * Relentless work ethic and high energy level * An excellent, team-based atttiude * Excellent communication skills (written and verbal) * Proficient in Microsoft Office, specifically Excel * Exceptional attention to detail * Calm under pressure with a demonstrated track record of successfully managing multiple projects simultaneously * Intellectual curiosity and an interest in finance Expected Base Salary Range: $120,000-$140,000. In addition to a competitive base salary, employees may be eligible to receive a discretionary bonus delivered in the form of cash and/or deferred equity. Evercore also offers a variety of benefits and programs, subject to eligibility. These include, but are not limited to: * Medical, prescription, dental, and vision insurance, including healthcare savings and reimbursements accounts * 401(k) Retirement Plan * Life and disability insurance, including additional voluntary financial protection insurance * Well-being resources and programs, including mental health and mindfulness programs, digital wellness platforms, well-being events, and targeted on-site health services * Family-building and family-support benefits * Paid parental, caregiver, marriage and bereavement leave * Commuter benefits, health club membership discounts, and other corporate discounts * Paid holidays, vacation days, personal days, sick days, and volunteer opportunities About Evercore: Evercore (NYSE: EVR) is a premier global independent investment banking advisory firm. We are dedicated to helping our clients achieve superior results through trusted independent and innovative advice on matters of strategic significance to boards of directors, management teams, and shareholders - including mergers and acquisitions, shareholder advisory, restructurings, and capital structure. Evercore also assists clients in raising public, private capital, delivers equity research, equity sales and agency trading execution, in addition to providing wealth and investment management services to high-net-worth individuals. Founded in 1995, the Firm is headquartered in New York and maintains offices and affiliate offices in major financial centers in North America, Europe, the Middle East, and Asia. For more information, please visit ***************** Inclusion and Equal Opportunity Employment: Evercore is an equal employment opportunity employer and does not discriminate against individuals because of actual or perceived race, color, creed, religion, sex, pregnancy, national origin or ancestry, mental or physical disability, age, veteran status, military status, citizenship status, sexual orientation, gender identity or expression, genetic information, or immigration or citizenship status, or any other characteristic protected by applicable law (referred to as "protected status"), in accordance with applicable federal, state and local laws.
    $120k-140k yearly 1d ago
  • Ethical Hacker Needed at Web Agency. Work Remotely (USA only)

    Treasurefy

    Security engineer job in New York, NY

    We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States. Job Description We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department. We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks. At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security. You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us. Along with your application, please answer the following questions: How long have you been a hacker? Do you have an Ethical Hacker Certification? When did you receive it? What was the most complicated penetration test you have ever performed, and why? What are the most common security threats that you deal with? How long does it typically take you to clean common Viagra malware on websites? Have you managed other hackers? Qualifications One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization. Additional Information We are growing fast and need motivated and hard-working people to grow with us.
    $78k-123k yearly est. 22h ago
  • HackerX D&I Virtual Event

    2U Events 4.2company rating

    Security engineer job in New York, NY

    Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability. At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same. Benefits & Culture Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms. 2U offers a comprehensive benefits package: Medical, dental, and vision coverage Life insurance, disability and 401(k) Unlimited snacks and drinks Tuition reimbursement program Generous paid leave policies including unlimited PTO Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years! To learn more, visit 2U.com. #NoBackRow
    $83k-115k yearly est. Auto-Apply 60d+ ago
  • Social Media Growth Hacker

    Truff

    Security engineer job in New York, NY

    Job Description Job Title: Social Media Growth Hacker Salary: $85,000-$95,000 with 10% Annual Bonus TRUFF is a premium truffle-infused condiments brand - born at the intersection of heat and flavor. In 2015, TRUFF co-founders built the popular food and lifestyle Instagram ******************** 2 years later, in 2017, TRUFF co-founders launched TRUFF Original Hot Sauce, which catapulted into internet virality and beyond. Earning countless awards and accolades, including Oprah's Favorite Things (6x) Adweek's Best Brand Born Out of Social Media, and TheKitchn Essential's Mayo, TRUFF has become one of the fastest growing brands in condiments. TRUFF has partnered with the likes of Hidden Valley Ranch, Star Wars, Taco Bell, Popeyes, Travis Scott and Starbucks, and over the years has expanded into complimentary condiment categories - pasta sauce, mayo, oil, and seasonings. TRUFF's uniquely premium taste and aroma amplify the flavor experience of everyday dishes to make every day a culinary moment. Job Summary We're looking for a Social Media Growth Hacker. A creative, data-driven, internet-native operator obsessed with building cultural moments and engineering virality. This role blends content creation, distribution strategy, and cultural pattern recognition to fuel TRUFF's next wave of organic growth. You'll work closely with our founders and marketing leadership to turn ideas into scroll-stopping moments across TikTok, Instagram, YouTube Shorts, and emerging platforms. You'll understand how to produce, how to clip, remix, seed, and distribute content for maximum reach. You'll live in the comment sections, spot trends before they break, and know how to turn a viral moment into a business outcome. This isn't a “post and pray” social role, it's a creative growth lab for someone who thrives on experimentation, velocity, and storytelling through culture. Key Responsibilities Engineer virality: Identify, create, and capitalize on trends, moments, and sounds across TikTok, Instagram, and YouTube. Build the content engine: Develop daily/weekly content calendars, leveraging UGC, internal/external shoots, and short-form clip strategies that scale across multiple TRUFF and partner accounts. Clip farming & content distribution: Source, cut, and seed hundreds of short clips across pages to test hooks, angles, and communities for maximum reach and engagement. Operate like an internet newsroom: Monitor culture, competitors, and community signals in real-time to inform TRUFF's next moves. Collaborate with founders & SVP Marketing: Concept, shoot, and publish brand-led or personality-driven moments that blur the line between brand and creator. Community + culture management: Live in the comments, stitch creators, respond with wit, and make TRUFF feel human. Influencer & creator sourcing: Partner with creators and meme pages for collabs, trend participation, and content amplification. Experiment & scale: Test new formats, AI tools, social distribution tactics, and “unscalable” experiments that move the algorithm. Analytics & learning loops: Use data and platform insights to refine creative direction, track virality patterns, and build a playbook of what works. Content production: Shoot, edit, and publish video/photo content natively optimized for each platform, fast, scrappy, and aesthetic. Requirements Deep understanding of internet culture, virality, and meme psychology. 3+ years managing or creating social media content for a consumer brand or creator-driven business. Proven track record of creating viral or high-engagement content. Strong experience with short-form editing and clipping tools (CapCut, Premiere, Descript, etc.) and multi-platform publishing. Understanding of content distribution systems - repost networks, collab strategies, paid boosts, and shadow channels. Excellent copywriting and visual storytelling skills. Comfortable being on camera and experimenting with creative formats. Data-driven mindset - able to analyze performance and pivot quickly. Proficient in Google Suite, Sprout Social, Meta Business Manager, and analytics dashboards. Bonus: Experience building pages or brands from scratch, creator economy fluency, or running niche meme / content accounts. You're Probably the Right Fit If You… Think in hooks, captions, and shareability. Wake up on TikTok, fall asleep on Reddit. Can take a raw clip and make it go viral. Get excited by chaos, creativity, and community. Love brands that blur lines between food, culture, and humor. Believe social media is more science than art - but still know how to make it look cool. Benefits Performance Bonus Comprehensive Health, Dental, Vision & Life Insurance 401(k) with 3% company match Generous PTO, Sick Time, Holidays & Parental Leave Wellness, Internet & Cell Phone Stipends Company-provided Laptop
    $85k-95k yearly 9d ago
  • Manual Ethical Hacker

    Bank of America Corporation 4.7company rating

    Security engineer job in Jersey City, NJ

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Job Description: Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. Key Responsibilities in order of importance: * Perform assigned analysis of internal and external threats on information systems and predict future threat behavior * Incorporate threat actors' tactics, techniques, and procedures into offensive security testing * Perform assessments of the security, effectiveness, and practicality of multiple technology systems * Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. * Prepare and present detailed technical information for various media including documents, reports, and notifications * Provide clear and practical advice regarding managed risks * Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills Required Skills: * Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment * Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services * SQL injection/XSS attack without the use of tools * Experience performing manual code reviews for security relevant issues * Experience working with SAST tools to identify vulnerabilities * Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings * Experience performing manual web application assessments i.e., must be able to simulate a * Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) * Experience with vulnerability assessment tools and penetration testing techniques * Solid programming/debugging skills * Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map * Threat Analysis * Innovative Thinking * Technology Systems Assessment * Technical Documentation * Advisory Desired: * CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar * Strong programming/scripting skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift: 1st shift (United States of America) Hours Per Week: 40
    $94k-135k yearly est. 17d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Security engineer job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $84k-119k yearly est. Auto-Apply 8d ago
  • Lead Information Security Analyst - Identity

    Adpcareers

    Security engineer job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 23h ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Security engineer job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 23h ago
  • Security System Engineer

    Network Mountain

    Security engineer job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 4d ago
  • Information Security Specialist

    Legora AB

    Security engineer job in New York, NY

    About Us Legora is on a mission: to redefine how legal work gets done. From the very start we have been very clear about the fact that we are not building a solution for lawyers, we are building it with them, because it is the only way to make sure it gets done the right way; working side-by-side every step of the way. Our AI-native workspace empowers legal professionals not just to work faster - but to ask better questions, unlock new insights. Every day, we push the boundaries of legal tech to make complex processes smarter, faster, and more human. From thousands of documents analysed in minutes to intelligent workflows designed in collaboration with leading practices, we're turning possibility into reality. Today we are trusted by global firms like Cleary Gottlieb, Goodwin, Bird & Bird and Linklaters in over 40 countries, but we have no plans on stopping here. We ship fast, we iterate effectively, and we scale rapidly - not by accident, but by design. When you join Legora, you become part of a team that believes "good enough" isn't good enough and that the way to win is together, by empowering lawyers to do their best work with technology that truly understands them. If you're excited by building from first principles, working with exceptional people, and accelerating change in a high-stakes, high-impact domain-then this is the moment and the place. We're not just shaping the future of legal tech - we're defining it. Ready to join us in building the intelligent future of law? The role At Legora, protecting our clients' highly sensitive legal data is fundamental to everything we do. We're building a security and compliance program designed for the AI era: Zero Trust architecture, rigorous governance, and continuous compliance as non-negotiables. We are expanding our security team to help shape, drive, and scale our governance, risk, and compliance programs. You will work at the intersection of policy, risk management, audit readiness, and cutting-edge technology to ensure we maintain ISO 27001, SOC 2 Type II, and ISO 42001 compliance while enabling the business to move fast. This is a hands-on, high-impact role where you'll manage our Information Security Management System (ISMS), conduct risk assessments, coordinate audits, and serve as a trusted advisor to both internal teams and external clients. Your strength will be your knowledge of the E2E processes of how our product is built. You will utilize this to treat security risks in a modern way that fits our modern tech stack. *This role can be either based in Stockholm, Sweden or NYC, US. For both locations, we have a 5-day in-office policy, we believe building together in person drives better outcomes. What you will be doing: Own and maintain the ISMS in accordance with ISO 27001 and ISO 42001, ensuring all policies, procedures, and controls are documented, implemented, and continuously improved. Lead the company's compliance efforts for SOC 2 Type II and support future SOX ITGC readiness, working closely with Finance and Engineering to map business processes and establish IT controls. Develop, implement, and maintain information security policies, standards, and procedures that are lightweight, actionable, and aligned with regulatory frameworks including GDPR, ISO 27001, SOC 2, and ISO 42001. Conduct regular risk assessments, threat modeling, and gap analyses to identify security risks and prioritize remediation efforts across the organization. Coordinate internal and external audits, penetration tests, and compliance assessments - ensuring continuous audit readiness and managing remediation plans. Manage vendor risk by conducting third-party security reviews, due diligence assessments, and ongoing vendor monitoring programs. Be a primary point of contact for client security questionnaires, due diligence requests, audit reports (SOC 2, ISO certificates), and contractual security commitments. Support secure AI governance by defining policies and controls that protect data in AI workflows, prevent adversarial use, and ensure responsible AI practices aligned with ISO 42001. Drive security awareness and training across the organization, including new joiners and regular security education sessions. Collaborate with Engineering teams on incident response planning, ensuring lessons learned are incorporated into policies and risk management processes. Track and report on security metrics, KPIs, and compliance status to leadership, providing actionable insights and recommendations. Who you are You have 3+ years of experience in GRC, information security, compliance, or audit roles, ideally in a high-growth technology or SaaS environment. Alternatively you are an experienced software engineer who is transitioning into Information Security. You have hands-on experience implementing and managing ISO 27001 and SOC 2 Type II, NIST 800-53 compliant compliance programs. You might have achieved desirable certifications such as CISSP, CISM, CISA, or ISO 27001 Lead Auditor. You have knowledge of governance frameworks, risk management methodologies, and data protection regulations (ERM, GDPR, CCPA, ISO 42001, SOX ITGC). You understand Zero Trust principles and OWASP top 10 risks and how to apply them across identity, devices, dev-ops processes and cloud services. You can confidently engage with technical teams on topics like cloud security (Azure), infrastructure-as-code, secure development practices, and AI system security. You have strong analytical and organizational skills, with the ability to remain focus amongst multiple audits, assessments, and compliance initiatives. You have excellent communication and stakeholder management skills, able to translate security & compliance requirements into clear, actionable guidance for technical and non-technical audiences. Experience with securing AI/ML workflows and building automation with GenAI tools (for example Zapier, n8n) is a big plus. Legora is an Equal Opportunity Employer At Legora, we believe great teams are built on diversity of thought and experience. We're proud to be an equal opportunity employer and committed to creating an inclusive, high-performance culture where everyone can do their best work. We welcome people of all backgrounds and don't discriminate based on race, color, religion, national origin, gender, gender identity or expression, sexual orientation, age, disability, veteran status, or any other characteristic protected by law.
    $83k-118k yearly est. Auto-Apply 12d ago
  • Information Security Analyst

    Healthsolutions

    Security engineer job in New York, NY

    Company
    $83k-118k yearly est. Auto-Apply 8d ago
  • Security Engineer, Operating Systems

    Anthropic

    Security engineer job in New York, NY

    Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Role We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training. This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale. What You'll Do: Design and implement hardened OS configurations for AI workloads across diverse hardware platforms Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms Implement and maintain full-disk encryption solutions for diverse storage systems Build security infrastructure for AI systems, research environments, and production services Create OS-level attestation and integrity monitoring systems Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations Design secure boot processes and trusted execution environments Work with container teams to ensure proper workload isolation at the kernel level Design privilege separation and mandatory access control policies Implement secure update mechanisms for OS components Build tooling for security configuration management and compliance verification Serve as a subject matter expert for OS security questions and designs Who You Are: 5+ years of experience in operating systems security or kernel development Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.) Experience with kernel hardening techniques and exploit mitigation Strong programming skills in C and systems programming languages Experience with eBPF for security monitoring and enforcement Understanding of virtualization and containerization security Track record of identifying and fixing OS-level security vulnerabilities Experience with security-focused Linux distributions Strong candidates may also have: Kernel development experience or contributions to Linux kernel Experience with real-time or embedded operating systems Knowledge of hardware security features and their OS integration Experience with secure boot technologies Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX) Background in vulnerability research, exploit development, or fuzzing Experience with formal methods for OS verification Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves) Deadline to apply: None. Applications will be reviewed on a rolling basis. The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation. Annual Salary:$300,000-$405,000 USDLogistics Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices. Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this. We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team. How we're different We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills. The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences. Come work with us! Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
    $73k-101k yearly est. Auto-Apply 26d ago
  • Health Hacker - New York

    Next Health 4.2company rating

    Security engineer job in New York, NY

    About UsAt Next Health, we are redefining health optimization by integrating cutting-edge medical innovation with preventative, data-driven wellness. Through our technology-forward platform and luxury clinical environments, we empower our members to take control of their well-being with personalized longevity solutions. We are rapidly expanding across the U.S., and we are seeking visionary leaders to help scale our digital infrastructure and member experience. Your ImpactAs the Front Desk Receptionist at Next Health, you will be the first point of contact for our patients, visitors, and vendors. You will play a critical role in creating a positive patient experience and ensuring that our operations run smoothly. Job DescriptionAs the Front Desk Receptionist, you will be responsible for: Greeting patients and visitors with a welcoming and professional demeanor Checking in patients and verifying their demographic and payment information Scheduling appointments and managing the clinic schedule Assisting patients with questions and concerns Maintaining patient records and updating them as needed.Coordinating with other departments and healthcare providers to ensure seamless patient care. What to Expect In this role, you can expect to: Interact with a diverse group of patients and visitors Manage multiple tasks and responsibilities simultaneously Use electronic medical records and scheduling software Work closely with other departments and healthcare providers Provide excellent customer service and patient care What You'll BringWe're looking for someone who has: 1+ years of experience in a medical office or healthcare setting Excellent communication and interpersonal skills Strong attention to detail and organizational skills Ability to manage multiple tasks and ************************************** Super AdminExperience with electronic medical records and scheduling software Knowledge of medical terminology and insurance billing practicesA passion for providing exceptional customer service and patient care Aptitude for sales Passion for and knowledge of health & wellness services.Exceptional at customer service.Display a genuine interest in helping other people.Excited to learn new things and be on the cutting edge of health & wellness. Our Culture & PerksWe're a patient-centered healthcare clinic with a culture that values empathy, respect, and teamwork. We offer: Competitive salary and benefits package Opportunities for professional growth and developmentA supportive and inclusive work environment Meaningful work that makes a difference in patient's lives Expected CompensationThe expected compensation for this position is $21 per hour, plus benefits. Pay offered may vary depending on multiple individualized factors, job-related knowledge, skills, and experience. The total compensation package for this position may also include other elements dependent on the position offered. Details of participation in these benefit plans will be provided if an employee receives an offer of employment. We are an Equal Opportunity / Affirmative Action employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws. Please note: We kindly request that applicants refrain from calling our office line regarding job inquiries. All application related questions should be directed to ********************. Thank you for your understanding.
    $21 hourly Auto-Apply 60d+ ago
  • Information Security Analyst

    Ra 3.1company rating

    Security engineer job in Jersey City, NJ

    Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you! They are an equal opportunity employer and value diversity at our company. Job Description Strong knowledge of Information Security concepts such as: •Encryption, Cloud and Mobile Device Security •Data Loss and Prevention tools and solutions •Risk-Threat Analysis and Vulnerability Assessments •Enterprise Security Monitoring, Role-Based Access Control (RBAC) •Identity and Access Management, Computer Forensic •IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.) •Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability. Sounds like you? then ping us with your most updated resume. We'd love to talk to you! We are excited about the companies growth and the role you will play with them. Qualifications Desired Skills & Experience: You hold a Bachelor's degree in any domain. You are certified in CISSP, or CISA, or CEH, required. You have more than 1 year experience working in the IT security function. You have good experience with Operating System, Database, Network and Application Security . Additional Information All your information will be kept confidential according to EEO guidelines. Ping me at **********************
    $91k-130k yearly est. Easy Apply 22h ago
  • Information Security Analyst

    Public Health Solutions 4.7company rating

    Security engineer job in New York, NY

    Company
    $68k-96k yearly est. Auto-Apply 8d ago
  • Ethical Hacker Needed at Web Agency. Work Remotely (USA only)

    Treasurefy

    Security engineer job in New York, NY

    We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States. Job Description We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department. We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks. At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security. You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us. Along with your application, please answer the following questions: How long have you been a hacker? Do you have an Ethical Hacker Certification? When did you receive it? What was the most complicated penetration test you have ever performed, and why? What are the most common security threats that you deal with? How long does it typically take you to clean common Viagra malware on websites? Have you managed other hackers? Qualifications One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization. Additional Information We are growing fast and need motivated and hard-working people to grow with us.
    $78k-123k yearly est. 60d+ ago
  • HackerX - New York City (Full-Stack) Event

    2U Events 4.2company rating

    Security engineer job in New York, NY

    Thank you for Networking at the HackerX Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability. At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same. Benefits & Culture Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms. 2U offers a comprehensive benefits package: Medical, dental, and vision coverage Life insurance, disability and 401(k) Unlimited snacks and drinks Tuition reimbursement program Generous paid leave policies including unlimited PTO Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years! To learn more, visit 2U.com. #NoBackRow
    $83k-115k yearly est. Auto-Apply 60d+ ago
  • Senior Manual Ethical Hacker

    Bank of America Corporation 4.7company rating

    Security engineer job in Jersey City, NJ

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Job Description: Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank's applications to malicious hacking activity. This senior technical role is responsible performing and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. These individuals are expected to perform application security-oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of importance: * Perform assigned analysis of internal and external threats on information systems and predict future threat behavior. * Incorporate threat actors' tactics, techniques, and procedures into offensive security testing to identify high-value vulnerabilities/chained attacks. * Developing Proof-of-concepts for exploitation. * Perform assessments of the security, effectiveness, and practicality of multiple technology systems. * Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. * Prepare and present detailed technical information for various media including documents, reports, and notifications. * Provide clear and practical advice regarding managing risks. * Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills. * Respond to security incidents and provide technical assistance to leadership across the Information Security organization. Required Skills: * Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment * Detailed technical knowledge in at least 5 of the following areas: * security engineering * application architecture * authentication and security protocols * application session management * applied cryptography * common communication protocols * mobile frameworks * single sign-on technologies * exploit automation platforms * Web APIs * Cloud environments * LLM security * Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings * Experience performing manual web application assessments i.e., must be able to simulate a OWASP Top 10 vulnerabilities without the use of tools * Experience performing manual code reviews for security relevant issues * Experience working with DAST and SAST tools to identify vulnerabilities * Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) * Experience with vulnerability assessment tools and penetration testing techniques. * Solid programming/debugging skills, development frameworks, CVE and CWE research/reproduction * Threat Analysis, threat modelling and SBOM analysis * Innovative thinking, threat actor simulation * Technology Systems Assessment * Technical Documentation * Advisory Desired: * CEH, OSCP/OSCE/OSWE/GXPN/GPEN/GWAPT/GMOB/All Practitioner Certs [Port Swigger BSP Academy]/Cloud Cert(s)/ eWPT; eWPTX; eMAPT [INE Pentester Academy] * Strong programming/scripting skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift: 1st shift (United States of America) Hours Per Week: 40
    $94k-135k yearly est. 17d ago

Learn more about security engineer jobs

How much does a security engineer earn in Roselle Park, NJ?

The average security engineer in Roselle Park, NJ earns between $72,000 and $133,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Roselle Park, NJ

$98,000

What are the biggest employers of Security Engineers in Roselle Park, NJ?

The biggest employers of Security Engineers in Roselle Park, NJ are:
  1. CoreWeave
  2. Broadridge
  3. Prudential Financial
  4. Hewlett Packard Enterprise
  5. Prudential Bank
Job type you want
Full Time
Part Time
Internship
Temporary