Post job

Security engineer jobs in Verona, NJ - 676 jobs

All
Security Engineer
Hacker
Information Security Analyst
Security System Engineer
Network Security Engineer
Security Architect
Cyber Security Engineer
Senior Security Specialist
Senior Information Security Consultant
Manager, Network & Security
Network Security Analyst
  • NG911 - Cyber Security Tools Implementation Engineer

    V Group Inc. 4.2company rating

    Security engineer job in New York, NY

    Duration: 11+ Months Contract Contract Interview Type: In-person Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work). Requirement ID: NYC_OT735_SS contact Sandeep @ ********************** Job Description Justification: This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases. NG911 - Cyber Security Tools Implementation Engineer Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management. Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP. Support for application development and database administration. Provide support for Email, DNS, AND Remote access solutions. Deploy appropriate network security solutions. Note: Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum. SCOPE OF SERVICES: NG911 - Cyber Security Tools Implementation Engineer Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management. Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP. Support for application development and database administration. Provide support for Email, DNS, AND Remote access solutions. Deploy appropriate network security solutions. MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety. 3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies CISSP or other industry Cyber Security Certification Experience migrating DNS to a new platform. Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats. Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls. DESIRABLE SKILLS/EXPERIENCE: 3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies CISSP or other industry Cyber Security Certification Experience migrating DNS to a new platform. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant. Please share my contact information with others working in Information Technology.
    $81k-109k yearly est. 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Architect

    Wakefern Food Corp 4.5company rating

    Security engineer job in Edison, NJ

    The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.). Essential Functions Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments. Design security solutions that align with business objectives while mitigating risk. Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise. Architect cloud security strategies, leveraging best practices for Azure and GCP. Lead security investigations, conduct root cause analysis, and document incident response actions. Provide threat intelligence and recommend proactive security measures to mitigate risk. Implement and maintain cloud security controls in Azure and GCP. Optimize cloud security solutions for web and network protection. Ensure Active Directory (AD) and IAM policies align with best practices. Support identity governance, access reviews, and privileged access management (PAM). Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls. Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS). Recommend, evaluate, and implement new security technologies based on business needs and threat landscape. • Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles. Additional Functions Threat Modeling & Risk Management: Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks. Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations. Develop and maintain security policies, standards, and playbooks for security operations. Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2). Identity & Access Management (IAM) & Authentication: Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC). Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD. Define identity threat detection and response (ITDR) strategies. Security Governance & Compliance: Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK). Assist with audit, regulatory compliance, and security assessments. Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs. Provide security guidance for third-party risk management and vendor security evaluations. Leadership & Collaboration: Act as a subject matter expert (SME) in cybersecurity architecture and best practices. Provide mentorship and training to security engineers and analysts. Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals. Develop security roadmaps and strategic initiatives for continuous security improvement. Maintain and fine-tune security configurations across various security platforms. Identify security gaps and recommend security enhancements and process improvements. Develop playbooks and automation scripts to enhance security operations efficiency. Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications. Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements. Investigate security breaches and other security incidents to determine the root cause and implement corrective actions. Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures. Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure. Participate in security audits and assessments to identify and address security gaps. Develop and maintain incident response plans and procedures. Evaluate and recommend security technologies and solutions to improve the organization's security posture. Qualifications 7-10 years of experience in cybersecurity architecture, security operations, or cloud security. Deep understanding of: Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices Email secure gateway (Proofpoint, Mimecast) Firewalls (Palo Alto, Cisco) and network security principles Cloud security (Azure, GCP) and security automation IAM, MFA, AD, Okta, Microsoft Authenticator Endpoint security, EDR, ITDR, and threat intelligence Data classification, DLP, and information protection Experience designing secure architectures for large-scale enterprises and cloud environments. Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform). Excellent communication and leadership skills, capable of influencing security strategies across the organization. CISSP Certifications (Required): CISM and CCSP is plus A bachelor's degree in computer science, information systems, or a related experience. 7-10 years of experience in cybersecurity, security operations, or network security. Hands-on expertise with: Zscaler, CrowdStrike, Microsoft Defender, Sophos Proofpoint (Email Security Gateway) EDR & ITDR solutions Palo Alto & Cisco Firewalls Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM Cloud Security (Azure and GCP) Data classification and protection strategies Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response. Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks. Strong analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams. Working Conditions & Physical Demands This position requires in person office presence at least 4x a week.
    $123k-162k yearly est. 5d ago
  • Network and Security Engineer - VP

    Natixis Corporate & Investment Banking 4.9company rating

    Security engineer job in New York, NY

    Natixis CIB is seeking a dynamic and experienced Vice President of Network Security to lead and enhance our network security infrastructure across the AMER region. This strategic leadership role requires a deep technical understanding of network security and the ability to drive initiatives that protect our systems while mentoring a talented engineering team. The job responsibilities include, but are not limited, to the following: Infrastructure Oversight: Lead the design and administration of Natixis CIB AMER's network security infrastructure, focusing on critical components including DNS, F5 Load Balancers, Fortinet and Palo Alto firewalls, VPNs, proxies, Remote Access and DMZ connectivity. Technology Initiatives: Drive technology projects aimed at enhancing cybersecurity and improving network performance in alignment with organizational goals. Continuous Monitoring: Ensure optimal network performance through continuous monitoring, dashboard creation, promptly addressing any security incidents. Documentation Management: Maintain comprehensive documentation, including network security asset inventories, diagrams, procedures and vendor contacts, to support operational efficiency and facilitate effective communication. Cross-Department Collaboration: Collaborate with infrastructure teams to resolve network-related challenges and ensure seamless operations across departments. Audit and Security Coordination: Work closely with audit and IT Security teams in both AMER and BPCE-IT to provide necessary documentation and implement remediation plans as required. Staff Mentorship and Training: Mentor and train junior engineering staff, fostering a culture of growth and skill development within the network team. Vulnerability Assessments: Conduct vulnerability assessments and manage patching processes to effectively mitigate and report security risks across the AMER region. Security Reporting: Develop and deliver regular security reports to Leadership, highlighting key metrics, incidents, and trends to inform strategic decision-making. LOD1 Security Management: Manage Line of Defense 1 (LOD1) network security controls and request as specified by the IT Risk Department. Strategy Alignment: Coordinate with AMER and Head Office IT Security teams to assure alignment on security strategies and policies. Tool Proficiency: Profiecent knowledge of security tools such as SIEM, Splunk, Centreon and Qualys for effective monitoring and incident response. Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field; Master's preferred. 6+ years of hands-on experience in network security management, preferably within the financial services industry. Extensive experience managing Cisco Firepower, Fortinet and Palo Alto firewalls, including DMZ design implementation. Relevant certifications such as Fortinet NSE 4/5, Palo Alto Networks Certified Network Security Engineer (PCNSE), Cisco CCNP Enterprise and CCNP Security is a plus. Highly desirable CISSP, CISM. Strong project management and leadership experience. Excellent communication and problem-solving skills, with a focus on collaboration and teamwork. Extensive understanding of network technologies - L2, L3, VXLAN, BGP, LAN/WAN/VPN Extensive understanding of security technologies such as firewall, load balancing, proxy, authentication methods Strong knowledge of DNS/DHCPWSG (Web Security Gateways), Proxy-pac scripting Troubleshooting knowledge of network and security systems with minimal guidance is required. OSI Layer 4 and Layer 7 protocol analysis and troubleshooting experience is required. Excellent oral and written communication and documentation skills are essential. Ideal candidate must have a strong understanding of Zero Trust Architecture and Network Access Control design for enterprise network infrastructure design, and troubleshooting. Among these technologies, knowledge of Arista and Cisco design, configuration and automation is a definite plus Knowledge of scripting languages such as Python, PoweShell, or Ansible. The individual will need to be very organized, flexible, results oriented and able to multi-task to meet the demands of our dynamic environment The candidate should be a self-starter, be able to work with minimal supervision, properly and effectively report project/work status to management and peers, take full ownership and responsibility of the tasks assigned to her/him and work them through completion. The candidate should be able to demonstrate both technical capabilities and in-depth knowledge of various security and network concepts, technologies, and best practices The candidate should have the ability to convey in non-technical terms complex technical explanations related to problems, designs, etc. Knowledge of Ansible Scripting is a plus Knowledge of micro segmentation tools such as Illumio or VM Ware NSX is a plus Natixis is an equal opportunity employer, committed to a workplace free of discrimination. Natixis will not tolerate any form of discrimination based on age, color, mental or physical handicap or disability, pregnancy, marital status, sexual orientation, national origin, alienage, ancestry or citizenship status, race, religion, sex (including sex stereotyping, gender identity, gender expression or transgender status), veteran status, creed, genetic information or carrier status, or any other protected characteristic as established by law. Respect for all means that we deal with each person as an individual and not as a member of any group. All qualified applicants will receive consideration for employment. Management is expected to provide leadership in supporting the firms EEO program by taking steps to promote EEO in all facets of employment including recruitment, hiring, retention, promotion, performance assessment, and career-development opportunities. The salary range for the VP position will be between $150,000 - $180,000. Natixis is required by law to include a reasonable estimate of the compensation range for this role. Actual base salary will vary and will be based on several factors including, but not limited to, relevant experience, education, skills set, applicable licensure and certifications, and other business and organizational needs. Base salary is only one component of our total rewards package. Natixis also offers a generous benefits package, and you may be eligible for a discretionary incentive award depending on company and individual performance.
    $150k-180k yearly 5d ago
  • senior security specialist-Akamai

    Vbeyond Corporation 4.1company rating

    Security engineer job in Morristown, NJ

    Akamai- Senior Security Specialist Must have skills • SOC/SIEM, Threat Hunting, Incident Response, Endpoint Security - EDR/XDR • WAF/DDoS implementation and configuration using Cloudflare/Akamai platforms • Client management skills 10+ yrs exp Job Description: As a Senior Security Specialist, you will play a critical role in safeguarding our organization's information assets and infrastructure. Your expertise in Cybersecurity, EPP, EDR, XDR, AI Security, threat hunting, network security, WAF, cloud security, threat detection, incident response, malware analysis, data and log analysis, and timeline forensics will be instrumental in identifying and mitigating security risks. You will work collaboratively with cross-functional teams, security analysts, IT professionals, and management to ensure the protection of our systems, networks, and data. Key Responsibilities: Design, develop and implement security solutions and tools like Aurora, Palo Alto Cortex to improve security posture and protect organizations infrastructure and data. Review and validate policy configurations and utilize security tools including EPP, EDR, XDR, cloud security configurations, network security technologies to improve and fine-tuning. Work with MFX and clients for endpoint security related report review and provide technical details. Proven security engineering and administration experience with EPP, EDR, XDR technologies preferably Aurora, Cortex etc. Research the latest security best practices and technologies, staying abreast of new threats and vulnerabilities and helping disseminate this information within the groups at the company. Develop and implement cybersecurity strategies, policies, and procedures. Lead and coordinate incident response activities, including containment, eradication, and recovery. Conduct post-incident analysis to identify lessons learned and recommend improvements. Work closely with internal and external stakeholders to manage and mitigate security incidents. Provide guidance and support to junior security team members during incident response activities. Perform analysis of suspicious files and malware samples. Identify malware behavior, capabilities, and potential impact. Develop and maintain a malware analysis lab and related tools. Provide recommendations for mitigation and response to malware incidents. Stay updated with emerging malware trends and techniques. Familiarity with Cyber Kill chain and MITRE ATT&CK framework. Establish, execute, communicate, and oversee project management for MFX and clients. Education / Work Experience: Minimum 10+ years of experience in cybersecurity, network security, cloud security, threat hunting including a minimum of 5+ years of experience in Endpoint Security technologies. Work experience with securing cloud infrastructure in Azure/AWS. Experience in WAF, DDoS configurations and incident handling skills. Preferred Certifications: GIAC, CISM, CCSP, CISSP, or equivalent certification, work experience, or skills. Strong knowledge of cybersecurity principles, best practices, and industry frameworks (e.g., NIST, ISO 27001). Good to have digital forensic investigations, including timeline analysis. Knowledge / skills: Advanced knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security. Experience using endpoint security technologies like Aurora, Cortex, or similar. Strong technical experience in cloud security services - network and storage encryption, network security groups, web security and identity and access management. Administering and improving industry standard security controls using security tools like EPP, EDR, XDR etc. and driving operational excellence. Experience with multiple Operating systems (Linux, Unix, Windows) Understanding of forensic principles and methodologies, including timeline forensics (Good to have) Excellent customer relationship and strong communication (i.e., written and verbal), presentation, teamwork skills and resourcefulness.
    $89k-135k yearly est. 2d ago
  • Manager, Network Security, Tech & Data Risk Management

    Capital One 4.7company rating

    Security engineer job in New York, NY

    Manager, Network Security, Tech & Data Risk Management Capital One is one of the fastest growing organizations in the world today, powered by our passion for our customers. We are serious about technology, we dream big, and we execute: Capital One moved our entire enterprise to the public cloud over the course of five years. Just as we prioritize driving innovation through technology, we equally prioritize cybersecurity, reliability, software quality, and data management. Technology & Data Risk Management (TDRM) is a small organization that packs a big punch. The 200 professionals in TDRM are trusted experts who oversee 14,000 developers at Capital One. We raise the bar for excellence in cybersecurity, reliability, and tech risk, and data management risk. We shape strategy and decisions, challenge activities to ensure they meet our standards, and perform independent tests of our security and technology risk. For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Tech & Data Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and the risk of failing to manage our data. The CTRO is independent and oversees the work of the CISO, the CIO/CTO, and the Chief Data Officer. The CTRO reports to the Chief Risk Officer, who reports directly to the CEO. Our business leaders must make technology decisions constantly. TDRM makes sure they have the tech and data risk information they need to make good decisions. Associates within TDRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, data analyst, data scientist, and risk management professionals. They have a wealth of experience and a demonstrated ability to add value with their advice and to deliver high-impact results. Role-specific text This position - Manager, Network Security - is a unique opportunity for candidates with technical cybersecurity experience who have a desire to expand that expertise in a risk management organization. This individual will have the opportunity to leverage their technical subject matter expertise to provide advisory, oversight, and effective challenge to stakeholders within the first line of defense. This role will engage with and build relationships across multiple lines of defense while overseeing network security across Capital One's private and public cloud footprints. Responsibilities: Provide advisory, oversight, and effective challenge to the first line of defense. Provide technical assessments of cybersecurity controls design and effectiveness. Draft assessments for senior management and other stakeholders, to include regulatory agencies and the Board of Directors, as needed. Stay current on emerging cyber threats and potential implications to the firm. Collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to achieve objectives. Coordinate program-related activities and deliverables to ensure effective collaboration within the team and across stakeholder groups. Proven track record of leading, mentoring, and influencing others. Ability to communicate clearly in written and verbal form. Ability to manage multiple projects while maintaining superior results. Ability to work individually and cross-functionally. Execution oriented and a self-motivator. Basic Qualifications: Bachelor's degree or military experience 3+ years of experience in the financial services industry or highly regulated industry (healthcare, energy, telecommunications) 3+ years of experience implementing network defenses (firewalls, network access control, intrusion detection, intrusion prevention, web application firewalls, web gateways, and proxies) in AWS (Amazon Web Services) or GCP (Google Cloud Platform) 2+ years of experience implementing Zero Trust or Secure Access Service Edge (SASE) in AWS or GCP 1+ certifications for AWS or GCP 2+ years of audit or risk management experience Preferred Qualifications: 2+ years of experience with Palo Alto Networks technologies 1 or more audit or risk-focused certification: CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), or CISSP (Certified Information System Security Professional) 2+ years of experience implementing network defenses for global payment networks At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $193,400 - $220,700 for Manager, Cyber Technical New York, NY: $211,000 - $240,800 for Manager, Cyber Technical Plano, TX: $175,800 - $200,700 for Manager, Cyber Technical Richmond, VA: $175,800 - $200,700 for Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $211k-240.8k yearly 3h ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Security engineer job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Ethical Hacker Needed at Web Agency. Work Remotely (USA only)

    Treasurefy

    Security engineer job in New York, NY

    We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States. Job Description We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department. We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks. At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security. You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us. Along with your application, please answer the following questions: How long have you been a hacker? Do you have an Ethical Hacker Certification? When did you receive it? What was the most complicated penetration test you have ever performed, and why? What are the most common security threats that you deal with? How long does it typically take you to clean common Viagra malware on websites? Have you managed other hackers? Qualifications One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization. Additional Information We are growing fast and need motivated and hard-working people to grow with us.
    $78k-123k yearly est. 4h ago
  • HackerX - New York City (Full-Stack) Event

    2U Events 4.2company rating

    Security engineer job in New York, NY

    Thank you for Networking at the HackerX Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability. At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same. Benefits & Culture Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms. 2U offers a comprehensive benefits package: Medical, dental, and vision coverage Life insurance, disability and 401(k) Unlimited snacks and drinks Tuition reimbursement program Generous paid leave policies including unlimited PTO Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years! To learn more, visit 2U.com. #NoBackRow
    $83k-115k yearly est. Auto-Apply 60d+ ago
  • Social Media Growth Hacker

    Truff

    Security engineer job in New York, NY

    Job Description Job Title: Social Media Growth Hacker Salary: $85,000-$95,000 with 10% Annual Bonus TRUFF is a premium truffle-infused condiments brand - born at the intersection of heat and flavor. In 2015, TRUFF co-founders built the popular food and lifestyle Instagram ******************** 2 years later, in 2017, TRUFF co-founders launched TRUFF Original Hot Sauce, which catapulted into internet virality and beyond. Earning countless awards and accolades, including Oprah's Favorite Things (6x) Adweek's Best Brand Born Out of Social Media, and TheKitchn Essential's Mayo, TRUFF has become one of the fastest growing brands in condiments. TRUFF has partnered with the likes of Hidden Valley Ranch, Star Wars, Taco Bell, Popeyes, Travis Scott and Starbucks, and over the years has expanded into complimentary condiment categories - pasta sauce, mayo, oil, and seasonings. TRUFF's uniquely premium taste and aroma amplify the flavor experience of everyday dishes to make every day a culinary moment. Job Summary We're looking for a Social Media Growth Hacker. A creative, data-driven, internet-native operator obsessed with building cultural moments and engineering virality. This role blends content creation, distribution strategy, and cultural pattern recognition to fuel TRUFF's next wave of organic growth. You'll work closely with our founders and marketing leadership to turn ideas into scroll-stopping moments across TikTok, Instagram, YouTube Shorts, and emerging platforms. You'll understand how to produce, how to clip, remix, seed, and distribute content for maximum reach. You'll live in the comment sections, spot trends before they break, and know how to turn a viral moment into a business outcome. This isn't a “post and pray” social role, it's a creative growth lab for someone who thrives on experimentation, velocity, and storytelling through culture. Key Responsibilities Engineer virality: Identify, create, and capitalize on trends, moments, and sounds across TikTok, Instagram, and YouTube. Build the content engine: Develop daily/weekly content calendars, leveraging UGC, internal/external shoots, and short-form clip strategies that scale across multiple TRUFF and partner accounts. Clip farming & content distribution: Source, cut, and seed hundreds of short clips across pages to test hooks, angles, and communities for maximum reach and engagement. Operate like an internet newsroom: Monitor culture, competitors, and community signals in real-time to inform TRUFF's next moves. Collaborate with founders & SVP Marketing: Concept, shoot, and publish brand-led or personality-driven moments that blur the line between brand and creator. Community + culture management: Live in the comments, stitch creators, respond with wit, and make TRUFF feel human. Influencer & creator sourcing: Partner with creators and meme pages for collabs, trend participation, and content amplification. Experiment & scale: Test new formats, AI tools, social distribution tactics, and “unscalable” experiments that move the algorithm. Analytics & learning loops: Use data and platform insights to refine creative direction, track virality patterns, and build a playbook of what works. Content production: Shoot, edit, and publish video/photo content natively optimized for each platform, fast, scrappy, and aesthetic. Requirements Deep understanding of internet culture, virality, and meme psychology. 3+ years managing or creating social media content for a consumer brand or creator-driven business. Proven track record of creating viral or high-engagement content. Strong experience with short-form editing and clipping tools (CapCut, Premiere, Descript, etc.) and multi-platform publishing. Understanding of content distribution systems - repost networks, collab strategies, paid boosts, and shadow channels. Excellent copywriting and visual storytelling skills. Comfortable being on camera and experimenting with creative formats. Data-driven mindset - able to analyze performance and pivot quickly. Proficient in Google Suite, Sprout Social, Meta Business Manager, and analytics dashboards. Bonus: Experience building pages or brands from scratch, creator economy fluency, or running niche meme / content accounts. You're Probably the Right Fit If You… Think in hooks, captions, and shareability. Wake up on TikTok, fall asleep on Reddit. Can take a raw clip and make it go viral. Get excited by chaos, creativity, and community. Love brands that blur lines between food, culture, and humor. Believe social media is more science than art - but still know how to make it look cool. Benefits Performance Bonus Comprehensive Health, Dental, Vision & Life Insurance 401(k) with 3% company match Generous PTO, Sick Time, Holidays & Parental Leave Wellness, Internet & Cell Phone Stipends Company-provided Laptop
    $85k-95k yearly 8d ago
  • Senior Manual Ethical Hacker

    Bank of America Corporation 4.7company rating

    Security engineer job in Jersey City, NJ

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Job Description: Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the security resilience of the bank's applications to malicious hacking activity. This senior technical role is responsible performing and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policies, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. These individuals are expected to perform application security-oriented dynamic and static assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of importance: * Perform assigned analysis of internal and external threats on information systems and predict future threat behavior. * Incorporate threat actors' tactics, techniques, and procedures into offensive security testing to identify high-value vulnerabilities/chained attacks. * Developing Proof-of-concepts for exploitation. * Perform assessments of the security, effectiveness, and practicality of multiple technology systems. * Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. * Prepare and present detailed technical information for various media including documents, reports, and notifications. * Provide clear and practical advice regarding managing risks. * Learn and develop advanced technical and leadership skills, mentor Junior and Intermediate assessors in technical tradecraft and soft skills. * Respond to security incidents and provide technical assistance to leadership across the Information Security organization. Required Skills: * Minimum of 5+ years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment * Detailed technical knowledge in at least 5 of the following areas: * security engineering * application architecture * authentication and security protocols * application session management * applied cryptography * common communication protocols * mobile frameworks * single sign-on technologies * exploit automation platforms * Web APIs * Cloud environments * LLM security * Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings * Experience performing manual web application assessments i.e., must be able to simulate a OWASP Top 10 vulnerabilities without the use of tools * Experience performing manual code reviews for security relevant issues * Experience working with DAST and SAST tools to identify vulnerabilities * Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) * Experience with vulnerability assessment tools and penetration testing techniques. * Solid programming/debugging skills, development frameworks, CVE and CWE research/reproduction * Threat Analysis, threat modelling and SBOM analysis * Innovative thinking, threat actor simulation * Technology Systems Assessment * Technical Documentation * Advisory Desired: * CEH, OSCP/OSCE/OSWE/GXPN/GPEN/GWAPT/GMOB/All Practitioner Certs [Port Swigger BSP Academy]/Cloud Cert(s)/ eWPT; eWPTX; eMAPT [INE Pentester Academy] * Strong programming/scripting skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift: 1st shift (United States of America) Hours Per Week: 40
    $94k-135k yearly est. 16d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Security engineer job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $84k-119k yearly est. Auto-Apply 8d ago
  • Lead Information Security Analyst - Identity

    Adpcareers

    Security engineer job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 4h ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Security engineer job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 4h ago
  • Security System Engineer

    Network Mountain

    Security engineer job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 3d ago
  • Security Engineer, Operating Systems

    Anthropic

    Security engineer job in New York, NY

    Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Role We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training. This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale. What You'll Do: Design and implement hardened OS configurations for AI workloads across diverse hardware platforms Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms Implement and maintain full-disk encryption solutions for diverse storage systems Build security infrastructure for AI systems, research environments, and production services Create OS-level attestation and integrity monitoring systems Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations Design secure boot processes and trusted execution environments Work with container teams to ensure proper workload isolation at the kernel level Design privilege separation and mandatory access control policies Implement secure update mechanisms for OS components Build tooling for security configuration management and compliance verification Serve as a subject matter expert for OS security questions and designs Who You Are: 5+ years of experience in operating systems security or kernel development Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.) Experience with kernel hardening techniques and exploit mitigation Strong programming skills in C and systems programming languages Experience with eBPF for security monitoring and enforcement Understanding of virtualization and containerization security Track record of identifying and fixing OS-level security vulnerabilities Experience with security-focused Linux distributions Strong candidates may also have: Kernel development experience or contributions to Linux kernel Experience with real-time or embedded operating systems Knowledge of hardware security features and their OS integration Experience with secure boot technologies Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX) Background in vulnerability research, exploit development, or fuzzing Experience with formal methods for OS verification Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves) Deadline to apply: None. Applications will be reviewed on a rolling basis. The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation. Annual Salary:$300,000-$405,000 USDLogistics Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices. Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this. We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team. How we're different We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills. The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences. Come work with us! Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
    $73k-101k yearly est. Auto-Apply 25d ago
  • Health Hacker - New York

    Next Health 4.2company rating

    Security engineer job in New York, NY

    About UsAt Next Health, we are redefining health optimization by integrating cutting-edge medical innovation with preventative, data-driven wellness. Through our technology-forward platform and luxury clinical environments, we empower our members to take control of their well-being with personalized longevity solutions. We are rapidly expanding across the U.S., and we are seeking visionary leaders to help scale our digital infrastructure and member experience. Your ImpactAs the Front Desk Receptionist at Next Health, you will be the first point of contact for our patients, visitors, and vendors. You will play a critical role in creating a positive patient experience and ensuring that our operations run smoothly. Job DescriptionAs the Front Desk Receptionist, you will be responsible for: Greeting patients and visitors with a welcoming and professional demeanor Checking in patients and verifying their demographic and payment information Scheduling appointments and managing the clinic schedule Assisting patients with questions and concerns Maintaining patient records and updating them as needed.Coordinating with other departments and healthcare providers to ensure seamless patient care. What to Expect In this role, you can expect to: Interact with a diverse group of patients and visitors Manage multiple tasks and responsibilities simultaneously Use electronic medical records and scheduling software Work closely with other departments and healthcare providers Provide excellent customer service and patient care What You'll BringWe're looking for someone who has: 1+ years of experience in a medical office or healthcare setting Excellent communication and interpersonal skills Strong attention to detail and organizational skills Ability to manage multiple tasks and ************************************** Super AdminExperience with electronic medical records and scheduling software Knowledge of medical terminology and insurance billing practicesA passion for providing exceptional customer service and patient care Aptitude for sales Passion for and knowledge of health & wellness services.Exceptional at customer service.Display a genuine interest in helping other people.Excited to learn new things and be on the cutting edge of health & wellness. Our Culture & PerksWe're a patient-centered healthcare clinic with a culture that values empathy, respect, and teamwork. We offer: Competitive salary and benefits package Opportunities for professional growth and developmentA supportive and inclusive work environment Meaningful work that makes a difference in patient's lives Expected CompensationThe expected compensation for this position is $21 per hour, plus benefits. Pay offered may vary depending on multiple individualized factors, job-related knowledge, skills, and experience. The total compensation package for this position may also include other elements dependent on the position offered. Details of participation in these benefit plans will be provided if an employee receives an offer of employment. We are an Equal Opportunity / Affirmative Action employer committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, protected veteran status, gender identity, or any other factor protected by applicable federal, state, or local laws. Please note: We kindly request that applicants refrain from calling our office line regarding job inquiries. All application related questions should be directed to ********************. Thank you for your understanding.
    $21 hourly Auto-Apply 60d+ ago
  • Information Security Analyst

    Ra 3.1company rating

    Security engineer job in Jersey City, NJ

    Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you! They are an equal opportunity employer and value diversity at our company. Job Description Strong knowledge of Information Security concepts such as: •Encryption, Cloud and Mobile Device Security •Data Loss and Prevention tools and solutions •Risk-Threat Analysis and Vulnerability Assessments •Enterprise Security Monitoring, Role-Based Access Control (RBAC) •Identity and Access Management, Computer Forensic •IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.) •Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability. Sounds like you? then ping us with your most updated resume. We'd love to talk to you! We are excited about the companies growth and the role you will play with them. Qualifications Desired Skills & Experience: You hold a Bachelor's degree in any domain. You are certified in CISSP, or CISA, or CEH, required. You have more than 1 year experience working in the IT security function. You have good experience with Operating System, Database, Network and Application Security. Additional Information All your information will be kept confidential according to EEO guidelines. Ping me at **********************
    $91k-130k yearly est. Easy Apply 60d+ ago
  • Senior Manager, Information Security Office Consultant

    Capital One 4.7company rating

    Security engineer job in New York, NY

    Senior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. As a Senior Manager, You will play a leading role in delivering product security advisory services for a fast moving project within a line of business portfolio, working closely with other professionals as required. You have the ability to lead complex problem solving in partnership with multiple stakeholders in a fast-paced environment, driving results with critical impact. You will work with the other Information security consultants, business, technology and risk partners to achieve time sensitive goals and objectives in a secure manner with a heavy forward lean on modern software and technology architectures. Responsibilities: Act as an Information Security point of contact for a business function within the Card line of business Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Leverage strong technical acumen and be security SME reviewing architecture, providing risk mitigation solutions and driving overall risk management. Partner closely with engineers, product managers, and other cross-functional partners to help break down complexity and organizational silos to problem solve. Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment About You: You have a desire to work in a very fast moving, forward leaning, and modern computing environment You have experience in securing large-scale e-commerce platforms, with deep understanding of payments systems, customer data protection across high transaction environments ensuring protection of user data across internal and partner ecosystems. You have a deep passion for Securing modern computing platforms You have a strong desire to continually learn about new technologies You possess strong conceptual thinking and communication skills You are able to work well under minimal supervision You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives Basic Qualifications: High School Diploma, GED or equivalent certification At least 6 years of experience working in cybersecurity or information technology At least 5 years of experience providing guidance and oversight of Security concepts At least 5 years of experience performing security risk assessments and security architecture reviews At least 5 years of experience with architecture, software design, networking, and cloud infrastructure At least 4 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 6+ years of experience Application Security, Threat Modeling, Penetration Testing, Vulnerability Management 4+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 2+ years experience in e-commerce industry 2+ years of experience building software utilizing public cloud (e.g. AWS, GCP, Azure) 1+ years of experience in security integration for Mergers and Acquisitions 1+ years of experience with Cloud patch management practices such as system rehydration and image management 1+ years of experience utilizing Agile methodologies 1+ years of experience with Software Security Architecture 1+ years of experience with Application Security 1+ years of experience with Threat Modeling 1+ years of experience with Penetration Testing and/or Vulnerability Management 1+ years of experience with integrating SaaS products into an Enterprise Environment 1+ years of experience with securing Container services 1+ years of experience with Splunk-Fu and Enterprise Monitoring experience 1+ years of experience in a Financial services industry experience 1+ years of experience with Offensive or Defensive Security techniques AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, or another type of work authorization). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical New York, NY: $245,900 - $280,600 for Sr Manager, Cyber Technical Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical Richmond, VA: $204,900 - $233,800 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $87k-113k yearly est. 3h ago
  • Ethical Hacker Needed at Web Agency. Work Remotely (USA only)

    Treasurefy

    Security engineer job in New York, NY

    We help professional services companies generate leads and convert them into clients. We are a growing team composed of people who absolutely love to do what we do, which is why we are so good. The company is located in New York City and we will soon open an office in South Florida. You can work from anywhere within the United States. Job Description We are currently looking for a Certified Ethical Hacker (CEH) to oversee our web security department. We are primarily a Web Marketing and Design firm, yet due to popular demand, we have started offering Web Security services and now need an expert to manage this area of the business. With a team of off-shore web security consultants, we are looking to hire someone who can work as the liaison between us and the team - giving directions, managing them on a day-to-day basis, and checking their work that the team is performing quality work. You will also do the more complex tasks. At this point, the majority of the Web Security work performed is completing malware removal and low-level penetration testing of web applications. However, as we have recently decided to invest more time and resources into the Web Security field, we will soon be doing more complex penetration tests, as well as other more in-depth web security. You need to be experienced in both performing this type of Web Security work, as well as in the business aspect, and can help guide us in the different services we should be offering as we expand, and what each of those services entails. In other words, we need someone who will help us grow the Web Security arm of the company … and will grow with us. Along with your application, please answer the following questions: How long have you been a hacker? Do you have an Ethical Hacker Certification? When did you receive it? What was the most complicated penetration test you have ever performed, and why? What are the most common security threats that you deal with? How long does it typically take you to clean common Viagra malware on websites? Have you managed other hackers? Qualifications One or more of the following certifications strongly preferred: *CEH (Certified Ethical Hacker) or equivalent web/application security testing qualification *CISSP (Certified Information Systems Security Professional) Experience and Skills Required: In-depth knowledge of application security vulnerabilities, testing techniques, and the OWASP framework. In depth understanding of secure web application development, Java, Java development frameworks, web services and SOAP. Experience in Web 2.0 (For ex, HTML5, CSS3 and JavaScript MVC frameworks (Angular JS). Comprehensive knowledge of IT and information security. Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001. Knowledge of technical security architectural principles. Able to prioritize workload and drive work to set deadlines. Exposure to methods of promoting security awareness. Strong communication (verbal/written) skills - able to create concise reports of the vulnerabilities and recommended steps in a way that non-technical people can understand Anticipates problems and identifies long-term implications of decisions and actions. Ability to lead a team of hackers Other desirable technical certifications: GIAC ethical hacker, GIAC Certified Web Application Defender, GIAC Web Application Penetration Tester ITIL certification or experience of working within an ITIL-oriented organization. Additional Information We are growing fast and need motivated and hard-working people to grow with us.
    $78k-123k yearly est. 60d+ ago
  • HackerX D&I Virtual Event

    2U Events 4.2company rating

    Security engineer job in New York, NY

    Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability. At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same. Benefits & Culture Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms. 2U offers a comprehensive benefits package: Medical, dental, and vision coverage Life insurance, disability and 401(k) Unlimited snacks and drinks Tuition reimbursement program Generous paid leave policies including unlimited PTO Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years! To learn more, visit 2U.com. #NoBackRow
    $83k-115k yearly est. Auto-Apply 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Verona, NJ?

The average security engineer in Verona, NJ earns between $72,000 and $133,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Verona, NJ

$98,000

What are the biggest employers of Security Engineers in Verona, NJ?

The biggest employers of Security Engineers in Verona, NJ are:
  1. CoreWeave
  2. Columbia Bank
  3. ADP
  4. Broadridge
  5. Prudential Bank
  6. Prudential Financial
  7. Adpcareers
  8. Blueprint30 LLC
Job type you want
Full Time
Part Time
Internship
Temporary