Post job

Security engineer jobs in Wilmington, DE

- 227 jobs
All
Security Engineer
Information Systems Engineer
Security System Engineer
Cyber Security Analyst
Information Security Analyst
Network Engineer
Information Assurance Analyst
Information Systems Security Officer
  • Cloud Security Engineer

    GHR Healthcare 3.7company rating

    Security engineer job in Philadelphia, PA

    The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes. Proven experience in securing a multi-cloud environment. Proven experience with Identity and access management in the cloud Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful. Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure. Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities. Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides. Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies. Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders. Mentor and support junior InfoSec engineers through documentation, training, and peer reviews. Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred). Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols. Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms. What you will do A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also: Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals. Skills: Duties (cont'd): Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. Skills: Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
    $100k-144k yearly est. 2d ago
  • Cloud Security Engineer

    Motion Recruitment 4.5company rating

    Security engineer job in Philadelphia, PA

    Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis. Contract Duration: 6 Month Contract (Potential for extension or conversion) Required Skills & Experience At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment. CISSP Certification At least six (6) years experience with information security, regulatory compliance and risk management concepts. At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training. Experience with Cloud and/or Virtualization technologies. Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information. Daily Responsibilities Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. You will receive the following benefits: Medical Insurance - Four medical plans to choose from for you and your family Dental & Orthodontia Benefits Vision Benefits Health Savings Account (HSA) Health and Dependent Care Flexible Spending Accounts Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance Hospital Indemnity Insurance 401(k) including match with pre and post-tax options Paid Sick Time Leave Legal and Identity Protection Plans Pre-tax Commuter Benefit 529 College Saver Plan Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
    $98k-137k yearly est. 3d ago
  • Security Incident Response Engineer III

    Elsevier 4.2company rating

    Security engineer job in Philadelphia, PA

    Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet. Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization? About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations. This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise. Responsibilities: Assisting in scoping security incidents and identifying indicators of attack and compromise. Analyzing incident data from threat analytics tools. Communicating recommendations and guidance based on security incident analysis. Coordinating responses to security incidents with other security and consulting teams. Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response. Performing security triage and analysis on endpoint, server, and network infrastructure. Conducting activities necessary for immediate containment and short-term resolution of incidents. Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities. Investigating the root cause of complex security incidents. Maintaining a high level of confidentiality. Requirements Possess experience in cybersecurity incident response or related fields. Proven ability to analyze, triage, scope, contain, and remediate security incidents. Have current and extensive knowledge of security technologies, tools, and processes. Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments. Have current skills in automation using PowerShell, Python, Java, or similar languages. Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration. Experience supporting large, complex, and geographically distributed enterprise environments. Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment. Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
    $82k-108k yearly est. 5d ago
  • OT Security Engineer

    VMC Soft Technologies, Inc.

    Security engineer job in Collegeville, PA

    Must have an OT background with life sciences experience Deliver OT security firewall policy design and document Investigate and deliver appropriate OT architectures for RD systems Troubleshoot connectivity issues experienced during migration activities Must be proficient in Palo Alto Must have an OT background with life sciences experience Knowledge of supporting technologies, Zscaler, Cisco network infrastructure, Azure, and Google cloud Good to have Experience using ServiceNow Preferred RD lab experience, knowledge of lab systems, such as LIMS. HPLC etc Experience with project software (ADO) Generic US or UK based (US preferred) Good communicator, role requires frequent conversations with the business Note : If you are interested please share me your resumes to ********************* or else reach me at **********.
    $80k-111k yearly est. 1d ago
  • Network Engineer

    Firstpro, Inc. 4.5company rating

    Security engineer job in Middletown, DE

    first PRO is seeking a hands-on Network Engineer to join a major enterprise network modernization initiative. This is a unique opportunity to work in a Cisco-centric environment and take ownership of large-scale network upgrades, design improvements, and operational support across data center, campus, and branch networks. What You'll Do: Lead hands-on hardware upgrades for Cisco Catalyst switches (2960, 9200), Nexus core devices, and ISR routers Perform ASA to Firepower (FTD) firewall migrations and ongoing firewall administration Configure and troubleshoot routing protocols such as BGP, OSPF, and static routes Execute cutovers, stacking, racking, cabling, and other on-site network tasks Support the SCADA network and remote site connectivity Analyze complex network issues and provide clear, actionable solutions Develop, maintain, and improve network documentation, runbooks, and topology maps Simplify and optimize legacy configurations to modernize network operations What We're Looking For: Expert-level Cisco skills across Catalyst, Nexus, ISR routers, and ASA/FTD platforms Experience with enterprise core and data center networks Ability to troubleshoot independently without relying heavily on TAC Proactive, ownership-driven, and engaged in network design conversations Excellent communication skills and strong documentation habits Hands-on field experience and the ability to respond to on-site issues when required Why This Role Is Exciting: Be part of a full network refresh: switches, routers, firewalls, and Nexus core replacement Opportunity to influence network design decisions from day one Work on data center modernization and SCADA network improvements This is a high-impact, hands-on role for a Cisco engineer who enjoys both engineering and operational challenges. If you thrive in fast-paced modernization projects and want to make a tangible impact, this is the role for you.
    $89k-118k yearly est. 1d ago
  • Platform Engineer - Security

    Campbell Soup Co 4.3company rating

    Security engineer job in Camden, NJ

    Since 1869 we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Michael Angelo's, Pace, Pacific Foods, Prego, Rao's Homemade, Swanson, and V8. In our Snacks division, we have brands like Cape Cod, Goldfish, Kettle Brand, Lance, Late July, Pepperidge Farm, Snack Factory, and Snyder's of Hanover. Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us. Why Campbell's… Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners). Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting. Campbell's offers unlimited sick time along with paid time off and holiday pay. If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store. Giving back to the communities where our employees work and live is very important to Campbell's. Our "Campbell's Cares" program matches employee donations and/or volunteer activity up to $1,500 annually. Campbell's has a variety of Employee Resource Groups (ERGs) to support employees. Who we are looking for… The Campbell's Company is looking for an senior-level Engineer - Information Security to join our critical and highly visible Information Security team. This position will primarily be responsible for managing the lifecycle and effectiveness of key security tools and processes. You will work closely with the Architecture and Risk Management teams to ensure that security controls are in place and appropriately managing risk throughout the Information Technology, Operational Technology, and Cloud environments. What you will do… Essential responsibilities will include but not be limited to: * Design, deploy, and integrate security tools and processes * Design, deploy, integrate Privilege Access Management (PAM) services for Linux and Windows environments * Experience in developing, testing, and deploying ZeroTrust security strategies focused on identity, device, and network contexts * Cloud (Azure / AWS) security engineering * Develop and implement automation strategies tied to both administrative maintenance of the environment, as well as contribute to the overall detection engineering efficiency * Active Directory security hardening Job Complexity * Manage multiple, concurrent project and task assignments, placing proper priorities on tasks and attention to detail to follow through all assignments to completion * Create and manage the lifecycle of documentation to support the architecture and operations of security systems * Continuously improve operational playbooks and knowledge transfer material to enable operational support teams to handle increasingly complex tasks to enable Engineering time is focused on the most valuable work * Serve as an incident escalation point * Provide thought leadership and communications expertise in the development of policies, standards, procedures, and other communication for the department * Provide thought leadership on key performance indicators for measuring success objectively * Integrate existing and new tools and supporting resources into our security intelligence platform, with the goal of deriving actionable data * Keep current with the latest news and events surrounding cyber threats and security * Evaluate new technologies and processes that enhance security capabilities What you bring to the table… (Must Have) * Bachelor's degree in a computer science or information technology discipline * 5+ years of relevant work experience, including: * 2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management * 1 year of experience in system or firewall administration * Deep understanding of Linux identity engineering and administration * 2 years of experience working with privileged access management platforms across Windows, Linux, network device, and containerized platforms * Significant experience working with automation scripting leveraging at least 3 of the following: python, PowerShell, API based integrations, and no/low-code workflow automation platforms. * Strong knowledge of L4-L7 protocols such as SSL, HTTP, DNS, SMTP, and IPsec * Deep understanding of TCP/IP, computer networking, routing, and switching, and encryption technologies and standards * Knowledge of identity and access management principles (SSO, MFA, ModernAuth) It would be great if you have… (Nice to Have) * CISSP certification is a plus * Cloud security experience is a plus * Conceptual understanding of the Cyber Kill Chain and MITRE ATT&CK framework * Experience with Manufacturing environments is a plus * Experience with leveraging LLM's or statistical analysis to drive operational insights * Strong capacity to understand vectors and the risks associated with them * Experience with deploying and managing distributed architecture layer 7 firewalls * Experience with IDS/IPS, penetration and vulnerability testing * Strong security policy knowledge and experience * Strong ability to clearly communicate and document complex concepts * Data protection tools and processes - Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB] More about the job… * This position reports to the Senior Manager for Security Architecture and Engineering Compensation and Benefits: The target base salary range for this full-time, salaried position is between $131,400-$188,900 Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package. The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
    $131.4k-188.9k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Delaware County, Pa 4.5company rating

    Security engineer job in Media, PA

    As the Cyber Security Analyst, you will design and implement IT security policies and systems to protect the organization's computer networks from cyber-attacks. You will also help develop organization-wide best practices for IT security, including security training for staff. You will monitor computer networks for security issues, install security software, and document all security issues or breaches you find. You will report vulnerabilities to management as identified and in a timely manner and ensure remediation. Essential Duties Under the general direction of the CIO, the Cyber Security Analyst will: * Create countywide cybersecurity policies for approval and implementation. * Perform daily monitoring and support of all systems and networks to identify security issues. * Investigate security breaches and other cybersecurity incidents. * Install security measures and operate software to protect systems and information infrastructure, including firewalls, IDS/IPS, and other security systems. * Document security breaches and assess the damage they cause. * Work with the IT team to perform tests and uncover network vulnerabilities. * Fix detected vulnerabilities to maintain a high-security standard. * Stay current on IT security trends and news. * Recommend changes to company policies to advance best practices for IT security. * Perform vulnerability scanning and penetration testing. * Help colleagues install security software and understand information security management. * Participate in disaster recovery testing. * Work cross-functionally as needed to improve the security posture of the organization, including SQA and development team resources. * Coordinate the collection of security controls evidence in support of certification and customer audits; participate in audits as needed. * Assist with completion of security questionnaires for customers, partners, and RFP responses. Qualifications * 3 years of experience working with Windows operating systems. * 3 years of experience working with cloud services from a security perspective. * 5 years of experience working with networking equipment, including switches, routers, firewalls, proxy servers, VPNs, and IDS/IPS. * Detailed knowledge of network troubleshooting tools such as Fiddler, Wireshark, and Traceroute. * 3 years of experience working with identity and access authorization systems such as Active Directory, LDAP, and Radius. * Strong working knowledge of encryption protocols, ciphers, and the configuration of systems. * Knowledge of current computer security practices and network protocols. * Experience with Nexpose, Metasploit, or similar security software. * Customer service-focused and detail-oriented. * Ability to work effectively as an individual contributor and collaboratively in workgroups. Physical Requirements While performing the duties of this position, the employee is frequently required to read documents in paper and electronic form, sit, walk, and talk or hear. Occasionally, the employee will need to stand and climb stairs; reach above shoulder height; and kneel, stoop, crouch, or squat. On rare occasions, the employee will need to lift or carry items. Work Environment * 8:30 a.m. to 5:00 p.m. 40 weekly hours. * Extended hours may be required to meet agency needs. Contact To
    $78k-104k yearly est. 15d ago
  • Cyber Security Analyst

    Stefanini Group 4.6company rating

    Security engineer job in Wilmington, DE

    Details: Stefanini Group is hiring! Exciting opportunity awaits, let us help you get started! Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing! Job Description: The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber Monitoring Associate will have the following key responsibilities: Perform real-time analysis and correlation of logs/alerts. Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events. Utilize multiple security technologies to investigate and analyses alerts. Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures Keep abreast of cyber security trends and the emerging threat landscape in general Details: What the ideal candidate looks like: 1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background. Intermediate knowledge of endpoint and network security concepts and tools preferred. Knowledge of ServiceNow. Crowdstrike, highly desired. Experience with event monitoring and security reporting Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems. *Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives* About Stefanini Group The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company. #LI-DT1 #LI-HYBRID
    $84k-113k yearly est. Easy Apply 60d+ ago
  • Lead Security Engineer- Big Data Architecture

    JPMC

    Security engineer job in Wilmington, DE

    Join our team to take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity and Tech Controls team, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. Job responsibilities Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions and break down technical problems. Develops secure and high-quality production code and reviews and debugs code written by others. Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls. Works with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability. Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase network. Works across customer engineering teams to help apply our framework and applications to their problem domain. Prototypes and recommends changes and additions to system components based on engineering customer experiences. Focuses on an integrated system approach to delivery versus ad-hoc add- ons to the architecture; looks for commonality and patterns in the needs of the engineering teams. Required qualifications, capabilities, and skills Formal training or certification on software engineering concepts and 5+ years applied experience. Skilled in planning, designing, and implementing enterprise level security solutions. Advanced in one or more programming languages like Java or Python. Proficient in all aspects of the Software Development Life Cycle. Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security. Understand requirements management processes for highly regulated environments. Cloud experience (AWS, Azure) and delivery mechanisms such as Terraform. Kubernetes and related tooling experience. Experience with threat modeling, discovery, vulnerability, and penetration testing. In-depth knowledge of the financial services industry and their IT systems. Experience with big data platforms and technologies such as Apache Flink, Apache Spark, Trino, Kafka, Apache Iceberg. Preferred qualifications, capabilities, and skills Experience effectively communicating with senior business leaders. Experience with Data Lake and Lake House Architectures and tooling.
    $87k-120k yearly est. Auto-Apply 60d+ ago
  • Cyber Information Assurance Analyst

    Penn State University

    Security engineer job in Parkesburg, PA

    APPLICATION INSTRUCTIONS: * CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process. Please do not apply here, apply internally through Workday. * CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. Please do not apply here, apply internally through Workday. * If you are NOT a current employee or student, please click "Apply" and complete the application process for external applicants. Approval of remote and hybrid work is not guaranteed regardless of work location. For additional information on remote work at Penn State, see Notice to Out of State Applicants. POSITION SPECIFICS We are searching for an experienced Information Systems Security Manager (ISSM) to join our Cybersecurity Division at the Applied Research Laboratory (ARL) at Penn State. Information Technology Services provides ARL's administrative and research computing environments and capabilities, delivering secure, responsive, efficient, effective, and compliant IT services and operations to meet the demanding needs of ARL's leading edge research. This position will have a focus on the unclassified space, overseeing and owning the unclassified information security program, including implementing our various compliance requirements like the Cybersecurity Maturity Model Certification (CMMC). This ISSM will however operate within and support both unclassified and collateral spaces, backing up fellow ISSM's and enforcing commonalities between environments where possible. They will be responsible for developing and maintaining policy and security documentation, providing cybersecurity recommendations for system, network, and application design, leading information system risk assessments, assist in leading incident response actions, setting standards for continuous monitoring processes such as auditing or vulnerability assessments, and ensuring cybersecurity requirements are effectively and efficiently communicated to operational and researcher team leadership to ensure integration into their respective team processes. ARL is an authorized DoD SkillBridge partner and welcomes all transitioning military members to apply. You will: * Develop, validate, submit, and maintain information system security plans, certification and authorization packages, and plans of action and milestones in support of compliance requirements * Oversee development and implementation of risk assessments against information systems in all phases of their lifecycles * Provide cybersecurity recommendations for system, network, and application design * Monitor and assist in the assessment and review of current and new systems and networks to ensure compliance with current cybersecurity policies, concepts, and measures * Develop training material related to compliance and audit requirements to assist employees in individual compliance/audits as applicable * Assist in technical requirements such as; vulnerability scanning, review of security/event logs, network analysis, and incident response on an as-needed basis Required skills/experience areas include: * Current eligibility for access to classified information at the Top-Secret level or higher and may be subject to a government background investigation to upgrade clearance eligibility, if required * Assessment and Authorization experience of systems and networks using CMMC and RMF * NIST/ISO standards (eg. NIST SP 800-53 and NIST SP 800-171), Department of Defense directives, DISA STIG, and regulatory requirements * Strong technical background, with significant experience using multiple operating systems to include Windows and Linux * Policy, procedure, plan of action and milestone, risk assessment and security plan development with experience of continuous monitoring for compliance with said documentation * System functions, security policies, technical security safeguards, and operational security measures * The ability to certify and maintain information security related certifications (eg. Security+, CISSP, and any other required certifications) * Excellent communications, analytical and problem-solving skills * Efficient organizational, multitasking, and time management abilities Preferred skills/experience areas include: * A Bachelor's degree in Information Security, Information Technology, or Computer Science * Management or leadership experience in IT and information security space * Vulnerability scanning and mitigation utilizing Nessus, Retina, GFI Languard, or similar tool * Experience with networking fundamentals including various concepts, tools, and administrative functions * Working knowledge of container image security and experience overseeing security for containerized environments (docker, podman, etc) * SEIM management or use for analysis, such as Splunk, ELK, or AlienVault * VMWare and management of Virtual Machines * Training material development Your working location will be located in State College, PA in a hybrid on-site/work from home format. Questions related to flexible work should be directed to the hiring manager during the interview process. This position will require periodic travel to remote locations. MINIMUM EDUCATION, WORK EXPERIENCE & REQUIRED CERTIFICATIONS If filled as Cyber Information Assurance Analyst - Principal Professional, this position requires: Master's Degree 8+ years of relevant experience; or an equivalent combination of education and experience accepted Required Certifications: None If filled as Cyber Information Assurance Analyst - Senior Professional, this position requires: Bachelor's Degree 6+ years of relevant experience; or an equivalent combination of education and experience accepted Required Certifications: None ARL's purpose is to research and develop innovative solutions to challenging scientific, engineering, and technology problems in support of the Navy, the Department of Defense (DoD), and the Intel Community (IC). FOR FURTHER INFORMATION on ARL, visit our web site at **************** BACKGROUND CHECKS/CLEARANCES Employment with the University will require successful completion of background check(s) in accordance with University policies. All positions at ARL require candidates to possess the ability to obtain a government security clearance; you will be notified during the interview process if this position is subject to a government background investigation. You must be a U.S. citizen to apply. Employment with the ARL will require successful completion of a pre-employment drug screen. SALARY & BENEFITS The salary range for this position, including all possible grades, is $86,300.00 - $145,700.00.THE PROPOSED SALARY RANGE MAY BE IMPACTED BY GEOGRAPHIC DIFFERENTIAL Salary Structure - Information on Penn State's salary structure Penn State provides a competitive benefits package for full-time employees designed to support both personal and professional well-being. In addition to comprehensive medical, dental, and vision coverage, employees enjoy robust retirement plans and substantial paid time off which includes holidays, vacation and sick time. One of the standout benefits is the generous 75% tuition discount, available to employees as well as eligible spouses and children. For more detailed information, please visit our Benefits Page. CAMPUS SECURITY CRIME STATISTICS Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here. EEO IS THE LAW Penn State is an equal opportunity employer and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact ************. Federal Contractors Labor Law Poster PA State Labor Law Poster Penn State Policies Copyright Information Hotlines
    $86.3k-145.7k yearly Auto-Apply 8d ago
  • Analyst III - Information Security

    MWI Animal Health

    Security engineer job in Conshohocken, PA

    Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today! Job Details Job Description for IAM Hygiene Analyst III role This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation. This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of “least privilege”. The ideal candidate will have hands-on experience remediating identity and access related risks. This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience. Primary Duties and Responsibilities: Identify and take appropriate actions around unused or stale accounts. Identify and take appropriate actions around unused or stale accounts. Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified. Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies. Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows. Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities. Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices. Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols. Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified. Qualifications: 4+ years of experience IAM or related field 1+ years in an IAM Hygiene or IAM Governance role Bachelors degree or equivalent experience Skills and Knowledge: Behavioral: Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls Familiarity with SailPoint Familiarity with Axonius (preferred) Familiarity with NIST framework Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions. Ability to operate independently and within a team structure Effective communication and collaboration skills Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment. Technical Skills: IAM Lifecycle and Access provisioning Authentication Support (MFA and SSO) IAM Policy and Standards (NIST, ISO 27001, HITRUST) IT Risk and Compliance Awareness Root Cause Analysis and Incident Support Reporting and Documentation Threat Monitoring and Alert Response Tools Knowledge: IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity) Directory Services (Active Directory, Azure AD) ITSM Tools (e.g., ServiceNow) Security Tools (SIEM, EDR, SOAR) Programming/Scripting (e.g., Python, PowerShell, SQL) Microsoft Office Suite What Cencora offers We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit ************************************** Full time Equal Employment Opportunity Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law. The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory. Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
    $80k-114k yearly est. Auto-Apply 11d ago
  • Lead Security Engineer - AI/ML

    Jpmorgan Chase & Co 4.8company rating

    Security engineer job in Wilmington, DE

    JobID: 210684456 JobSchedule: Full time JobShift: : As a Lead AIML Security Engineer at JPMorgan Chase within the Cybersecurity and Technology Controls organization, you are an integral part of a team that works to deliver software solutions that satisfy functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. Job responsibilities * Builds AIML technical controls software solutions: design, development, and technical troubleshooting across multiple cloud platforms (AWS, Azure, GCP), with the ability to think beyond routine or conventional approaches to build solutions or break down technical problems * Develops secure high-quality production code, and reviews and debugs code written by others * Produces architecture and design artifacts for complex applications while being accountable for ensuring design constraints are met by software code development * Leads evaluation sessions with external vendors, startups, and internal teams to drive outcomes-oriented probing of architectural designs, technical credentials, and applicability for use within existing systems and information architecture * Contributes to software engineering communities of practice and events that explore new and emerging technologies * Adds to team culture of diversity, opportunity, inclusion, and respect Required qualifications, capabilities, and skills * Formal training or certification on software engineering concepts and 5+ years applied experience * Advanced in one or more programming language(s): Python, Java, Golang * Extensive practical experience with at least one public cloud (Google Cloud Platform, Amazon Web Services) * Hands on practical experience in system design, application development, testing, and operational stability across AWS, Azure, and GCP * Subject matter expert in securing AIML systems with practical experience in AI and machine learning technologies * Knowledgeable in AI safety, AI alignment, AI cybersecurity concepts, and trends, including GenAI security * Ability to tackle design and functionality problems independently with little to no oversight * Proficient in all aspects of the Software Development Life Cycle * Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security Preferred qualifications, capabilities, and skills * Experience designing, deploying, and managing solutions across AWS, Azure, and GCP. * Google Cloud Professional is a plus.
    $101k-134k yearly est. Auto-Apply 35d ago
  • Information Security Analyst

    Vurke

    Security engineer job in Philadelphia, PA

    About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations. Responsibilities: Configure and maintain firewalls, VPNs, and IDS/IPS systems. Perform network security monitoring and incident response. Conduct penetration testing and simulate attacks to identify weaknesses. Harden routers, switches, and network devices. Optimize performance without compromising security. Requirements: 3+ years experience in network engineering/security. Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls. Experience with network protocols (TCP/IP, DNS, SSL, VPN). CCNA Security, CCNP Security, or equivalent certifications. Required Skills: Information Security Security
    $80k-114k yearly est. 60d+ ago
  • Principal Data Center Security Systems Engineer

    Insight Global

    Security engineer job in Middletown, DE

    Insight Global is seeking an experienced, driven Principal Security Systems Engineer to join a growing AI and GPU infrastructure start-up based in SF, NYC, or Seattle. This is a full-time, permanent role with competitive salary, bonus, equity, and benefits. In this role, the Principal Data Center Security Systems Engineer will lead and design the multi-layer physical security stack that protects this company's data. This engineer's work spans perimeter hardening to rack-level tamper detection, all integrated into a zero-trust monitoring framework. Day-to-day responsibilities: - Manage all aspects of the security system for data centers coordinating with all other discipline requirements - Create strategy for data center security system design and deployment - Develop security system standards in compliance with US - DoD and other international standards - Develop and maintain the basis of design, master specification, master drawings - Facilitate developing project specific drawings and documentation based on the master design with local adaptation working with external design consultants - Engineer access-control, CCTV, intrusion-detection and biometric systems to meet SOC 2 & ISO 27001 - Create zoning and mantrap layouts, badge/biometric authentication flows and visitor-management SOPs - Specify encryption and retention policies for video, logs and alarms - Integrate security events into DCIM and corporate SIEM platforms - Drive resiliency (dual-path comms, battery backup) and regular penetration-test programs We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** . To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** . Skills and Requirements - 10+ years designing hyperscale / enterprise or mission-critical physical-security systems. - Deep knowledge of ONVIF, SIA DC-09, OSDP, Wiegand, BACnet. - Experience with Genetec, LenelS2, Honeywell or Avigilon ecosystems. - CISSP-ISSAP or PSP certification is desirable
    $79k-111k yearly est. 60d+ ago
  • Information Security Systems Engineer-Ss

    McLaughlin Research Corporation 4.0company rating

    Security engineer job in Philadelphia, PA

    McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division. The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments. Requirements Key Responsibilities Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems. Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series. Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP. Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals. Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements. Required Qualifications Education: BS in Computer Science or relevant field. Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments. Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP. Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial. Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance. Equal Employment Opportunity Statement: McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws. EEO is the Law: Applicants and employees are protected under Federal law from discrimination.
    $74k-100k yearly est. 60d+ ago
  • Information Systems Security Engineer II (ISSE II)

    Dynamic Solutions Technology LLC 4.0company rating

    Security engineer job in Philadelphia, PA

    Job Description Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients, is seeking a full-time Information Systems Security Engineer II (ISSE II). This position is an exempt role that will provide on-site support at the government customer's area of operation in the Philadelphia, PA location. --------------------------------------- ACTIVE SECRET CLEARANCE REQUIRED ------------------------------ RESPONSIBILIES Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans, which include System Categorization Forms, Platform Information Technology (PIT) Determination Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M). Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO). Identify and tailor IT and Cyber Security (CS) control baselines based on RMF guidelines and categorization of the RMF boundary. Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security review (ASR). Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements. Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries in accordance with guidance provided by the command ISSMs. Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. Deploy security updates to Information System components. Perform routine audits of IT system hardware and software components. Participate in IT change control and configuration management processes. Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). Image or re-image assets that are part of the assigned RMF boundary. Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets. Assist with removal of Solid-State Drive (SSD), Hard Disk Drive (HDD) or other critical components of assets before destruction and removal from the RMF boundary. Support configuration change documentation and control processes and maintaining DOD STIG Compliance. Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware; This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware. Report compliance issues of network hardware to management to avoid operational loss of the network. EXPERIENCE AND EDUCATION REQUIREMENTS: Secret security clearance required Bachelor's degree in computer science, information technology, or an equivalent STEM l degree from an accredited college or university. Minimum three (3) years professional relevant experience Must Meet DoD IAT-II level Certification Requirements: At a minimum one (1) of the following certifications: CCNA-Security, CySA+, GICSP, GSEC, Security+/CE, CND, GCIH, SSCP
    $79k-95k yearly est. 18d ago
  • Information System Security Officer III

    Data Intelligence 4.5company rating

    Security engineer job in Philadelphia, PA

    Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization. **This position is contingent upon award of contract** Key Responsibilities: Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards. Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems. Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership. Provide guidance on best practices and recommend improvements to the organization's security posture. Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats. Support continuous monitoring of information systems and provide regular status reports on security compliance. Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices. Required Skills/Experience: Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field. A minimum of 6 years of relevant experience in cybersecurity or information systems security. Prior experience supporting Navy programs. Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M. At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary. Proficiency in cybersecurity frameworks, risk management processes, and security controls. Strong analytical and problem-solving skills with attention to detail. Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team. Preferred Qualifications: Experience with DoD security requirements and systems. Familiarity with NIST, RMF, and other relevant cybersecurity standards. Ability to work in a potentially remote environment with occasional on-site requirements. Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment. About Us: Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status. Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $79k-108k yearly est. 60d+ ago
  • Information Systems Security Engineer III

    Armada Ltd. 3.9company rating

    Security engineer job in Philadelphia, PA

    Job Description Type: Full Time Overtime Exempt: Yes Reports To: ARMADA HQ Security Clearance Required: Active Secret ************CONTINGENT UPON AWARD*************** Duties & Responsibilities: The Information Systems Security Engineer III (ISSE III) shall assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M). The Information Systems Security Engineer III shall execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO). The Information Systems Security Engineer III shall identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary. The ISSE III shall perform Ports, Protocols, and Services Management (PPSM). The ISSE III shall perform IT and CS vulnerability-level risk assessments. The ISSE III shall execute security control testing as required by a risk assessment or annual security review (ASR). The ISSE III shall mitigate and remediate IT and CS system level vulnerabilities for all assets withing the boundary per STIG requirements. The ISSE III shall develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). The ISSE III shall develop and maintain system level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs. The ISSE III shall implement and assess STIG and SRGs. The ISSE III shall perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. The ISSE III shall deploy security updates to Information System components. The ISSE III shall perform routine audits of IT system hardware and software components. The ISSE III shall maintain inventory of Information System components. The ISSE III shall participate in IT change control and configuration management processes. The ISSE III shall upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). The ISSE III shall image or re-image assets that are part of the assigned RMF boundary The ISSE III shall install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets. The ISSE III shall assist with removal of SSD, HDD or other critical components of assets before destruction and removal from the RMF boundary. The ISSE III shall provide cybersecurity patching of assets in times of DoD and DoN TASKORDs, FRAGORDs, or even designated by Command ISSM, ACIO, and/or Code 104 management. The ISSE III shall support configuration change documentation and control processes and maintaining DOD STIG Compliance. The ISSE III shall support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware. This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware. The ISSE III shall report compliance issues of network hardware to management. Other duties as assigned. Knowledge, Skills, and Abilities (KSAs): Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance. Ability to develop and implement information assurance guidance and execute ISS functions with little to no supervision. Certifications: Minimum Certification Requirements: IAT Level III certification (CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH and CCSP). Minimum/General Experience: Seven (7) years professional experience capturing and refining information security operational and security requirements, and ensuring those requirements are properly addressed through purposeful architecting, design, development, and configuration; and implementing security controls, configuration changes, software/hardware updates/patches, vulnerability scanning, and securing configurations. Minimum Education: Bachelor's degree in computer science, information technology, or an equivalent technical degree from an accredited college or university. Disclaimer: The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ****************** Special Notes: Relocation is not available for these jobs ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
    $69k-95k yearly est. 21d ago
  • Platform Engineer - Security

    Campbell Soup 4.3company rating

    Security engineer job in Camden, NJ

    Since 1869, we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Cape Cod, Chunky, Goldfish, Kettle Brand, Lance, Late July, Pacific Foods, Pepperidge Farm, Prego, Pace, Rao's Homemade, Snack Factory, Snyder's of Hanover. Swanson, and V8. Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us. Why Campbell's… Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners). Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting. Campbell's offers unlimited sick time along with paid time off and holiday pay. If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store. Giving back to the communities where our employees work and live is very important to Campbell's. Our “Campbell's Cares” program matches employee donations and/or volunteer activity up to $1,500 annually. Campbell's has a variety of Employee Resource Groups (ERGs) to support employees. Who we are looking for… The Campbell's Company is looking for an senior-level Engineer - Information Security to join our critical and highly visible Information Security team. This position will primarily be responsible for managing the lifecycle and effectiveness of key security tools and processes. You will work closely with the Architecture and Risk Management teams to ensure that security controls are in place and appropriately managing risk throughout the Information Technology, Operational Technology, and Cloud environments. What you will do… Essential responsibilities will include but not be limited to: Design, deploy, and integrate security tools and processes Design, deploy, integrate Privilege Access Management (PAM) services for Linux and Windows environments Experience in developing, testing, and deploying ZeroTrust security strategies focused on identity, device, and network contexts Cloud (Azure / AWS) security engineering Develop and implement automation strategies tied to both administrative maintenance of the environment, as well as contribute to the overall detection engineering efficiency Active Directory security hardening Job Complexity Manage multiple, concurrent project and task assignments, placing proper priorities on tasks and attention to detail to follow through all assignments to completion Create and manage the lifecycle of documentation to support the architecture and operations of security systems Continuously improve operational playbooks and knowledge transfer material to enable operational support teams to handle increasingly complex tasks to enable Engineering time is focused on the most valuable work Serve as an incident escalation point Provide thought leadership and communications expertise in the development of policies, standards, procedures, and other communication for the department Provide thought leadership on key performance indicators for measuring success objectively Integrate existing and new tools and supporting resources into our security intelligence platform, with the goal of deriving actionable data Keep current with the latest news and events surrounding cyber threats and security Evaluate new technologies and processes that enhance security capabilities What you bring to the table… (Must Have) Bachelor's degree in a computer science or information technology discipline 5+ years of relevant work experience, including: 2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management 1 year of experience in system or firewall administration Deep understanding of Linux identity engineering and administration 2 years of experience working with privileged access management platforms across Windows, Linux, network device, and containerized platforms Significant experience working with automation scripting leveraging at least 3 of the following: python, PowerShell, API based integrations, and no/low-code workflow automation platforms. Strong knowledge of L4-L7 protocols such as SSL, HTTP, DNS, SMTP, and IPsec Deep understanding of TCP/IP, computer networking, routing, and switching, and encryption technologies and standards Knowledge of identity and access management principles (SSO, MFA, ModernAuth) It would be great if you have… (Nice to Have) CISSP certification is a plus Cloud security experience is a plus Conceptual understanding of the Cyber Kill Chain and MITRE ATT&CK framework Experience with Manufacturing environments is a plus Experience with leveraging LLM's or statistical analysis to drive operational insights Strong capacity to understand vectors and the risks associated with them Experience with deploying and managing distributed architecture layer 7 firewalls Experience with IDS/IPS, penetration and vulnerability testing Strong security policy knowledge and experience Strong ability to clearly communicate and document complex concepts Data protection tools and processes - Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB] More about the job… This position reports to the Senior Manager for Security Architecture and Engineering Compensation and Benefits: The target base salary range for this full-time, salaried position is between $131,400-$188,900 Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package. The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
    $131.4k-188.9k yearly Auto-Apply 33d ago
  • Information Systems Security Engineer III (ISSE III)

    Dynamic Solutions Technology 4.0company rating

    Security engineer job in Philadelphia, PA

    Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients, is seeking a full-time Information Systems Security Engineer III (ISSE III). This position is an exempt role that support will be provided on site in the government customer's area of operation in the Philadelphia, PA location. ----------------------------------------------------- Active Secret Clearance Required -------------------------------------- RESPONSIBILIES Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans, which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M). Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO). Identify and tailor IT and Cyber Security (CS) control baselines based on RMF guidelines and categorization of the RMF boundary. Perform Ports, Protocols, and Services Management (PPSM). Perform IT and CS vulnerability-level risk assessments. Execute security control testing as required by a risk assessment or annual security review (ASR). Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements. Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries in accordance with guidance provided by the command ISSMs. Implement and assess STIG and SRGs. Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. Deploy security updates to Information System components. Perform routine audits of IT system hardware and software components. Maintain inventory of Information System components. Participate in IT change control and configuration management processes. Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM). Image or re-image assets that are part of the assigned RMF boundary. Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets. Assist with removal of Solid-State Drive (SSD), Hard Disk Drive (HDD) or other critical components of assets before destruction and removal from the RMF boundary. Support configuration change documentation and control processes and maintaining DOD STIG Compliance. Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware; This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware. Report compliance issues of network hardware to management to avoid operational loss of the network. EXPERIENCE AND EDUCATION REQUIREMENTS: Secret security clearance required Bachelor's degree in computer science, information technology, or an equivalent STEM l degree from an accredited college or university. Minimum Seven (7) years professional relevant experience Must Meet DoD IAT-III level Certification Requirements: At a minimum 2-3 of one of the following certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP Experience and Skills: Excellent oral and written skills. Excellent critical thinking skills. Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook. Ability to work independently and as a team member Ability to learn and apply technical concepts to assigned duties
    $79k-95k yearly est. 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Wilmington, DE?

The average security engineer in Wilmington, DE earns between $75,000 and $139,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Wilmington, DE

$102,000

What are the biggest employers of Security Engineers in Wilmington, DE?

The biggest employers of Security Engineers in Wilmington, DE are:
  1. JPMC
  2. JPMorgan Chase & Co.
  3. Pyramid It
Job type you want
Full Time
Part Time
Internship
Temporary